![Open Access](https://computers.stmjournals.com/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://computers.stmjournals.com/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Research Articles
Various Techniques of Optical Watermarking |
PDF
![]() |
Hemlata Arya, Jaimala Jha | 13-19 |
Cloud Security: A Review on Third Party Auditor |
PDF
![]() |
P.C. Shende, D. Mude | 20-22 |
Improvement of an Android Application for Corporate Data |
PDF
![]() |
Himanshu verma | 23-27 |
Review Articles
Requirement Understandings for Open Source Software Development |
PDF
![]() |
Aditya Singh | 1-12 |
Network Intrusion Detection Mistreatment Soft Computing Technique |
PDF
![]() |
P C Shende, D. Mude | 28-32 |
This site has been shifted to https://stmcomputers.stmjournals.com/