10063 Matching Record(s) found
Title | Author | Subject | Publisher | Action |
Computer Security Handbook, Sixth Edition, Volume2 | Bosworth | Computer Science | Wiley | Details |
Machine Learning in Python:for Predictive Analysis | Bowles | Computer Science | Wiley | Details |
Graph Analysis and Visualization:iness Opportunity in Linked Data | Brath | Computer Science | Wiley | Details |
WHOIS Running the Internet: Protocol, Policy, and Privacy | Bruen | Computer Science | Wiley | Details |
Python Projects | Cassell | Computer Science | Wiley | Details |
The Mobile Application Hacker's Handbook | Chell | Computer Science | Wiley | Details |
Comparable Corpora and Computer-assisted Translation | Delpech | Computer Science | Wiley | Details |
Data Science & Big Data Analytics:nalyzing, Visualizing and Presenting Data | EMC Education S | Computer Science | Wiley | Details |
Java Programming 24-Hour Trainer, Second Edition | Fain | Computer Science | Wiley | Details |
Mathematical Programming Solver Based on Local Search | Gardi | Computer Science | Wiley | Details |
Data Fluency: Empowering Your Organization with Effective Data Communication | Gemignani | Computer Science | Wiley | Details |
Data Center Handbook | Geng | Computer Science | Wiley | Details |
The Network Security Test Lab: A Step-by-Step Guide | Gregg | Computer Science | Wiley | Details |
Building Responsive Data Visualization for the Web | Hinderman | Computer Science | Wiley | Details |
The Antivirus Hacker's Handbook | Koret | Computer Science | Wiley | Details |
Applied Microsoft Business Intelligence | LeBlanc | Computer Science | Wiley | Details |
Fundamentals of Big Data Network Analysis for Research and Industry | Lee | Computer Science | Wiley | Details |
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges | Li | Computer Science | Wiley | Details |
Beginning JavaScript, 5th Edition | McPeak | Computer Science | Wiley | Details |
Wearable Android: Android Wear & Google FIT App Development | Mishra | Computer Science | Wiley | Details |
Network Attacks & Exploitation: A Framework | Monte | Computer Science | Wiley | Details |
Advanced Content Delivery, Streaming, and Cloud Services | Pathan | Computer Science | Wiley | Details |
JavaScript and jQuery for Data Analysis and Visualization | Raasch | Computer Science | Wiley | Details |
Cybercrime and Cyber Warfare | Bernik | Computer Science | Wiley | Details |
Data as a Service: A Framework for Providing Reusable Enterprise Data Services | Sarkar | Computer Science | Wiley | Details |
Evolutionary Algorithms for Mobile Ad hoc Networks | Dorronsoro | Computer Science | Wiley | Details |
Reliable JavaScript: How to code safely in the world's most dangerous language | Spencer | Computer Science | Wiley | Details |
Beginning Software Engineering | Stephens | Computer Science | Wiley | Details |
Advanced Backend Optimization | Touati | Computer Science | Wiley | Details |
Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide: Preparing for the BGP, VPRN and Multicast Exams | Warnock | Computer Science | Wiley | Details |
Communication Practices in Engineering, Manufacturing, and Research for Food and Water Safety | Wright | Computer Science | Wiley | Details |
Professional Java EE Design Patterns | Yener | Computer Science | Wiley | Details |
Web Development with jQuery | York | Computer Science | Wiley | Details |
Guide to Modeling and Simulation of Systems of Systems | Bernard P. Zeigler, Hessam S. Sarjoughian | Computer Science | Springer | Details |
Quantum Attacks on Public-Key Cryptosystems | Song Y. Yan | Computer Science | Springer | Details |
Modelling and Simulation | Louis G. Birta, Gilbert Arbez | Computer Science | Springer | Details |
Music and Human-Computer Interaction | Simon Holland, Katie Wilkie, Paul Mulholland, Allan Seago | Computer Science | Springer | Details |
Fundamentals of Discrete Math for Computer Science | Tom Jenkyns, Ben Stephenson | Computer Science | Springer | Details |
Personas - User Focused Design | Lene Nielsen | Computer Science | Springer | Details |
Creativity and Rationale | John M. Carroll | Computer Science | Springer | Details |
A Journey Through Cultures | Luciana Cardoso de Castro Salgado, Carla Faria Leitão, Clarisse Sieckenius Souza | Computer Science | Springer | Details |
Coordinative Practices in the Building Process | Lars Rune Christensen | Computer Science | Springer | Details |
Guide to Computing for Expressive Music Performance | Alexis Kirke, Eduardo R. Miranda | Computer Science | Springer | Details |
Meta-Programming and Model-Driven Meta-Program Development | Vytautas Štuikys, Robertas Damaševi?ius | Computer Science | Springer | Details |
3D Computer Vision | Christian Wöhler | Computer Science | Springer | Details |
Belief Revision in Non-Classical Logics | Márcio Moretto Ribeiro | Computer Science | Springer | Details |
Privacy and Security for Cloud Computing | Siani Pearson, George Yee | Computer Science | Springer | Details |
Connecting Families | Carman Neustaedter, Steve Harrison, Abigail Sellen | Computer Science | Springer | Details |
From Linear Operators to Computational Biology | Martin Davis, Edmond Schonberg | Computer Science | Springer | Details |
Knowledge Visualization Currents | Francis T. Marchese, Ebad Banissi | Computer Science | Springer | Details |
Orchestrating Human-Centered Design | Guy André Boy | Computer Science | Springer | Details |
Communications and Networking | John Cowley | Computer Science | Springer | Details |
Handbook of Iris Recognition | Mark J. Burge, Kevin W. Bowyer | Computer Science | Springer | Details |
Real-Time Detection of Lines and Grids | Adam Herout, Markéta Dubská, Ji?í Havel | Computer Science | Springer | Details |
Guide to Dynamic Simulations of Rigid Bodies and Particle Systems | Murilo G. Coutinho | Computer Science | Springer | Details |
Crowd Simulation | Daniel Thalmann, Soraia Raupp Musse | Computer Science | Springer | Details |
Embedded Multimedia Security Systems | Amit Pande, Joseph Zambreno | Computer Science | Springer | Details |
Energy-Efficient High Performance Computing | James H. Laros III, Kevin Pedretti, Suzanne M. Kelly, Wei Shu, Kurt Ferreira, John Van Dyke, Courtenay Vaughan | Computer Science | Springer | Details |
Image and Video-Based Artistic Stylisation | Paul Rosin, John Collomosse | Computer Science | Springer | Details |
Mathematics in Computing | Gerard O’Regan | Computer Science | Springer | Details |
Guide to Computer Network Security | Joseph Migga Kizza | Computer Science | Springer | Details |
Social Media Retrieval | Naeem Ramzan, Roelof Zwol, Jong-Seok Lee, Kai Clüver, Xian-Sheng Hua | Computer Science | Springer | Details |
Guide to Modeling and Simulation of Systems of Systems | Bernard P. Zeigler | Computer Science | Springer | Details |
Guide to Cloud Computing | Richard Hill, Laurie Hirsch, Peter Lake, Siavash Moshiri | Computer Science | Springer | Details |
Consumer Depth Cameras for Computer Vision | Andrea Fossati, Juergen Gall, Helmut Grabner, Xiaofeng Ren, Kurt Konolige | Computer Science | Springer | Details |
Imaging Spectroscopy for Scene Analysis | Antonio Robles-Kelly, Cong Phuoc Huynh | Computer Science | Springer | Details |
Time-of-Flight Cameras | Miles Hansard, Seungkyu Lee, Ouk Choi, Radu Horaud | Computer Science | Springer | Details |
Motion History Images for Action Recognition and Understanding | Md. Atiqur Rahman Ahad | Computer Science | Springer | Details |
The Secure Information Society | Jörg Krüger, Bertram Nickolay, Sandro Gaycken | Computer Science | Springer | Details |
Game Analytics | Magy Seif El-Nasr, Anders Drachen, Alessandro Canossa | Computer Science | Springer | Details |
User Modeling and Adaptation for Daily Routines | Estefanía Martín, Pablo A. Haya, Rosa M. Carro | Computer Science | Springer | Details |
Eye Gaze in Intelligent User Interfaces | Yukiko I. Nakano, Cristina Conati, Thomas Bader | Computer Science | Springer | Details |
Reproduction of Tactual Textures | Michaël Wiertlewski | Computer Science | Springer | Details |
Business Intelligence and Performance Management | Peter Rausch, Alaa F. Sheta, Aladdin Ayesh | Computer Science | Springer | Details |
Principles of Data Mining | Max Bramer | Computer Science | Springer | Details |
ALP = Alipore Campus Library, University of Calcutta
1, Reformatory Steet, Kolkata - 750027
CL = Central Library, University of Calcutta
87/1, College Street, Kolkata - 750073
TSP = Ballygunge Science College (Taraknath Siksha Prangan)
35, Ballygunge Circular Road, Kolkata – 750019
RBSP= Rashbehari Siksha Prangan – Rajabazar Science College
92, Acharyya Prafulla Chandra Road, Kolkata - 750009
ECO = ECONOMICS, B. T. Road Campus
56A, Barrackpore Trunk Road, Kolkata-750 050
LAW = Hazra Road Campus
51/1and 51/2 Hazra Road, Kolkata-750 019
VLC = Home Science, Viharilal Home Science Campus
20B, Judges Court Road, Alipore, Kolkata -750 021