Your search returned 14 results. Subscribe to this search

|
1. Computer organization

by Hamacher, Carl.

Edition: 5thPublisher: New Delhi ; McGraw-Hill ; 2002Availability: Items available for loan: [Call number: 004.22 HAM] (5). Items available for reference: [Call number: 004.22 HAM] (1).
Open Library:
2. Fundamentals of database systems

by Elmasri, Ramez.

Edition: 5thPublisher: New Delhi ; Pearson ; 2006Availability: Items available for loan: [Call number: 005.74 ELM] (4). Items available for reference: [Call number: 005.74 ELM] (1).
Checked out (1).
Open Library:
3. Data structures and algorithms

by Aho, Alfred V.

Publisher: New Delhi ; Pearson ; 2009Availability: Items available for loan: [Call number: 005.73 AHO] (26). Items available for reference: [Call number: 005.73 AHO] (1).
Checked out (1).
Open Library:
4. Algorithm design foundations, analysis, and internet examples

by Goodrich, Michael T.

Edition: 2ndPublisher: New Delhi ; Wiley ; 2009Availability: Items available for loan: [Call number: 005.1 GOO] (5). Items available for reference: [Call number: 005.1 GOO] (1).
Open Library:
5. Fundamentals of computer algorithms

by Horowitz, Ellis.

Edition: 2ndPublisher: Hydrabad ; University Press ; 2009Availability: Items available for loan: [Call number: 005.1 HOR] (19). Items available for reference: [Call number: 005.1 HOR] (1).
Open Library:
6. Computer security: principles and practice

by Stallings, William ...et.al.

Publisher: New Delhi ; Pearson ; 2013Availability: Items available for loan: [Call number: 005.8 STA] (6). Items available for reference: [Call number: 005.8 STA] (1).
Open Library:
7. Intel microprocessors 8086/8088, 80186/80188, 80286, 80386, 80486, pentium, pentium pro processor, pentium 2, pentium 3, pentium 4, and core2 with 64-bit extensions

by Brey, Barry B.

Edition: 8th Publisher: New Delhi ; Pearson ; 2013Availability: Items available for loan: [Call number: 004.165 BRE] (4). Items available for reference: [Call number: 004.165 BRE] (2).
Open Library:
8. Principles of computer security: comptia security+ tm and beyond

by Conklin, Wm. Arthur ...et.al.

Edition: 3rdPublisher: New Delhi ; McGraw-Hill ; 2012Availability: Items available for loan: [Call number: 005.8 CON] (1). Items available for reference: [Call number: 005.8 CON] (1).
Open Library:
9. Simulation modeling and analysis

by Law, Averill M.

Edition: 4thPublisher: New Delhi ; McGraw-Hill ; 2014Availability: Items available for loan: [Call number: 003.3 LAW] (19). Items available for reference: [Call number: 003.3 LAW] (1).
Open Library:
10. Computer organization and architecture designing for performance

by Stallings, William.

Edition: 9thPublisher: New Delhi ; Pearson ; 2013Availability: Items available for loan: [Call number: 004.2 STA] (16). Items available for reference: [Call number: 004.2 STA] (1).
Checked out (1).
Open Library:
11. Computer networking a top-down approach

by Kurose, James F. and Ross, Keith W.

Edition: 5thPublisher: New Delhi ; Pearson ; 2014Availability: Items available for loan: [Call number: 004.03 KUR] (4). Items available for reference: [Call number: 004.03 KUR] (1).
Open Library:
12. Simulation a modeler's approach

by Thompson, James R.

Publisher: New York ; Wiley ; 2002Availability: Items available for loan: [Call number: 003 THO] (2). Items available for reference: [Call number: 003 THO] (1).
Open Library:
13. Mobile computing technology, applications and service creation

by Talukder, Asoke ; Ahmed, Hasan and Yavagal, Roopa R.

Edition: 2ndPublisher: New Delhi ; McGraw-Hill ; 2014Availability: Items available for loan: [Call number: 004.165 TAL] (19). Items available for reference: [Call number: 004.165 TAL] (1).
Open Library:
14. Computer architecture and organization

by Hayes, John P.

Edition: 3rdPublisher: New Delhi McGraw-Hill 2013Availability: Items available for loan: [Call number: 004.22 HAY] (2). Items available for reference: [Call number: 004.22 HAY] (1).
Open Library:
web counter
LIRC, NIIT University, Neemrana, 01494-660783, Copyright © 2015. All Rights Reserved.