Volume 2, Issue 1, February 2017
Wireless Network Security Threats, Vulnerabilities and Their Defences
Pages: 1-4     Published Online: Jan. 3, 2017
DOI: 10.11648/j.ajomis.20170201.11
Abstract | Full-Text PDF (170KB) | Full-Text Html
View 3324                 Downloads 69
Online Transaction Security Risk Management for E-commerce Web Applications
Pages: 5-14     Published Online: Jan. 3, 2017
DOI: 10.11648/j.ajomis.20170201.12
Abstract | Full-Text PDF (480KB) | Full-Text Html
View 3675                 Downloads 87
Business Processes Modelling of the Karaganda Crisis Center Activity
Pages: 15-20     Published Online: Jan. 5, 2017
DOI: 10.11648/j.ajomis.20170201.13
Abstract | Full-Text PDF (559KB) | Full-Text Html
View 1576                 Downloads 41
Health Websites Evaluation in Saudi Arabia: A Case Study
Pages: 21-31     Published Online: Jan. 20, 2017
DOI: 10.11648/j.ajomis.20170201.14
Abstract | Full-Text PDF (977KB) | Full-Text Html
View 3133                 Downloads 25
Browse journals by subject