1.IPV6
2.VIRTUAL REALITY
3.HADOOP
4.INTERNET TRAFFIC OPTIMAL ROUTING
5.LATEST WIRELESS SECURITY ALGORITHMS
6.WINDOWS PHONE OS
7.BIG DATA
8.CASSENDRA
9.AGILE PROJECT MANAGEMENT
10.ACCUMULO
11.IOS
12.SAP
13.BIO INFORMATICS
14.HYPERTABLE
15.MULTIMODEL WEB ACCESS
16.ETHICAL HACKING
17.WEB SERVICES
18.HYBERNATE
19.SEMANTIC WEB
20.STRUTS
21.COMPUTER FORENSICS
22.LATEST DESIGN PATTERNS
23.ASPECT ORIENTATION
24.AMBIENT INTELLIGENCE
25.SELF CONFIGURABLE SYSTEMS
26.AUTONOMIC COMPUTING
27.CLOUDATA
28.ONTOLOGY DESIGN
29.FAULT TOLERANCE AND RESILENT COMPUTING SYSTEMS
30.RECENT TREDS IN INTRUTION DETECTION AND PREVENTION SYSTEMS
31.STORAGE AREA NETWORKS
32.XML ENCRYPTION AND DIGITAL SIGNATURES
33.THREAT MODELING IN VULNARABILITY CLASSIFICATION
34.PARALLEL AND RANDOMIZED ALGORITHMS
35.EMBEDDED SYSTEMS
36.GAME THEORY
37.ADHOC AND SENSOR NETWORKS
38.DATA RECOVERY
39.GRAPH BASED SEARCH ENGINE
40.3D PASSWORD
2.VIRTUAL REALITY
3.HADOOP
4.INTERNET TRAFFIC OPTIMAL ROUTING
5.LATEST WIRELESS SECURITY ALGORITHMS
6.WINDOWS PHONE OS
7.BIG DATA
8.CASSENDRA
9.AGILE PROJECT MANAGEMENT
10.ACCUMULO
11.IOS
12.SAP
13.BIO INFORMATICS
14.HYPERTABLE
15.MULTIMODEL WEB ACCESS
16.ETHICAL HACKING
17.WEB SERVICES
18.HYBERNATE
19.SEMANTIC WEB
20.STRUTS
21.COMPUTER FORENSICS
22.LATEST DESIGN PATTERNS
23.ASPECT ORIENTATION
24.AMBIENT INTELLIGENCE
25.SELF CONFIGURABLE SYSTEMS
26.AUTONOMIC COMPUTING
27.CLOUDATA
28.ONTOLOGY DESIGN
29.FAULT TOLERANCE AND RESILENT COMPUTING SYSTEMS
30.RECENT TREDS IN INTRUTION DETECTION AND PREVENTION SYSTEMS
31.STORAGE AREA NETWORKS
32.XML ENCRYPTION AND DIGITAL SIGNATURES
33.THREAT MODELING IN VULNARABILITY CLASSIFICATION
34.PARALLEL AND RANDOMIZED ALGORITHMS
35.EMBEDDED SYSTEMS
36.GAME THEORY
37.ADHOC AND SENSOR NETWORKS
38.DATA RECOVERY
39.GRAPH BASED SEARCH ENGINE
40.3D PASSWORD