際際滷shows by User: zaranawaz315 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: zaranawaz315 / Fri, 04 Sep 2020 09:31:30 GMT 際際滷Share feed for 際際滷shows by User: zaranawaz315 Translation Look Aside buffer /slideshow/translation-look-aside-buffer/238392137 tlbfinalthemeapplied-200904093130
this slides contain the contents related to the subject operations system topic which is translation look aside buffer ]]>

this slides contain the contents related to the subject operations system topic which is translation look aside buffer ]]>
Fri, 04 Sep 2020 09:31:30 GMT /slideshow/translation-look-aside-buffer/238392137 zaranawaz315@slideshare.net(zaranawaz315) Translation Look Aside buffer zaranawaz315 this slides contain the contents related to the subject operations system topic which is translation look aside buffer <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tlbfinalthemeapplied-200904093130-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> this slides contain the contents related to the subject operations system topic which is translation look aside buffer
Translation Look Aside buffer from Zara Nawaz
]]>
591 0 https://cdn.slidesharecdn.com/ss_thumbnails/tlbfinalthemeapplied-200904093130-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
information security (network security methods) /slideshow/information-security-network-security-methods/238384395 week1-200903124657
this slides contains basic methods required for information security ]]>

this slides contains basic methods required for information security ]]>
Thu, 03 Sep 2020 12:46:57 GMT /slideshow/information-security-network-security-methods/238384395 zaranawaz315@slideshare.net(zaranawaz315) information security (network security methods) zaranawaz315 this slides contains basic methods required for information security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/week1-200903124657-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> this slides contains basic methods required for information security
information security (network security methods) from Zara Nawaz
]]>
111 1 https://cdn.slidesharecdn.com/ss_thumbnails/week1-200903124657-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
information security(Public key encryption its characteristics and weakness, Diffie-Hellman Algorithm with example ) /slideshow/information-securitypublic-key-encryption-its-characteristics-and-weakness-diffiehellman-algorithm-with-example/238384394 week5-200903124634
these slides of information security contains Public key encryption its characteristics and weakness its applications and Diffie-Hellman Algorithm with example ]]>

these slides of information security contains Public key encryption its characteristics and weakness its applications and Diffie-Hellman Algorithm with example ]]>
Thu, 03 Sep 2020 12:46:34 GMT /slideshow/information-securitypublic-key-encryption-its-characteristics-and-weakness-diffiehellman-algorithm-with-example/238384394 zaranawaz315@slideshare.net(zaranawaz315) information security(Public key encryption its characteristics and weakness, Diffie-Hellman Algorithm with example ) zaranawaz315 these slides of information security contains Public key encryption its characteristics and weakness its applications and Diffie-Hellman Algorithm with example <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/week5-200903124634-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> these slides of information security contains Public key encryption its characteristics and weakness its applications and Diffie-Hellman Algorithm with example
information security(Public key encryption its characteristics and weakness, Diffie-Hellman Algorithm with example ) from Zara Nawaz
]]>
64 0 https://cdn.slidesharecdn.com/ss_thumbnails/week5-200903124634-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
information security(Feistal Cipher) /slideshow/information-securityfeistal-cipher/238384392 week4-200903124623
this slides conatins symmetric key cryptography, feistel cipher, its encryption process and different rounds ]]>

this slides conatins symmetric key cryptography, feistel cipher, its encryption process and different rounds ]]>
Thu, 03 Sep 2020 12:46:23 GMT /slideshow/information-securityfeistal-cipher/238384392 zaranawaz315@slideshare.net(zaranawaz315) information security(Feistal Cipher) zaranawaz315 this slides conatins symmetric key cryptography, feistel cipher, its encryption process and different rounds <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/week4-200903124623-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> this slides conatins symmetric key cryptography, feistel cipher, its encryption process and different rounds
information security(Feistal Cipher) from Zara Nawaz
]]>
38 0 https://cdn.slidesharecdn.com/ss_thumbnails/week4-200903124623-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Information security (Symmetric encryption, cryptography, crypto-analysis) /zaranawaz315/information-security-symmetric-encryption-cryptography-cryptoanalysis week3-200903124606
These slides contains contents of symmetric and asymmetric key encryption and its further types ]]>

These slides contains contents of symmetric and asymmetric key encryption and its further types ]]>
Thu, 03 Sep 2020 12:46:06 GMT /zaranawaz315/information-security-symmetric-encryption-cryptography-cryptoanalysis zaranawaz315@slideshare.net(zaranawaz315) Information security (Symmetric encryption, cryptography, crypto-analysis) zaranawaz315 These slides contains contents of symmetric and asymmetric key encryption and its further types <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/week3-200903124606-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> These slides contains contents of symmetric and asymmetric key encryption and its further types
Information security (Symmetric encryption, cryptography, crypto-analysis) from Zara Nawaz
]]>
40 0 https://cdn.slidesharecdn.com/ss_thumbnails/week3-200903124606-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
information security(authentication application, Authentication and Access Control and ACLs ) /slideshow/information-securityauthentication-application-authentication-and-access-control-and-acls/238384273 week10and11-200903122049
these slides contains information security contents related to the authentication application, Authentication and Access Control and ACLs ]]>

these slides contains information security contents related to the authentication application, Authentication and Access Control and ACLs ]]>
Thu, 03 Sep 2020 12:20:49 GMT /slideshow/information-securityauthentication-application-authentication-and-access-control-and-acls/238384273 zaranawaz315@slideshare.net(zaranawaz315) information security(authentication application, Authentication and Access Control and ACLs ) zaranawaz315 these slides contains information security contents related to the authentication application, Authentication and Access Control and ACLs <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/week10and11-200903122049-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> these slides contains information security contents related to the authentication application, Authentication and Access Control and ACLs
information security(authentication application, Authentication and Access Control and ACLs ) from Zara Nawaz
]]>
130 0 https://cdn.slidesharecdn.com/ss_thumbnails/week10and11-200903122049-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
information security (Audit mechanism, intrusion detection, password management, and security)) /slideshow/information-security-audit-mechanism-intrusion-detection-password-management-and-security/238384153 week12and13-200903115540
this slides contains the contents of Audit mechanism, intrusion detection, password management, general principals of system security and IP security ]]>

this slides contains the contents of Audit mechanism, intrusion detection, password management, general principals of system security and IP security ]]>
Thu, 03 Sep 2020 11:55:40 GMT /slideshow/information-security-audit-mechanism-intrusion-detection-password-management-and-security/238384153 zaranawaz315@slideshare.net(zaranawaz315) information security (Audit mechanism, intrusion detection, password management, and security)) zaranawaz315 this slides contains the contents of Audit mechanism, intrusion detection, password management, general principals of system security and IP security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/week12and13-200903115540-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> this slides contains the contents of Audit mechanism, intrusion detection, password management, general principals of system security and IP security
information security (Audit mechanism, intrusion detection, password management, and security)) from Zara Nawaz
]]>
177 0 https://cdn.slidesharecdn.com/ss_thumbnails/week12and13-200903115540-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Information Security (Malicious Software) /zaranawaz315/information-security-malicious-software week15-200903114906
this slides contains the contents related to malicious software. physical threats, legal and ethical issues in information security ]]>

this slides contains the contents related to malicious software. physical threats, legal and ethical issues in information security ]]>
Thu, 03 Sep 2020 11:49:06 GMT /zaranawaz315/information-security-malicious-software zaranawaz315@slideshare.net(zaranawaz315) Information Security (Malicious Software) zaranawaz315 this slides contains the contents related to malicious software. physical threats, legal and ethical issues in information security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/week15-200903114906-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> this slides contains the contents related to malicious software. physical threats, legal and ethical issues in information security
Information Security (Malicious Software) from Zara Nawaz
]]>
143 0 https://cdn.slidesharecdn.com/ss_thumbnails/week15-200903114906-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Information Security (Firewall) /slideshow/information-security-firewall/238383246 week16-200903100010
This slides contains about the topics of information security which is firewall and its types in details and security controls ]]>

This slides contains about the topics of information security which is firewall and its types in details and security controls ]]>
Thu, 03 Sep 2020 10:00:10 GMT /slideshow/information-security-firewall/238383246 zaranawaz315@slideshare.net(zaranawaz315) Information Security (Firewall) zaranawaz315 This slides contains about the topics of information security which is firewall and its types in details and security controls <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/week16-200903100010-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This slides contains about the topics of information security which is firewall and its types in details and security controls
Information Security (Firewall) from Zara Nawaz
]]>
90 0 https://cdn.slidesharecdn.com/ss_thumbnails/week16-200903100010-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Information security ist lecture /slideshow/information-security-ist-lecture/238376932 informationsecurityistlecture-200903060522
These slides contains Information Security first lecture with the contents of Network security and its methods ]]>

These slides contains Information Security first lecture with the contents of Network security and its methods ]]>
Thu, 03 Sep 2020 06:05:22 GMT /slideshow/information-security-ist-lecture/238376932 zaranawaz315@slideshare.net(zaranawaz315) Information security ist lecture zaranawaz315 These slides contains Information Security first lecture with the contents of Network security and its methods <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/informationsecurityistlecture-200903060522-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> These slides contains Information Security first lecture with the contents of Network security and its methods
Information security ist lecture from Zara Nawaz
]]>
92 0 https://cdn.slidesharecdn.com/ss_thumbnails/informationsecurityistlecture-200903060522-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Lecture01 algorithm analysis /slideshow/lecture01-algorithm-analysis/238376841 lecture01algorithmanalysis-200903060008
This slides contains contents of introduction of Algorithm and Analysis ]]>

This slides contains contents of introduction of Algorithm and Analysis ]]>
Thu, 03 Sep 2020 06:00:08 GMT /slideshow/lecture01-algorithm-analysis/238376841 zaranawaz315@slideshare.net(zaranawaz315) Lecture01 algorithm analysis zaranawaz315 This slides contains contents of introduction of Algorithm and Analysis <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/lecture01algorithmanalysis-200903060008-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This slides contains contents of introduction of Algorithm and Analysis
Lecture01 algorithm analysis from Zara Nawaz
]]>
85 0 https://cdn.slidesharecdn.com/ss_thumbnails/lecture01algorithmanalysis-200903060008-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Information Security (Digital Signatures) /slideshow/information-security-digital-signatures/238376744 week9-200903055309
Digital Signature in Information Security ]]>

Digital Signature in Information Security ]]>
Thu, 03 Sep 2020 05:53:09 GMT /slideshow/information-security-digital-signatures/238376744 zaranawaz315@slideshare.net(zaranawaz315) Information Security (Digital Signatures) zaranawaz315 Digital Signature in Information Security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/week9-200903055309-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Digital Signature in Information Security
Information Security (Digital Signatures) from Zara Nawaz
]]>
652 0 https://cdn.slidesharecdn.com/ss_thumbnails/week9-200903055309-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/tlbfinalthemeapplied-200904093130-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/translation-look-aside-buffer/238392137 Translation Look Aside... https://cdn.slidesharecdn.com/ss_thumbnails/week1-200903124657-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/information-security-network-security-methods/238384395 information security (... https://cdn.slidesharecdn.com/ss_thumbnails/week5-200903124634-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/information-securitypublic-key-encryption-its-characteristics-and-weakness-diffiehellman-algorithm-with-example/238384394 information security(P...