Search or add a thesis

Advanced Search (Beta)
Home > The Impact of Eighth Constitutional Amendment on Politics in Pakistan

The Impact of Eighth Constitutional Amendment on Politics in Pakistan

Thesis Info

Author

Muhammad Amin

Department

Pakistan Study Centre

Program

MA

Institute

University of Peshawar

Institute Type

Public

City

Peshawar

Country

Pakistan

Degree Starting Year

1994

Degree End Year

1996

Subject

Pak Studies

Language

English

Added

2021-02-17 19:49:13

Modified

2023-01-06 19:20:37

ARI ID

1676710710142

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

1. پروفیسر عبد الحق بہ طور ماہر اقبالیات

. پروفیسر عبد الحق بہ طور ماہر اقبالیات
پروفیسر عبد الحق کی سب سے پہلی اور نمایاں حیثیت ماہر اقبالیات کی ہے۔ آپ اس بات پر پختہ یقین رکھتے ہیں کہ :
اقبال فن کی تحسین و تخلیق میں بڑی بزرگی کے مالک ہیں ۔ (1)
ان کا علمی اور تحقیقی مقالہ اقبالیات ہی کے حوالہ سے ہے۔ آپ نے پی ۔ایچ ۔ڈی کے مقالے میں اقبال کے ابتدائی کلام کی چھان پھٹک اور اس کے ذریعہ سے اقبال کے افکار کا تجربہ کیا جوان کی بنیادی شناخت بن گیا۔ اقبال کی شاعری میں نعتیہ کلام پر روشنی ڈالتے ہوئے آپ کہتے ہیں:
اقبال کی حکیمانہ نکات آفرینی نے نعت گوئی کو نئے امکانی جہات سے آشنا کیا ہے۔ ان کے کچھ اشعار تو نعت گوئی میں ضرب الامثال کی حیثیت رکھتے ہیں (2)
انھوں نے اقبالیات کے حوالہ سے کئی کتب کی اشاعت کا کام کیا۔ اقبال کی شاعری میں پوشیدہ پہلوؤں کی نشاندہی کی اور فکر اقبال کی تفسیر و تعبیر پیش کرنے میں گراں قدر خدمات سر انجام دیں۔ کلامِ اقبال کی فنی خوبیوں پر قلم اٹھایا اور عوام الناس کو فکر اقبال کے نئے گوشوں پر گامزن کیا۔ لکھتے ہیں۔
اقبال کی نظم تخلیقی تفاعل کی عروج وانتہا ہے فنِ شعر کا معجزہ بھی (3)
پروفیسر عبد الحق اقبالیات کا گہرا مطالعہ رکھتے ہیں۔ اقبال نے اجتہاد کے لیے راہوں کی نشا ن دہدی کی وہ اقبال کی فہم و فراست کا منہ بولتا ثبوت ہے۔ اس کا اوراک بھی اتنا ہی اہم ہے جتنا کہ اجتہادی نقطہ نظر خود اہمیت کا حامل ہے۔ اقبال فکری تاریخ میں امتیازی حیثیت رکھتے ہیں اور اجتہادی فکر و نظر انہیں تمام مفکرین سے منفرد بنا دیتی ہے۔ پروفیسر عبد الحق اس پہلو کواس انداز سے بیان کرتے ہیں کہ:
اقبال ہماری فکری تاریخ میں...

تعمیر شخصیت کے بنیادی اصول قرآن و سنت کی روشنی میں

Considering the context of this sermon one can see how Hazrat has adapted to the general tendencies of society. Where people are completely immersed in worldlinees. Today our situation is that every one is engaged in the pursuit of wealth and the worldliness has become the target of all. Hazrat Ali (RA) introduced the Quran as a guide in such a case. Calling Quran the book of life, he called it a solution of all the problems of the human society.

Real Time Vulnerability Assessment of Wlan and its Digital Forensics

Wireless local area network (WLAN) has changed the paradigm of communication and become ubiquitous. As the number of devices connected on wireless is increasing, it is therefore, essential to find vulnerabilities in the security of wireless networks. In this research, WLAN security vulnerabilities are exposed in real time and digital forensics of WLAN for Windows and Android operating system-based clients are conducted. A real time wardriving was conducted in a residential area to emphasize the fact that WLAN broadcast sensitive information. The results of wardriving showed that 97% of WLAN access points (AP) were using WPA2. According to the data collected it was found that channel 11 and channel 1 were used by 52% WLAN APs and the average number of clients per AP was 1.59. Tenda WiFi wireless access point was set up with MAC filtering, hidden SSID and WPA2 security mechanisms in different combinations in such a way as to add an additional layer of security to previous configuration. The vulnerability assessment of security mechanisms of residential AP was performed with Kali Linux version 2017.1. A practical demonstration of exploiting MAC filtering, Hidden SSID with MAC filtering and WPA2-PSK with hidden SSID and MAC filtering security mechanisms of AP was carried out in real time. It was observed that the existing security mechanisms were vulnerable. Furthermore, the digital traces left behind or stored in 802.11 based devices were also explored in order to investigate wireless network attacks. Researchers have proposed probabilistic models for detecting MAC spoofing attacks of WLAN clients. However, in this research, a live forensic method based on changing position of legitimate client with respect to attack detector and observing received signal strength of wireless packets to detect MAC filtering bypass attack was proposed. De-authentication attacks on wireless networks were also detected. This thesis also explored the methods of finding WLAN artifacts from Windows and Android OS devices to determine whether a particular device was connected to an unauthorized wireless network or not. Researchers have exploited many security mechanisms of WLAN focusing upon a single parameter of WLAN security at a time. However, in this work, three available security mechanisms were cascaded to produce a three-layer security mechanism which was exploited in real-time.