Refine your search

Your search returned 127 results.

Not what you expected? Check for suggestions
Protect your information with intrusion detection Alex Lukatsky

by Lukatsky, Alex.

Publisher: New Delhi BPB Pub. 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 LUK (1).
Information Security Management Handbook (E BOOK) Harold F. Tipton, Micki Krause,editors

Edition: Fifth Edition Publisher: Boca Raton CRC Press 2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 658 .0558 INF (1).
Implementation of Automated Security Focused Configuration Management in an Academic Organization Through Scap (NIST)/ Summayya Shahzad

by Shahzad, Sumayya | Supervisor : Dr. Baber Aslam.

Publisher: Rawalpindi MCS,NUST 2015Online access: Click here to access online Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SHA (1), Central Library (CL)Call number: 004 (2).
Information security and cyber laws

by Sharma Ponkaj | Pankaj Sharma.

Material type: Text Text Publisher: New Delhi S.K.Kataria & Sons 2010Availability: No items available : Pending hold (1).
Legal Issues in information security

by LYN Grama Joanna | Joanna LYN Grama.

Edition: 2ndMaterial type: Text Text Publisher: USA Jones & Bartlett 2015Availability: Items available for loan: Central Library (CL)Call number: 005.8 LYN (1).
Data Integrity Validation of Open Source idevice Forensic tools with Reference to Commercial tool/ Maryam Jalees Ahmad

by Maryam Jalees Ahmad.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Islamabad : IS NUST, 2015Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
DETECTION OF FLOODING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN RULE-BASED NETWORK INTRUSION DETECTION SYSTEM / Amtul Saboor

by Amtul Saboor | Supervisor: Dr. Baber Aslam.

Material type: Text Text Publisher: Islamabad : MCS - NUST , 2014Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
SIDHADOOP ; SECURE INTER-DOMAIN HADOOP / Muhammad Obaid UR Rehman

by Muhammad Obaid UR Rehman.

Material type: Text Text Publisher: Islamabad : SEECS - NUST, 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
Data Set Security in a Physically Accessible System / Muhammad Abdullah Abid

by Abid, Muhammad Abdullah | Dr. Shahzad Saleem.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Islamabad ; SEECS- NUST 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Improved Design of Convex Hull Click (CHC) Graphical Password Scheme / Zohaib Shahid

by Shahid, Zohaib | Dr. Shahid Saleem.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Islamabad ; SEECS - NUST 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
DEVELOPMENT OF CYBERSECURITY TRAINING PROGRAM FOR THE ACADEMIC COMMUNITY - A ROLE - BASE APPROACH Sajjal Akram

by Akram, Sajjal | Dr. Baber Aslam.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
A Smart Card Based Security Extension for the Bitcoin Wallets / Majid Amjad Hussain

by Hussain, Majid Amjad | Dr. Shahzad Saleem.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Islambad : SEECS - NUST, 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 621.3 (2).
SECURING COMPUTER NETWORKS USING CYBER ANALYTICS / Hafsa Hafeez.

by Hafeez, Hafsa | Baber Aslam.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
SECURITY IN PERVASIVE COMPUTING ENVIRONMENT / NAZIR AHMED MALIK.

by Ahmed, Nazir Malik | Dr. Muhammad Younus Javed.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Islamabad: CEME - NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 005 (1).
CyberSecurity Framework for Security Software Based Medical Devices to Prevent Sophisticated Cyber Attacks in Healthcare Environment / Tahreem Yaqoob.

by Yaqoob, Tahreem | DR. Haider Abbas.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2018Availability: Items available for loan: Central Library (CL)Call number: 005 (1).
Forensics analysis of windows 8.1 physical memory / Waqas Ahmed.

by Ahmed, Waqas | Dr. Baber Aslam.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
Algebraic Cryptanalysis of Stream Ciphers with Non-linear Update / Mehreen Afzal.

by Afzal, Mehreen | Supervisor:Dr. Ashraf Masood.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2010Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Integrity Preservation of Android Evidence in Trusted Way / Muhammad Adnan Bukhari.

by Bukhari, Muhammad Adnan | Dr. Shahzad Saleem.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2017Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Generalized Attribute-Centric Access Control Arjumand Fatima.

by Fatima, Arjumand | Dr. Abdul Ghafoor.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2015Availability: Items available for loan: Central Library (CL)Call number: 005 (1).
Optimization of Person Re-Identification Through Visual Descriptors / Naima Mubariz.

by Mubariz, Naima | Dr. Muhammad Moazam Fraz.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2017Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
Determining Platform Integrity using TPM and Adding Geo-Location in Digital Evidence Acquisition Process / Aneeq Ahmad.

by Ahmad, Aneeq | Dr. Shahzad Saleem.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Improving the Quality of Cyber Threat Information using Data Analytics / Yumna Ghazi.

by Ghazi, Yumna | Dr. Zahid Anwar.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005 (1).
Empirical Study to Analyse information Security Awareness of NUST Students / Tanzeela Younas Malik.

by Malik, Tanzeela Younas | Dr. Seemab Latif.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005 (1).
Mitigation of DDoS Attack on Cloud Computing due to IoT Devices /

by Riaz, Amna | Dr. Rizwan Ahmed.

Material type: Text Text Publisher: Islamabad : SEECS - NUST, 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 621.3 (1).
proceeding of National information Security Seminar (NISS-2011, Islamabad) / PASTIC, PSF, RIU, NUST, NTISB, CASE, Business Beam.

Material type: Text Text Availability: Items available for loan: Central Library (CL)Call number: Proceeding (1).
KIET Journal of Computing and Information Sciences : Karachi Institute of Economics & Technology / PAF KIET.

by KJCIS.

Material type: Text Text Publisher: Karachi, Pakistan: College of Computing & Information Sciences (CoCIS), Availability: Items available for loan: Central Library (CL)Call number: Vol-1, No-1 Jul-Dec 2018 (2).
Tweakable Enciphering Schemes for Disk Encryption / Reeda Iftikhar Kianee.

by Kianee, Reeda Iftikhar | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad: MCS NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Building A Framework based on an Open Source Malware Forensic Technique / Naeem Amjad

by Amjad, Naeem | Dr. Muhammad Faisal Amjad.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Increase the Entropy of True Random Number Generator / Qaiser Khan

by Khan, Qaiser | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Forensics of IP Based Security Surveillance Cameras Rashid Masood Khan

by Khan, Rashid Masood | Dr. Muhammad Faisal Amjad.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
A Highly Robust Watermarking Technique for Right Protection of Relation Databases / Sabah Suhail

by Suhail Sabah | Dr.Fahim Arif.

Material type: Text Text Publisher: Islamabad. MCS- NUST. 2012Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Self healing group key management protocols / Amna Saeed.

by Saeed, Amna | Sup: Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2013Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Forensic Analysis of Resilient File System in Windows Server 2012 Aemun Iqbal

by Iqbal, Aemun | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad: MCS-NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Correlaion Power Analysis of Modes of Encryption Shah Fahd

by Fahd, Shah | Dr. Mahreen Afzal.

Material type: Text Text Publisher: Islamabad: MCS-NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Feasibility Analysis for Incorporating/ Deploying Siem for Forensic Evicence Collection in Cloud Environment / Muhammad Irfan

by Irfan, Muhammad | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Security for VMWare Virtualized Datacenter / Fazeel Ali Awan

by Awan, Fazeel Ali | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
A Critical Analysis of Various Web Domains in Pakistan-Anomalies and Countermeasures / Sohaib Khan

by Khan, Sohaib | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Security Analysis of Recovered Data in Cloud based Hypervisor Virtual Machines / Syed Fawad Ali Shah

by Shah, Syed Fawad Ali | Dr. Rabia Latif.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Metamorphic Techniques and Their Application on Havex Malware /

by Mumtaz, Zainub | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
A Control Framework for Openid / Moeen Qaemi Mahmoodzadeh

by Mahmoodzadeh, Moeen Qaemi | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Sensors Date Acquisition and Transmission Protection in Ehealthcare System Muhammad Yaseen

by Yaseen, Muhammad | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Android Device Protection Through Machine Learning Technique (s) Anam Mehtab

by Mehtab, Anam | Dr. Muhammad Faisal Amjad.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Detection of Advance Persistent Threat (APT) Farhan Habib Ahmad

by Ahmad, Farhan Habib | Dr. Babar Aslam.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2015Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
A Control Framework for Openid Moeen Qaemi Mahmoodzadeh

by Mahmoodzadeh, Moeen Qaemi | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (1).
Automated Anaylsis of Malware-Semantic Based Approach Muzzamil Noor

by Noor, Muzzamil | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2015Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Forensic Analysis of Windows 10 Metro UI Apps for User Privacy and Data Integrity Violations /

by Jamali, Farhad Hussain | Dr. Muhammad Faisal Amjad.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Forensic Analysis of Drives Encrypted with Windows Bitlocker / Kunwar Sharoon Jiwan Mall

by Mall, Kunwar Sharoon Jiwan | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Cyber Security Sensitization: A Case Study of Adolescents in Pakistan /

by Shah, Syed Usman Ali | Dr. Baber Aslam.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Forensic Analysis of IIS FTP Publishing Service (Version 7.5) /

by Khalid, Saneeha | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Determining the Efficacy of ISO Control in Academics Institutions and Finding the Vulnerabilities using Penetration Testing / Umair Ahmad

by Ahmad, Umair | Dr. Ashraf Masood.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2014Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.