|
1.
|
Computer organization
by Hamacher, Carl. Edition: 5thPublisher: New Delhi ; McGraw-Hill ; 2002Availability: Items available for loan: [Call number: 004.22 HAM] (5). Items available for reference: [Call number: 004.22 HAM] (1).
Open Library:
|
|
2.
|
Fundamentals of database systems
by Elmasri, Ramez. Edition: 5thPublisher: New Delhi ; Pearson ; 2006Availability: Items available for loan: [Call number: 005.74 ELM] (4). Items available for reference: [Call number: 005.74 ELM] (1). Checked out (1).
Open Library:
|
|
3.
|
Data structures and algorithms
by Aho, Alfred V. Publisher: New Delhi ; Pearson ; 2009Availability: Items available for loan: [Call number: 005.73 AHO] (26). Items available for reference: [Call number: 005.73 AHO] (1). Checked out (1).
Open Library:
|
|
4.
|
Algorithm design foundations, analysis, and internet examples
by Goodrich, Michael T. Edition: 2ndPublisher: New Delhi ; Wiley ; 2009Availability: Items available for loan: [Call number: 005.1 GOO] (5). Items available for reference: [Call number: 005.1 GOO] (1).
Open Library:
|
|
5.
|
Fundamentals of computer algorithms
by Horowitz, Ellis. Edition: 2ndPublisher: Hydrabad ; University Press ; 2009Availability: Items available for loan: [Call number: 005.1 HOR] (19). Items available for reference: [Call number: 005.1 HOR] (1).
Open Library:
|
|
6.
|
Computer security: principles and practice
by Stallings, William ...et.al. Publisher: New Delhi ; Pearson ; 2013Availability: Items available for loan: [Call number: 005.8 STA] (6). Items available for reference: [Call number: 005.8 STA] (1).
Open Library:
|
|
7.
|
Intel microprocessors 8086/8088, 80186/80188, 80286, 80386, 80486, pentium, pentium pro processor, pentium 2, pentium 3, pentium 4, and core2 with 64-bit extensions
by Brey, Barry B. Edition: 8th Publisher: New Delhi ; Pearson ; 2013Availability: Items available for loan: [Call number: 004.165 BRE] (4). Items available for reference: [Call number: 004.165 BRE] (2).
Open Library:
|
|
8.
|
Principles of computer security: comptia security+ tm and beyond
by Conklin, Wm. Arthur ...et.al. Edition: 3rdPublisher: New Delhi ; McGraw-Hill ; 2012Availability: Items available for loan: [Call number: 005.8 CON] (1). Items available for reference: [Call number: 005.8 CON] (1).
Open Library:
|
|
9.
|
Simulation modeling and analysis
by Law, Averill M. Edition: 4thPublisher: New Delhi ; McGraw-Hill ; 2014Availability: Items available for loan: [Call number: 003.3 LAW] (19). Items available for reference: [Call number: 003.3 LAW] (1).
Open Library:
|
|
10.
|
Computer organization and architecture designing for performance
by Stallings, William. Edition: 9thPublisher: New Delhi ; Pearson ; 2013Availability: Items available for loan: [Call number: 004.2 STA] (16). Items available for reference: [Call number: 004.2 STA] (1). Checked out (1).
Open Library:
|
|
11.
|
Computer networking a top-down approach
by Kurose, James F. and Ross, Keith W. Edition: 5thPublisher: New Delhi ; Pearson ; 2014Availability: Items available for loan: [Call number: 004.03 KUR] (4). Items available for reference: [Call number: 004.03 KUR] (1).
Open Library:
|
|
12.
|
Simulation a modeler's approach
by Thompson, James R. Publisher: New York ; Wiley ; 2002Availability: Items available for loan: [Call number: 003 THO] (2). Items available for reference: [Call number: 003 THO] (1).
Open Library:
|
|
13.
|
Mobile computing technology, applications and service creation
by Talukder, Asoke ; Ahmed, Hasan and Yavagal, Roopa R. Edition: 2ndPublisher: New Delhi ; McGraw-Hill ; 2014Availability: Items available for loan: [Call number: 004.165 TAL] (19). Items available for reference: [Call number: 004.165 TAL] (1).
Open Library:
|
|
14.
|
Computer architecture and organization
by Hayes, John P. Edition: 3rdPublisher: New Delhi McGraw-Hill 2013Availability: Items available for loan: [Call number: 004.22 HAY] (2). Items available for reference: [Call number: 004.22 HAY] (1).
Open Library:
|