Search Results - "Shahid"

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Physiology by Shahid, Mohammad

    Published 2007
    Book
  2. 2

    Historical dictionary of Pakistan by Burki, Shahid Javed

    Published 2015
    Book
  3. 3

    Tip untuk menjadi pengacara majlis by Saidah Said

    Published 2011
    Book
  4. 4

    Pemurahnya Allah bersyukur hamba by Muhammad Shahid Talib 1938-

    Published 2014
    Book
  5. 5

    Pengajian asas feqah dan tauhid by Mohammad Shahid Talib

    Published 2002
    Book
  6. 6

    Etika islam dijalan raya

    Published 1997
    Book
  7. 7

    Asas aqidah mengesahkan ibadah

    Published 1997
    Book
  8. 8

    The rightful way of banking by Masood, Omar, Ghauri, Shahid M.K

    Published 2015
    Book
  9. 9

    Is there an Islamic problem? essays on Islamicate societies, the US, and Israel by M.Shahid Alam 1950-

    Published 2004
    Book
  10. 10

    Radiology MCQs for the new FRCR part 2A by Hussain, Shahid M., Latif, Sherif, Colley, Steve, Tattersall, Debbie

    Published 2006
    Book
  11. 11

    Antara kemurahan Allah dan kesyukuran hamba

    Published 1997
    Book
  12. 12
  13. 13

    Keupayaan laut menjadi sumber tenaga alternatif (diperbaharui) di Malaysia by Mohd Shahid Mazlan

    Published 2008
    Thesis Book
  14. 14

    The capital budgeting process version 1.0 by Klammer

    Published 2000
    Book
  15. 15

    Module the organizational role of management accounts version 1.0 by Keating

    Published 1997
    Book
  16. 16

    Ciri-ciri emisi bahan buangan perbandaran melalui pembakar mudah alih by Shahid Hj. Abdul Rahman

    Published 1999
    Thesis Book
  17. 17

    Mekanik getaran teori dan penggunaan by Tse, Francis S. (Francis Sing) 1919-

    Published 1999
    Book
  18. 18
  19. 19

    Security and privacy management, techniques, and protocols

    Published 2018
    Table of Contents: “…A lightweight authentication & encryption protocol for secure communications between resource limited devices without hardware modification : resource limited device authentication / Piotr Ksiazak, Letterkenny Institute of Technology, Ireland, Kevin Curran, Ulster University, United Kingdom -- Role of cryptography in security / Sarvesh Tanwar, Mody University of Science and Technology, Lakshmangarh, India, Anil Kumar, Mody University of Science & Technology, India -- Risk assessment in virtualization / Dev Pandey, Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalaya, India, Bharat Mishra, Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalya, India -- Metamorphic malware detection using minimal opcode statistical patterns / Mahmood Fazlali, Shahid Beheshti University, Iran, Islamic Republic of Iran -- False alarm reduction : a profiling mechanism and new research directions / Salima Hacini, Constantine University, Algeria, Zahia Guessoum, Pierre et Marie Curie University, France, Mohamed Cheikh, Lire Laboratory, Constantine2 University, Algeria -- Trust-based analytical models for secure wireless sensor networks / Aminu Usman, Auckland University of Technology, Nigeria, Jairo Gutierrez, Auckland University of Technology, New Zealand, New Zealand -- Intrusion detection systems alerts reduction new approach for forensics readiness / Aymen Akremi, Umm Al-Qura University, Saudi Arabia, Hassen Sallay, Umm Al-Qura University, Saudi Arabia, Mohsen Rouached, Sultanate Qabus University, Oman -- Security visualization extended review issues,classifications, validation methods,trends, extensions / Ferda Özdemir Sönmez, Middle East Technical University, Turkey, Banu Günel, Middle East Technical University, Turkey…”
    Book