M.Sc. (Computer Science)

[1]  Ellis Horowitz,et al.  Fundamentals of Data Structures , 1984 .

[2]  Frank Adelstein,et al.  Fundamentals of Mobile and Pervasive Computing , 2004 .

[3]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[4]  W. Richard Stevens,et al.  Unix network programming , 1990, CCRV.

[5]  Ellen Finkelstein,et al.  Macromedia Flash 8 For Dummies , 2002 .

[6]  Narsingh Deo,et al.  Graph Theory with Applications to Engineering and Computer Science , 1975, Networks.

[7]  Steve Heath,et al.  Embedded Systems Design , 1997 .

[8]  William E. Lorensen,et al.  Object-Oriented Modeling and Design , 1991, TOOLS.

[9]  Jie Wang Computer Network Security: Theory and Practice , 2008 .

[10]  David M. Skapura,et al.  Neural networks - algorithms, applications, and programming techniques , 1991, Computation and neural systems series.

[11]  Jean-Paul Tremblay,et al.  An Introduction to Data Structures with Applications , 2001 .

[12]  R. Tibshirani,et al.  An introduction to the bootstrap , 1993 .

[13]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[14]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[15]  Allen I. Holub Compiler design in C , 1990 .

[16]  Boris Beizer,et al.  Software System Testing and Quality Assurance , 1984 .

[17]  Gerd Keiser,et al.  Local Area Networks , 1989 .

[18]  F. W. Kellaway,et al.  Advanced Engineering Mathematics , 1969, The Mathematical Gazette.

[19]  Charles C. Palmer,et al.  Ethical Hacking , 2019, CEH v10 Certified Ethical Hacker Study Guide.

[20]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[21]  Seymour Lipschutz Schaum's Outline of Theory and Problems of Data Structures , 1986 .

[22]  R. Jain,et al.  Numerical Methods for Scientific and Engineering Computation , 1985 .

[23]  B. Singh,et al.  Network security and management , 2012, 2010 IEEE International Conference on Computational Intelligence and Computing Research.

[24]  Peter S. Pacheco A User's Guide to MPI , 2010 .

[25]  Jennifer Widom,et al.  Database System Implementation , 2000 .

[26]  Samuel D. Conte,et al.  Elementary Numerical Analysis , 1980 .

[27]  James I. McManus,et al.  Handbook of Software Quality Assurance , 1987 .

[28]  Carolyn E. Begg,et al.  Database Systems: A Practical Approach to Design, Implementation and Management , 1998 .

[29]  Philip Clark Gucker Essential English Grammar , 1966 .

[30]  Kirk Zurell C Programming for Embedded Systems , 2000 .

[31]  James Martin,et al.  Object-oriented analysis and design , 1992 .

[32]  Brent Ware,et al.  Open source web development with LAMP : using Linux, Apache, MySQL, Perl, and PHP , 2003 .

[33]  Robert Reinhardt,et al.  Macromedia Flash?8 Bible , 2006 .

[34]  Margaret H. Dunham,et al.  Data Mining: Introductory and Advanced Topics , 2002 .

[35]  Ed Burnette,et al.  Hello, Android: Introducing Google's Mobile Development Platform , 2009 .

[36]  Glenford J. Myers,et al.  Art of Software Testing , 1979 .

[37]  Ellis Horowitz,et al.  Fundamentals of Computer Algorithms , 1978 .

[38]  Ramez Elmasri,et al.  Fundamentals of Database Systems , 1989 .

[39]  Raghu Ramakrishnan,et al.  Database Management Systems , 1976 .

[40]  Alfred V. Aho,et al.  Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.

[41]  David A. Patterson,et al.  Computer Architecture: A Quantitative Approach , 1969 .

[42]  William Stallings,et al.  Data and Computer Communications , 1985 .

[43]  Abraham Silberschatz,et al.  Database System Concepts , 1980 .

[44]  William Stallings,et al.  Cryptography and network security , 1998 .

[45]  Paul L. Meyer,et al.  Introductory Probability and Statistical Applications , 1970 .

[46]  Oliver Kuerten Dreamweaver MX , 2002 .

[47]  Behrooz Parhami Introduction to Parallel Processing , 2002, Series in Computer Science.

[48]  Jack Dongarra,et al.  MPI: The Complete Reference , 1996 .

[49]  Steven Holzner HTML Black Book , 2000 .

[50]  A. K. Pujari,et al.  Data Mining Techniques , 2006 .

[51]  Judith L. Gersting Mathematical structures for computer science , 1982 .

[52]  Ali Bahrami,et al.  Object Oriented Systems Development , 1998 .

[53]  William E. Perry,et al.  Effective methods for software testing , 1995 .

[54]  Michael Miller,et al.  Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online , 2008 .

[55]  Michael Barr,et al.  Programming embedded systems in C and C , 1999 .

[56]  Tomasz Imielinski,et al.  Mobile Computing , 1996 .

[57]  George Reese,et al.  Cloud application architectures , 2009 .

[58]  Edward Kit,et al.  Software testing in the real world - improving the process , 1995 .

[59]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[60]  C. Xavier World Wide Web design with HTML , 2001 .

[61]  Wendy G. Lehnert Internet 101 A Beginner s Guide To The Internet And The World Wide Web , 2001 .

[62]  David E. Simon,et al.  An Embedded Software Primer , 1999 .