<?xml version='1.0' encoding='utf-8' ?>



<rss version="2.0"
      xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"
      xmlns:dc="http://purl.org/dc/elements/1.1/"
      xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
     <title><![CDATA[NUST Institutions Library Catalogue Search for '(su:&quot;MSIS-4&quot;)']]></title>
     <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%22MSIS-4%22%29&amp;format=rss</link>
     <atom:link rel="self" type="application/rss+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%22MSIS-4%22%29&amp;sort_by=relevance_dsc&amp;format=atom"/>
     <description><![CDATA[ Search results for '(su:&quot;MSIS-4&quot;)' at NUST Institutions Library Catalogue]]></description>
     <opensearch:totalResults>14</opensearch:totalResults>
     <opensearch:startIndex>0</opensearch:startIndex>
     
       <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
     
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Efficient implementation of spread spectrum based steganographic technique






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180656</link>
        
       <description><![CDATA[









	   <p>By Ashraf, Muhammad  ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2009
                        . ix,66 ,p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180656">Place Hold on <em>Efficient implementation of spread spectrum based steganographic technique</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180656</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Analysis of voice over internet protocol (VoIP) and development of a generic technique  to detect VoIP traffic  (Hard / Soft-copy) 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180661</link>
        
       <description><![CDATA[









	   <p>By Idrees, Fauzia  (MSIS-4). 
	   Rawalpindi MCS (NUST) 2009
                        . xi,69, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180661">Place Hold on <em>Analysis of voice over internet protocol (VoIP) and development of a generic technique  to detect VoIP traffic  (Hard / Soft-copy) </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180661</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Defining wireless network security policy for defense organization and integrating BLP model in the policy for access control (Hard / Soft-copy) 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180668</link>
        
       <description><![CDATA[









	   <p>By Abbas, Adnan   (MSIS-4). 
	   Rawalpindi MCS (NUST) 2009
                        . ix, 47p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180668">Place Hold on <em>Defining wireless network security policy for defense organization and integrating BLP model in the policy for access control (Hard / Soft-copy) </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180668</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Developing SCA compliant security component and converting existing communication system into SCA-compliant SDR using OSSIE






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180683</link>
        
       <description><![CDATA[









	   <p>By Khan, Muhammad Usman Shahid  ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . viii, 48 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180683">Place Hold on <em>Developing SCA compliant security component and converting existing communication system into SCA-compliant SDR using OSSIE</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180683</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Performance enhancement of signature -based network intrusion detection system






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180685</link>
        
       <description><![CDATA[









	   <p>By Saeed, Muhammad Tariq   (MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . viii, 59 ,p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180685">Place Hold on <em>Performance enhancement of signature -based network intrusion detection system</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180685</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Analysis of skype security features to facilitate its detection, classification and blocking






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180689</link>
        
       <description><![CDATA[









	   <p>By Khan, Uzma Aslam     (MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . xi, 83 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180689">Place Hold on <em>Analysis of skype security features to facilitate its detection, classification and blocking</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180689</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    A secure end -to- end public key architecture for wireless sensor networks






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180695</link>
        
       <description><![CDATA[









	   <p>By Naureen, Ayesha  ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . xii, 78, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180695">Place Hold on <em>A secure end -to- end public key architecture for wireless sensor networks</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180695</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    A secure cluster based hybrid key man management architecture for wireless sensor networks






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180697</link>
        
       <description><![CDATA[









	   <p>By Akram, Attiya  (MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . x, 67,p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180697">Place Hold on <em>A secure cluster based hybrid key man management architecture for wireless sensor networks</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180697</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Resolving the authentication-connection association problem in port knocking and single packet authorization based dynamic firewalls (Hard / Soft-copy) 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180735</link>
        
       <description><![CDATA[









	   <p>By Tariq, Muhammad  (MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . viii, 63 p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180735">Place Hold on <em>Resolving the authentication-connection association problem in port knocking and single packet authorization based dynamic firewalls (Hard / Soft-copy) </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180735</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Mobile adhoc networks- a secure and efficient key management scheme






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180737</link>
        
       <description><![CDATA[









	   <p>By Mahmood, Syed Azhar  ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . xi,72, p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180737">Place Hold on <em>Mobile adhoc networks- a secure and efficient key management scheme</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180737</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Enhancement of security framework for mobile agent based intrusion detection system






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180744</link>
        
       <description><![CDATA[









	   <p>By Aslam , Lieut Commander Muhammad   ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2009
                        . viii, 51,p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180744">Place Hold on <em>Enhancement of security framework for mobile agent based intrusion detection system</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180744</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Protecting network services by large-scale simulation of hybrid-interaction decoys






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180756</link>
        
       <description><![CDATA[









	   <p>By Masood, Syed Yasir  ( MSIS-4). 
	   Rawalpindi MCS (NUST) 2008
                        . ix,44 ,p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180756">Place Hold on <em>Protecting network services by large-scale simulation of hybrid-interaction decoys</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180756</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Factoring RSA public key (integers) and the effect of using different polynomial selection methods on general number field sieve (GNFS) algorithm






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180884</link>
        
       <description><![CDATA[









	   <p>By Ahmed, Waqas   (MSIS-4). 
	   Rawalpindi MCS (NUST) 2007
                        . vii, 53 ,p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=180884">Place Hold on <em>Factoring RSA public key (integers) and the effect of using different polynomial selection methods on general number field sieve (GNFS) algorithm</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=180884</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Analysis of IEEE 802.11 standard From Security Standpoint and Finding Solution To PS-poll based DOS Attack






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=188782</link>
        
       <description><![CDATA[









	   <p>By Qureshi,Zaffar Iqbal  (MSIS-4 ). 
	   Rawalpindi MCS (NUST) 2009
                        . xv,89;p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=188782">Place Hold on <em>Analysis of IEEE 802.11 standard From Security Standpoint and Finding Solution To PS-poll based DOS Attack</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=188782</guid>
     </item>
	 
   </channel>
</rss>





