Al Istiqlal Library

SEARCH_RESULTS:

BOOK_NAME AUTHOR CLASS_CODE YOFP
Linux administration : a beginners guide 005.43 / S O Y
Programming in Visual Basic Version 6.0 005.2 / B R A
Computer Fundamentals: Concepts, Systems and Applications 004 / S I N
Linux Device Drivers 005.43 / C O R
ADO.NET: The complete reference 005.133 / O T E
iPhone and iPad App: 24_ Hour Trainer 004.16 / M I S
Linux: The Complete Reference, Sixth Edition 005.43 / P E T
Java 6 and J2EE 1.5 (Java EE5) 005.133 / J A V
Red Hat Linux Networking and system Administration 005.43 / C O L
++Obgect Oriented Programming with C 005.133 / B A L
software testing consepts and tools (winRunner, QTP, LoadRunner, and TestDirector) 005.13 / P U S
Software requirements and Estimation 005.1 / K I S
SQL, PL/SQL the Programming Language of Oracle 005.133 / B A Y
Software quality engineering : Testing, quality assurance, and quantifiable improvement 005 / T I A
Microsoft® Windows server 2008: The complete Reference 005.4 / R U E
J2ME: The complete reference 005.133 / k e o
Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices 364.168/A L E
Alice & Bob learn application security 005.3/J A N
Design patterns for cloud native applications : patterns in practice using APIs, data, events, and streams 004.6782/I N D
Security strategies in Windows platforms and applications 005.8/S O L
Cryptography and network security 005.82/A L E
Web Application Security : exploitation and countermeasures for modern web applications 005.8/H O F
Learning PHP, MySQL & JavaScript a step-by-step guide to creating dynamic websites 005.2762/N I X
Deep learning with Python : learn best practices of deep learning models with PyTorch 005.133/K E T
Embedded system design : embedded systems foundations of cyber-physical systems 621.3815/M A R
Hacking connected cars : tactics, techniques, and procedures 629.046/K N I
New Frontiers in Artificial Intelligence 006.3/N E W
Explainable Al with Python 005.133/G I A
Cyber Security 005.8/M A C
The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity 005.8/Q U A
COPYRIGHT Al Istiqlal Library © 2007-2024