| 
		Linux administration : a beginners guide | 
		Wale Soyinka  | 
		005.43 / S O Y  | 
		2014 | 
	
		
		 
		 | 
		Programming in Visual Basic Version 6.0 | 
		Julia Case Bradley 
Anita C Millspaugh  | 
		005.2 / B R A | 
		2012 | 
	
		
		 
		 | 
		Computer Fundamentals: Concepts, Systems and Applications | 
		Pradeep Sinha 
priti Sinha  | 
		004 / S I N | 
		2011 | 
	
		
		 
		 | 
		Linux Device Drivers  | 
		Jonathan Corbet 
Alessandro Rubini 
Greg kroah Hartman  | 
		005.43 / C O R  | 
		2005 | 
	
		
		 
		 | 
		ADO.NET: The complete reference  | 
		Michael Otey 
Denielle Otey  | 
		005.133 / O T E  | 
		2009 | 
	
		
		 
		 | 
		iPhone and iPad App: 24_ Hour Trainer | 
		Abhishek Mishra 
Gene Backlin  | 
		004.16 / M I S  | 
		2012 | 
	
		
		 
		 | 
		Linux: The Complete Reference, Sixth Edition | 
		Richard Petersen  | 
		005.43 /  P E T  | 
		2015 | 
	
		
		 
		 | 
		Java 6 and J2EE 1.5 (Java EE5)  | 
		 | 
		005.133 / J A V | 
		2015 | 
	
		
		 
		 | 
		Red Hat Linux Networking and system Administration  | 
		Terry Collings 
Terry Wall  | 
		005.43 / C O L  | 
		2015 | 
	
		
		 
		 | 
		++Obgect Oriented Programming with C  | 
		E Balagurusamy  | 
		005.133 / B A L | 
		2013 | 
	
		
		 
		 | 
		software testing consepts and tools (winRunner, QTP, LoadRunner, and TestDirector) | 
		Nageswara Rao Pusuluri  | 
		005.13 / P U S  | 
		2015 | 
	
		
		 
		 | 
		Software requirements and Estimation | 
		Swapna Kishore 
Rajesh Naik  | 
		005.1 / K I S  | 
		2014 | 
	
		
		 
		 | 
		SQL, PL/SQL the Programming Language of Oracle | 
		Ivan Bayross  | 
		005.133 / B A Y  | 
		2015 | 
	
		
		 
		 | 
		Software quality engineering : Testing, quality assurance, and quantifiable improvement | 
		Jeff Tian  | 
		005 / T I A | 
		2014 | 
	
		
		 
		 | 
		Microsoft® Windows server 2008: The complete Reference  | 
		Danielle Ruest 
Nelson Ruest  | 
		005.4 / R U E | 
		2014 | 
	
		
		 
		 | 
		J2ME: The complete reference  | 
		James Keogh  | 
		005.133 / k e o  | 
		2014 | 
	
		
		 
		 | 
		Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices | 
		Alex Alexander  | 
		364.168/A L E	 | 
		2022 | 
	
		
		 
		 | 
		 Alice & Bob learn application security | 
		Tanya Janca  | 
		005.3/J A N | 
		2021 | 
	
		
		 
		 | 
		Design patterns for cloud native applications : patterns in practice using APIs, data, events, and streams | 
		Kasun Indrasiri 
Sriskandarajah Suhothayan  | 
		004.6782/I N D | 
		2021 | 
	
		
		 
		 | 
		Security strategies in Windows platforms and applications | 
		Michael G Solomon  | 
		005.8/S O L | 
		2021 | 
	
		
		 
		 | 
		Cryptography and network security | 
		Joseph Alexander  | 
		005.82/A L E | 
		2022 | 
	
		
		 
		 | 
		Web Application Security : exploitation and countermeasures for modern web applications | 
		Andrew Hoffman  | 
		005.8/H O F | 
		2020 | 
	
		
		 
		 | 
		 Learning PHP, MySQL & JavaScript a step-by-step guide to creating dynamic websites | 
		Robin Nixon  | 
		005.2762/N I X | 
		2021 | 
	
		
		 
		 | 
		Deep learning with Python : learn best practices of deep learning models with PyTorch | 
		Nikhil Ketkar 
Jojo Moolayil  | 
		005.133/K E T | 
		2021 | 
	
		
		 
		 | 
		 Embedded system design : embedded systems foundations of cyber-physical systems | 
		Peter Marwedel  | 
		621.3815/M A R | 
		2006 | 
	
		
		 
		 | 
		 Hacking connected cars : tactics, techniques, and procedures | 
		Alissa Knight  | 
		629.046/K N I | 
		2020 | 
	
		
		 
		 | 
		New Frontiers in Artificial Intelligence | 
		 | 
		006.3/N E W | 
		2022 | 
	
		
		 
		 | 
		Explainable Al with Python | 
		Leonida Gianfagna 
Antonio Di Cecco  | 
		005.133/G I A | 
		No.Y | 
	
		
		 
		 | 
		Cyber Security | 
		Markus Mack  | 
		005.8/M A C | 
		2021 | 
	
		
		 
		 | 
		 The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity | 
		Phil Quade  | 
		005.8/Q U A | 
		2019 |