Your search returned 10 results.

Not what you expected? Check for suggestions
Internet cookies-threats to privacy, consequences and their remedial measures Junaid Mairaj

by Mairaj, Junaid (MSIS-2).

Publisher: Rawalpindi MCS (NUST) 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MAI (2).
Securing the GPRS network (Hard / Soft-copy) Imran Ishaq

by Imran Ishaq (MSIS-2).

Publisher: Rawalpindi MCS (NUST) January, 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ISH (2).
Analyzing the effectiveness of IEEE 802.11 wireless LAN standard's security mechanism Muhammad Umar Ilyas

by Ilyas, Muhammad Umar (MSIS-2).

Publisher: Rawalpindi MCS (NUST) 2006Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 UMA (1).
Techniques of physical side channel crypt analysis Atiqur Rehman

by Rehman, Atiqur ( MSIS-2).

Publisher: Rawalpindi MCS (NUST) 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 REH (2).
Authentication in multi hop wireless mesh networks Kaleemullah Khan

by Khan, Kaleemullah (MSIS-2).

Publisher: Rawalpindi MCS (NUST) Jan, 2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 KHA (2).
Evaluation of different symmetric key cryptographic algorithms and design a new data encryption algorithm Syed Tahir Hussain Shah

by Shah, Syed Tahir Hussain (MSIS-2).

Publisher: Rawalpindi MCS (NUST) February, 2006Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 TAH (2).
Performance analysis of ipsec in wired and wireless networks Anwer Ali

by Ali, Anwer (MSIS-2).

Publisher: Rawalpindi MCS (NUST) April, 2007Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ALI (2).
Designing of a software tool for cryptographic analysis of speech compression algorithm celp Jamil Ahmad Zia

by Zia, Jamil Ahmad (MSIS-2).

Publisher: Rawalpindi MCS (NUST) Oct, 2003Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AHM (2).
Context and role based access control model of an educational system Muhammad Luqman Dar

by Dar, Muhammad Luqman (MSIS-2).

Publisher: Rawalpindi MCS (NUST) Feb. 2008Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 DAR (2).
Study and implementation of IP encapsulating security payload (ESP) in tunnel mode Majid Ameen

by Ameen, Majid ( MSIS-02).

Publisher: Rawalpindi MCS (NUST) 2004Availability: Items available for loan: (2).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.