File models and file accessing models
Branch and bound technique
Wap architecture and wml script
Case study on cyber crime
Web services concepts, protocols and development
Web services
Object oriented concepts with java
Kerberos using public key cryptography
Hierarchical clustering
Cyber crime and cyber laws
Search engine and web crawler