|
Linux administration : a beginners guide |
Wale Soyinka |
005.43 / S O Y |
2014 |
|
Programming in Visual Basic Version 6.0 |
Julia Case Bradley
Anita C Millspaugh |
005.2 / B R A |
2012 |
|
Computer Fundamentals: Concepts, Systems and Applications |
Pradeep Sinha
priti Sinha |
004 / S I N |
2011 |
|
Linux Device Drivers |
Jonathan Corbet
Alessandro Rubini
Greg kroah Hartman |
005.43 / C O R |
2005 |
|
ADO.NET: The complete reference |
Michael Otey
Denielle Otey |
005.133 / O T E |
2009 |
|
iPhone and iPad App: 24_ Hour Trainer |
Abhishek Mishra
Gene Backlin |
004.16 / M I S |
2012 |
|
Linux: The Complete Reference, Sixth Edition |
Richard Petersen |
005.43 / P E T |
2015 |
|
Java 6 and J2EE 1.5 (Java EE5) |
|
005.133 / J A V |
2015 |
|
Red Hat Linux Networking and system Administration |
Terry Collings
Terry Wall |
005.43 / C O L |
2015 |
|
++Obgect Oriented Programming with C |
E Balagurusamy |
005.133 / B A L |
2013 |
|
software testing consepts and tools (winRunner, QTP, LoadRunner, and TestDirector) |
Nageswara Rao Pusuluri |
005.13 / P U S |
2015 |
|
Software requirements and Estimation |
Swapna Kishore
Rajesh Naik |
005.1 / K I S |
2014 |
|
SQL, PL/SQL the Programming Language of Oracle |
Ivan Bayross |
005.133 / B A Y |
2015 |
|
Software quality engineering : Testing, quality assurance, and quantifiable improvement |
Jeff Tian |
005 / T I A |
2014 |
|
Microsoft® Windows server 2008: The complete Reference |
Danielle Ruest
Nelson Ruest |
005.4 / R U E |
2014 |
|
J2ME: The complete reference |
James Keogh |
005.133 / k e o |
2014 |
|
Cybercrime and Information technology : theory and practice -the computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices |
Alex Alexander |
364.168/A L E |
2022 |
|
Alice & Bob learn application security |
Tanya Janca |
005.3/J A N |
2021 |
|
Design patterns for cloud native applications : patterns in practice using APIs, data, events, and streams |
Kasun Indrasiri
Sriskandarajah Suhothayan |
004.6782/I N D |
2021 |
|
Security strategies in Windows platforms and applications |
Michael G Solomon |
005.8/S O L |
2021 |
|
Cryptography and network security |
Joseph Alexander |
005.82/A L E |
2022 |
|
Web Application Security : exploitation and countermeasures for modern web applications |
Andrew Hoffman |
005.8/H O F |
2020 |
|
Learning PHP, MySQL & JavaScript a step-by-step guide to creating dynamic websites |
Robin Nixon |
005.2762/N I X |
2021 |
|
Deep learning with Python : learn best practices of deep learning models with PyTorch |
Nikhil Ketkar
Jojo Moolayil |
005.133/K E T |
2021 |
|
Embedded system design : embedded systems foundations of cyber-physical systems |
Peter Marwedel |
621.3815/M A R |
2006 |
|
Hacking connected cars : tactics, techniques, and procedures |
Alissa Knight |
629.046/K N I |
2020 |
|
New Frontiers in Artificial Intelligence |
|
006.3/N E W |
2022 |
|
Explainable Al with Python |
Leonida Gianfagna
Antonio Di Cecco |
005.133/G I A |
No.Y |
|
Cyber Security |
Markus Mack |
005.8/M A C |
2021 |
|
The digital big bang : the hard stuff, the soft stuff, and the future of cybersecurity |
Phil Quade |
005.8/Q U A |
2019 |