Search or add a thesis

Advanced Search (Beta)
Home > عہدِ بنی اُمیہ میں خواتین کی علمی سرگرمیاں

عہدِ بنی اُمیہ میں خواتین کی علمی سرگرمیاں

Thesis Info

Author

مسرت سلطانہ

Supervisor

امان اللہ خان

Program

MA

Institute

University of the Punjab

City

لاہور

Degree Starting Year

1965

Language

Urdu

Keywords

تاریخ اسلام، دورِ بنی اُمیہ

Added

2023-02-16 17:15:59

Modified

2023-02-16 17:33:40

ARI ID

1676730427744

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

۹-اي

-اي

"فِي أَىِّ صُورَةٍ مَّا شَآءَ رَكَّبَكَ"۔ [[1]]

"اور جس صورت میں چاہا تجھ کو جوڑ کر تیار کیا؟"۔



[[1]]     القرآن ، ۸۲: ۸۔

Historical Contribution of Islamic Waqf in Human Capital Development Through Funding Education

Islam being a complete code of life encompasses all aspects of a person’s personal and social life. Islam considers those as Muslims who submit to the will of Allah Almighty in all aspects of life. Islam is not merely a matter of private life and its worship system is not restricted only to a set of rituals, but has pervasive social consequences and develops a strong sense of moral society based on system of rules around center of universal concept of justice. Therefore, Islam proposed institutions with relation to justice, governance, cooperation and solidarity for achieving high economic growth and development. Achievement of development and growth of economy is fast in a society or country if it has developed human capital (human resource). Human capital is developed when education is imparted and facilities of health and sound life are provided to human beings. According to Islamic principles, if human beings cannot afford proper education in the society (or other facilities such as health care) then those who are well off endow their properties in Zakat, Awqaf (plural of waqf) and Charities for their better development and nourishment. These properties when endowed as Awqaf are deployed for propagation of education (knowledge, skills, training etc.) by establishing Madrassas (schools, maktabs, colleges, universities etc.) libraries, translating books, and conducting research. In Islamic society there were many Awqaf founded for establishing Madrassas. This paper is dedicated to discuss the development of human capital through education funded by Islamic Awqaf by reviewing literature.

Real Time Vulnerability Assessment of Wlan and its Digital Forensics

Wireless local area network (WLAN) has changed the paradigm of communication and become ubiquitous. As the number of devices connected on wireless is increasing, it is therefore, essential to find vulnerabilities in the security of wireless networks. In this research, WLAN security vulnerabilities are exposed in real time and digital forensics of WLAN for Windows and Android operating system-based clients are conducted. A real time wardriving was conducted in a residential area to emphasize the fact that WLAN broadcast sensitive information. The results of wardriving showed that 97% of WLAN access points (AP) were using WPA2. According to the data collected it was found that channel 11 and channel 1 were used by 52% WLAN APs and the average number of clients per AP was 1.59. Tenda WiFi wireless access point was set up with MAC filtering, hidden SSID and WPA2 security mechanisms in different combinations in such a way as to add an additional layer of security to previous configuration. The vulnerability assessment of security mechanisms of residential AP was performed with Kali Linux version 2017.1. A practical demonstration of exploiting MAC filtering, Hidden SSID with MAC filtering and WPA2-PSK with hidden SSID and MAC filtering security mechanisms of AP was carried out in real time. It was observed that the existing security mechanisms were vulnerable. Furthermore, the digital traces left behind or stored in 802.11 based devices were also explored in order to investigate wireless network attacks. Researchers have proposed probabilistic models for detecting MAC spoofing attacks of WLAN clients. However, in this research, a live forensic method based on changing position of legitimate client with respect to attack detector and observing received signal strength of wireless packets to detect MAC filtering bypass attack was proposed. De-authentication attacks on wireless networks were also detected. This thesis also explored the methods of finding WLAN artifacts from Windows and Android OS devices to determine whether a particular device was connected to an unauthorized wireless network or not. Researchers have exploited many security mechanisms of WLAN focusing upon a single parameter of WLAN security at a time. However, in this work, three available security mechanisms were cascaded to produce a three-layer security mechanism which was exploited in real-time.