|   | Linux administration : a beginners guide | Wale Soyinka | 005.43 / S O Y | 2014 | 
		|   | Programming in Visual Basic Version 6.0 | Julia Case Bradley 
Anita C Millspaugh | 005.2 / B R A | 2012 | 
		|   | Computer Fundamentals: Concepts, Systems and Applications | Pradeep Sinha 
priti Sinha | 004 / S I N | 2011 | 
		|   | Linux Device Drivers | Jonathan Corbet 
Alessandro Rubini 
Greg kroah Hartman | 005.43 / C O R | 2005 | 
		|   | ADO.NET: The complete reference | Michael Otey 
Denielle Otey | 005.133 / O T E | 2009 | 
		|   | iPhone and iPad App: 24_ Hour Trainer | Abhishek Mishra 
Gene Backlin | 004.16 / M I S | 2012 | 
		|   | Linux: The Complete Reference, Sixth Edition | Richard Petersen | 005.43 /  P E T | 2015 | 
		|   | Java 6 and J2EE 1.5 (Java EE5) |  | 005.133 / J A V | 2015 | 
		|   | Red Hat Linux Networking and system Administration | Terry Collings 
Terry Wall | 005.43 / C O L | 2015 | 
		|   | ++Obgect Oriented Programming with C | E Balagurusamy | 005.133 / B A L | 2013 | 
		|   | software testing consepts and tools (winRunner, QTP, LoadRunner, and TestDirector) | Nageswara Rao Pusuluri | 005.13 / P U S | 2015 | 
		|   | Software requirements and Estimation | Swapna Kishore 
Rajesh Naik | 005.1 / K I S | 2014 | 
		|   | SQL, PL/SQL the Programming Language of Oracle | Ivan Bayross | 005.133 / B A Y | 2015 | 
		|   | Software quality engineering : Testing, quality assurance, and quantifiable improvement | Jeff Tian | 005 / T I A | 2014 | 
		|   | Microsoft® Windows server 2008: The complete Reference | Danielle Ruest 
Nelson Ruest | 005.4 / R U E | 2014 | 
		|   | J2ME: The complete reference | James Keogh | 005.133 / k e o | 2014 | 
		|   | Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices | Alex Alexander | 364.168/A L E | 2022 | 
		|   | Alice & Bob learn application security | Tanya Janca | 005.3/J A N | 2021 | 
		|   | Design patterns for cloud native applications : patterns in practice using APIs, data, events, and streams | Kasun Indrasiri 
Sriskandarajah Suhothayan | 004.6782/I N D | 2021 | 
		|   | Security strategies in Windows platforms and applications | Michael G Solomon | 005.8/S O L | 2021 | 
		|   | Cryptography and network security | Joseph Alexander | 005.82/A L E | 2022 | 
		|   | Web Application Security : exploitation and countermeasures for modern web applications | Andrew Hoffman | 005.8/H O F | 2020 | 
		|   | Learning PHP, MySQL & JavaScript a step-by-step guide to creating dynamic websites | Robin Nixon | 005.2762/N I X | 2021 | 
		|   | Deep learning with Python : learn best practices of deep learning models with PyTorch | Nikhil Ketkar 
Jojo Moolayil | 005.133/K E T | 2021 | 
		|   | Embedded system design : embedded systems foundations of cyber-physical systems | Peter Marwedel | 621.3815/M A R | 2006 | 
		|   | Hacking connected cars : tactics, techniques, and procedures | Alissa Knight | 629.046/K N I | 2020 | 
		|   | New Frontiers in Artificial Intelligence |  | 006.3/N E W | 2022 | 
		|   | Explainable Al with Python | Leonida Gianfagna 
Antonio Di Cecco | 005.133/G I A | No.Y | 
		|   | Cyber Security | Markus Mack | 005.8/M A C | 2021 | 
		|   | The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity | Phil Quade | 005.8/Q U A | 2019 |