際際滷shows by User: Iqrakhalil2 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: Iqrakhalil2 / Fri, 25 Jan 2019 21:18:05 GMT 際際滷Share feed for 際際滷shows by User: Iqrakhalil2 Object Oriented Programming /slideshow/object-oriented-programming-129281522/129281522 oop-190125211805
This presentation deals with pure object oriented concepts and defines basic principles of OOP's like Encapsulation , polymorphism , Inheritance and Abstraction.]]>

This presentation deals with pure object oriented concepts and defines basic principles of OOP's like Encapsulation , polymorphism , Inheritance and Abstraction.]]>
Fri, 25 Jan 2019 21:18:05 GMT /slideshow/object-oriented-programming-129281522/129281522 Iqrakhalil2@slideshare.net(Iqrakhalil2) Object Oriented Programming Iqrakhalil2 This presentation deals with pure object oriented concepts and defines basic principles of OOP's like Encapsulation , polymorphism , Inheritance and Abstraction. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oop-190125211805-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation deals with pure object oriented concepts and defines basic principles of OOP&#39;s like Encapsulation , polymorphism , Inheritance and Abstraction.
Object Oriented Programming from Iqra khalil
]]>
40039 1 https://cdn.slidesharecdn.com/ss_thumbnails/oop-190125211805-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cognitive security /slideshow/cognitive-security-75527618/75527618 cognitivesecurity-170429154400
This presentation is about the new think of security analysis.this presents the cognitive security introduced by IBM.]]>

This presentation is about the new think of security analysis.this presents the cognitive security introduced by IBM.]]>
Sat, 29 Apr 2017 15:43:59 GMT /slideshow/cognitive-security-75527618/75527618 Iqrakhalil2@slideshare.net(Iqrakhalil2) Cognitive security Iqrakhalil2 This presentation is about the new think of security analysis.this presents the cognitive security introduced by IBM. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cognitivesecurity-170429154400-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is about the new think of security analysis.this presents the cognitive security introduced by IBM.
Cognitive security from Iqra khalil
]]>
1107 3 https://cdn.slidesharecdn.com/ss_thumbnails/cognitivesecurity-170429154400-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
White box crytography in an insecure enviroment /slideshow/white-box-crytography-in-an-insecure-enviroment/75053903 wb-presentation-170415205247
This presentation depicts the technique of whitebox cryptography which prevent the attacker to extraction of secret key]]>

This presentation depicts the technique of whitebox cryptography which prevent the attacker to extraction of secret key]]>
Sat, 15 Apr 2017 20:52:46 GMT /slideshow/white-box-crytography-in-an-insecure-enviroment/75053903 Iqrakhalil2@slideshare.net(Iqrakhalil2) White box crytography in an insecure enviroment Iqrakhalil2 This presentation depicts the technique of whitebox cryptography which prevent the attacker to extraction of secret key <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wb-presentation-170415205247-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation depicts the technique of whitebox cryptography which prevent the attacker to extraction of secret key
White box crytography in an insecure enviroment from Iqra khalil
]]>
857 6 https://cdn.slidesharecdn.com/ss_thumbnails/wb-presentation-170415205247-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Correlation Associativity b/w Sensor Information Network Architecture & Software Define Wireless Network via MWSN , MANETS , VANETS /slideshow/correlation-associativity-bw-sensor-information-network-architecture-software-define-wireless-network-via-mwsn-manets-vanets/74771168 experimentaltopic-170409211326
In this presentation.depicts the role of SINA and SDN in the adhoc environment.]]>

In this presentation.depicts the role of SINA and SDN in the adhoc environment.]]>
Sun, 09 Apr 2017 21:13:25 GMT /slideshow/correlation-associativity-bw-sensor-information-network-architecture-software-define-wireless-network-via-mwsn-manets-vanets/74771168 Iqrakhalil2@slideshare.net(Iqrakhalil2) Correlation Associativity b/w Sensor Information Network Architecture & Software Define Wireless Network via MWSN , MANETS , VANETS Iqrakhalil2 In this presentation.depicts the role of SINA and SDN in the adhoc environment. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/experimentaltopic-170409211326-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation.depicts the role of SINA and SDN in the adhoc environment.
Correlation Associativity b/w Sensor Information Network Architecture & Software Define Wireless Network via MWSN , MANETS , VANETS from Iqra khalil
]]>
305 4 https://cdn.slidesharecdn.com/ss_thumbnails/experimentaltopic-170409211326-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Distributed System /slideshow/distributed-system-69737870/69737870 presentation-161201202511
Distributed database using RMI and JDBC. ]]>

Distributed database using RMI and JDBC. ]]>
Thu, 01 Dec 2016 20:25:10 GMT /slideshow/distributed-system-69737870/69737870 Iqrakhalil2@slideshare.net(Iqrakhalil2) Distributed System Iqrakhalil2 Distributed database using RMI and JDBC. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-161201202511-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Distributed database using RMI and JDBC.
Distributed System from Iqra khalil
]]>
1562 3 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-161201202511-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Iqrakhalil2-48x48.jpg?cb=1599554737 https://cdn.slidesharecdn.com/ss_thumbnails/oop-190125211805-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/object-oriented-programming-129281522/129281522 Object Oriented Progra... https://cdn.slidesharecdn.com/ss_thumbnails/cognitivesecurity-170429154400-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cognitive-security-75527618/75527618 Cognitive security https://cdn.slidesharecdn.com/ss_thumbnails/wb-presentation-170415205247-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/white-box-crytography-in-an-insecure-enviroment/75053903 White box crytography ...