Your search returned 3 results.

Not what you expected? Check for suggestions
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters.

by Ligh, Michael Hale | Case, Andrew (Digital forensics researcher) | Levy, Jamie | Walters, Aaron.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Other title: Detecting malware and threats in Windows, Linux, and Mac memory.Online access: Contributor biographical information | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 004.5028558 LIG (2).
Big data systems / Jawwad Ahmad Shamsi, Muhammad AlI Khojaye.

by Shamsi, Jawwad Ahmad [author.] | Khojaye, Muhammad AlI [author.].

Edition: First edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: Central Library (CL)Call number: 005.7 SHA (1).
Traffic Signal Control using Reinforcement Learning / Qazi Umer Jamil

by Umer Jamil, Qazi | Supervisor : Dr. Karam Dad Kallu.

Material type: Text Text Islamabad : SMME- NUST; 2023Online access: Click here to access online Availability: Items available for loan: School of Mechanical & Manufacturing Engineering (SMME)Call number: 629.8 (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.