Your search returned 42 results.

Not what you expected? Check for suggestions
Digital modulation and coding Stephen G. Wilson

by Wilson, Stephen G.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi Pearson Education c.1996Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 621.3822 WIL (5).
Data Set Security in a Physically Accessible System / Muhammad Abdullah Abid

by Abid, Muhammad Abdullah | Dr. Shahzad Saleem.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Islamabad ; SEECS- NUST 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Improved Design of Convex Hull Click (CHC) Graphical Password Scheme / Zohaib Shahid

by Shahid, Zohaib | Dr. Shahid Saleem.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Islamabad ; SEECS - NUST 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
DEVELOPMENT OF CYBERSECURITY TRAINING PROGRAM FOR THE ACADEMIC COMMUNITY - A ROLE - BASE APPROACH Sajjal Akram

by Akram, Sajjal | Dr. Baber Aslam.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
A Smart Card Based Security Extension for the Bitcoin Wallets / Majid Amjad Hussain

by Hussain, Majid Amjad | Dr. Shahzad Saleem.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Islambad : SEECS - NUST, 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 621.3 (2).
SECURING COMPUTER NETWORKS USING CYBER ANALYTICS / Hafsa Hafeez.

by Hafeez, Hafsa | Baber Aslam.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
CyberSecurity Framework for Security Software Based Medical Devices to Prevent Sophisticated Cyber Attacks in Healthcare Environment / Tahreem Yaqoob.

by Yaqoob, Tahreem | DR. Haider Abbas.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2018Availability: Items available for loan: Central Library (CL)Call number: 005 (1).
Forensics analysis of windows 8.1 physical memory / Waqas Ahmed.

by Ahmed, Waqas | Dr. Baber Aslam.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
Integrity Preservation of Android Evidence in Trusted Way / Muhammad Adnan Bukhari.

by Bukhari, Muhammad Adnan | Dr. Shahzad Saleem.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2017Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Generalized Attribute-Centric Access Control Arjumand Fatima.

by Fatima, Arjumand | Dr. Abdul Ghafoor.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2015Availability: Items available for loan: Central Library (CL)Call number: 005 (1).
Optimization of Person Re-Identification Through Visual Descriptors / Naima Mubariz.

by Mubariz, Naima | Dr. Muhammad Moazam Fraz.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2017Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005 (2).
Determining Platform Integrity using TPM and Adding Geo-Location in Digital Evidence Acquisition Process / Aneeq Ahmad.

by Ahmad, Aneeq | Dr. Shahzad Saleem.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Improving the Quality of Cyber Threat Information using Data Analytics / Yumna Ghazi.

by Ghazi, Yumna | Dr. Zahid Anwar.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005 (1).
Empirical Study to Analyse information Security Awareness of NUST Students / Tanzeela Younas Malik.

by Malik, Tanzeela Younas | Dr. Seemab Latif.

Material type: Text Text Publisher: Islamabad: SEECS - NUST, 2018Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005 (1).
Tweakable Enciphering Schemes for Disk Encryption / Reeda Iftikhar Kianee.

by Kianee, Reeda Iftikhar | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad: MCS NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Building A Framework based on an Open Source Malware Forensic Technique / Naeem Amjad

by Amjad, Naeem | Dr. Muhammad Faisal Amjad.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Increase the Entropy of True Random Number Generator / Qaiser Khan

by Khan, Qaiser | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Feasibility Analysis for Incorporating/ Deploying Siem for Forensic Evicence Collection in Cloud Environment / Muhammad Irfan

by Irfan, Muhammad | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Security for VMWare Virtualized Datacenter / Fazeel Ali Awan

by Awan, Fazeel Ali | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
A Critical Analysis of Various Web Domains in Pakistan-Anomalies and Countermeasures / Sohaib Khan

by Khan, Sohaib | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Security Analysis of Recovered Data in Cloud based Hypervisor Virtual Machines / Syed Fawad Ali Shah

by Shah, Syed Fawad Ali | Dr. Rabia Latif.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
A Control Framework for Openid / Moeen Qaemi Mahmoodzadeh

by Mahmoodzadeh, Moeen Qaemi | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Forensic Analysis of Drives Encrypted with Windows Bitlocker / Kunwar Sharoon Jiwan Mall

by Mall, Kunwar Sharoon Jiwan | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Determining the Efficacy of ISO Control in Academics Institutions and Finding the Vulnerabilities using Penetration Testing / Umair Ahmad

by Ahmad, Umair | Dr. Ashraf Masood.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2014Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
An Invisible Non-blind Color Image Watermarking Scheme / Ramsha Ahmed

by Ahmed, Ramsha | Dr. Abdul Ghafoor.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Implementing International best Practices in Academics Institutes / Huma Rehman

by Rehman, Huma | Dr. Ashraf Masood.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2014Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Digital forensic analysis of IPhone / Waqas ali Khan.

by Khan, Waqas Ali | .

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Effects of primary user emulation attack on primary user activity / Ayesha Naeem.

by Naeem, Ayesha | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Pakistan's cyber space security: Critical Analysis and countermeasures / Narmeen Shafqat.

by Shafqat, Narmeen | Dr. Ashraf Masood.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Android Malware Analysis / Faisal Nasim.

by Nasim, faisal | Dr. Babar Aslam.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2015Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Exploitation and assessment of web-application vulnerabilities against data stealth attack by web crawlers and scrappers / Jamal Ahmed.

by Ahmed, Jamal | Imran Rashid.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
A state of the art anomaly IDS for hypervisor / Muhammad Intisar Ullah.

by Muhammad Intisar ullah Khan Sumbal | Muhammad Faisal Amjad.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
A Corporate Level Novel Methods of Decentralized Authentication for Secure Cloud Data Sharing / Subas Khan

by Khan, Subas | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Security Model for Android Smartphone Dual Persona / Khushboo Siddiquie

by Siddiquie, Khushboo | Dr. Ashraf Masood.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
On Variant of Flame Malware / Seharish Ajmal

by Ajmal, Seharish | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Key Management in Wimax Mesh Network / Usman Ahmad

by Ahmad, Usman | Dr. Faisal Bashir.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Handling Malicious Insiders in an IOT based on Cloud E-Healthcare Environment / Afsheen Ahmed

by Ahmed, Afsheen | Dr. Rabia Latif.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Impact of VM based Side Channel Attack on Depsky Multi Cloud Model / Haider Ali Khan Khattak

by Khattak, Haider Ali Khan | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Zero-Day Attack Detection using Security Information & Event Management (SIEM) / Natasha Arjumand Shoaib Mirza

by Mirza, Natasha Arjumand Shoaib.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2013Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Intrusion detection in cloud computing / Adeel Rasheed Minhas.

by Minhas, Adeel Rasheed | Imran Rashid.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Forensic analysis of solid state drives / Sidra Sohail.

by Sohail, Sidra | Baber Aslam.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.