LIST OF BOOKS ON INFORMATION SYSTEM PROGRAMME APRIL, 2021 | ||||||
S/N | AUTHOR | TITLE | CLASS MARK | COPY | YEAR | |
1 | Sharma Sanjay | Signals and system (with MATLAB PROGRAMS) | TK5102.9.S52 | 1 | 2018 | |
2 | Al-Omari, Ahmad. et.l | Practical Information Security: A Competency-Based Education Course | QA76.9.A48 | 1 | 2018 | |
3 | Marinescu, Dan C. | Cloud Computing, Theory and Practice. 2nd edition | QA76.585.M37 | 1 | 2018 | |
4 | Skilton, Mark | The 4th Industrial Revolution | QA335.S55 | 1 | 2018 | |
5 | Mueller John P. | Artificial Intelligence for dummies A Wiley Brand | QA334.M85 | 1 | 2018 | |
6 | Voulgaris, Zacharias et..al | Al for Data Science: Artificial Intelligence Frameworks and Functionality for Deep Learning, Optimization and Beyond | QA76.9.V68 | 1 | 2018 | |
7 | Lan J. Lloyd | Information Technology Law | KD667.C65.L58 | 2 | 2017 | |
8 | Oleary J. Timothy et.al | Computing Essentials | QA76.5.O42 | 1 | 2017 | |
9 | Skorohod, Boris A. | Diffuse Algorithms for Neural and Neuro-Fuzzy Networks | QA76.7.S56 | 1 | 2017 | |
10 | Scoth, Tillery et.al | System Analysis and Design | QA76.6.T55 | 1 | 2017 | |
11 | Vermaat, E. Misty et.al | Discovering Computers 2017: Tools, Appls, Devices and the Impact Technology | QA76.5.V43 | 1 | 2017 | |
12 | Roberts, Scott J. | Intelligence-Driven Incident Response | HV6773.R63 | 1 | 2017 | |
13 | Faulkner Andrew | Adobe Photoshop CC 2017 release: Classroom in a Book, the official training Workbook from Adobe | TR267.5.F38 | 1 | 2017 | |
14 | Dr. Sanjay Sharma | Digital Signal Processing | TK5102.5 .S26 | 2 | 2016 | |
15 | Dr. Sanjay Sharma | Digital Communications | TK5103.7 .S26 | 2 | 2016 | |
16 | Stair M. Ralph et.al | Principle of Information System 12th ed. | T58.6.S72 | 1 | 2016 | |
17 | Tan, Yang | GPU-based Parallel Implementation of Swarm Intelligence Algorithms | Q337.T36 | 1 | 2016 | |
18 | Guzdia, Mark | Learner-Centered Design of Computing Education Research on Computing for Everyone | QA76.6.M37 | 1 | 2016 | |
19 | Navathe, Elmasri | Fundamentals of Database Systems 7th ed. | QA76.9.D3..F57 | 1 | 2016 | |
20 | Stair M. Ralph et.al | Fundamentals of Information Systems. 8th ed. | T58.6.S72 | 1 | 2016 | |
21 | The Institute of Chartered Accountants of India | Sample Information Systems Audit and Forensic Audit Report | T58.6.T44 | 1 | 2016 | |
22 | Mokesh Dhunna | Information Technology in Business Management | HF5548.2.M65 | 1 | 2015 | |
23 | Williams.B.K | Using information technology: A practical introduction to computers & communication | QA76.5 .W53332 | 2 | 2015 | |
24 | Srinivasa K. G. | Guide to High Performance Distributed Computing: Case Studies with Hadoop, Scalding and Spark | QA76.9.S75 | 1 | 2015 | |
25 | Chell, Dominic | The Mobile Application Hacker’s Handbook | TK15103.2.C44 | 1 | 2015 | |
26 | Stair M. Ralph et.al | Principle of Information System | T58.6.S72 | 1 | 2014 | |
27 | Cegielski, Rainer Prince | Introduction to Information Systems: Supporting and Transforming Business | T58.5.R35 | 1 | 2014 | |
28 | Sanjay Sharma | Digital Image Processing | TA1632.S25 | 2 | 2013 | |
29 | Sanjay Sharma | Digital Design | TK7885.A1 S25 | 2 | 2013 | |
30 | Brijesh Verma | ATM Networks | TK105.35.B75 | 1 | 2013 | |
31 | Laudon Kenneth C. | Essentials of Management Information Systems. 10th ed. | T58.6.L38 | 1 | 2013 | |
32 | Ying Das Lin | Computer Networks: An Open Source Approach | TK5105.5.L55 | 1 | 2012 | |
34 | Brown Carol V. | Managing Information Technology. 7th ed. | T58.6.B76 | 1 | 2012 | |
35 | Tipton, Harold F. | Information Security Management Handbook. 7th ed.` | QA76.9.I54 | 1 | 2012 | |
36 | Stair M. Ralph et.al | Fundamentals Information Systems | T58.6,S72 | 1 | 2012 | |
37 | O.Brien Marakas | Management Information System | T58.6.B75 | 1 | 2011 | |
38 | Schwalbe, Kathy | Information Technology Project Management, Revised 6e | T58.5.S39 | 1 | 2011 | |
39 | Jani N.N. | Mobile Computing (Technology and Application) | TK5103.2.J26 | 2 | 2009 | |
40 | Fling Brian | Mobile Design and Development | QA76.59.F55 | 1 | 2009 | |
41 | Dhiren R. Patel | Information Security Theory and Practice | QA76.9.D46 | 1 | 2008 | |
42 | Sarvana Kumar | A Textbook of Information Technology | T58.5.S27 | 2 | 2008 | |
43 | John G. Proakis | Digital Communications | TK5103.7.J54 | 1 | 2008 | |
44 | Kailash N. Gupta | Digital signature: network security practices | TK7868.15.M36 | 2 | 2005 | |
45 | Dixit, J. B. | Fundamentals of computer programming and information technology | QA75.D59 | 2 | 2005 | |
46 | Ram Bansal | Information Systems Analysis and Design | T58.6 .R35 | 2 | 2005 | |
47 | ITL Education Solutions Ltd | Introduction to Information Technology | T58.5 .I58 | 2 | 2005 | |
48 | Bhunia, C.T | information technology network & internet: innovative single window book from base to reco | QA76.8.B48 | 2 | 2005 | |
49 | Nagabhushana, S. | Computer vision & image processing | QA75.N34 | 2 | 2005 | |
50 | Jursfsky, D & James | Speech and language processing | QA76.8.J87 | 2 | 2005 | |
51 | Rajaraman V. | Introduction to Information Technology | T58.5.R35 | 2 | 2003 | |
52 | Chris Edwards | The Essence of Information System | T58.64 .E4 | 2 | 2003 | |
53 | Douglas E. Comer | Network Systems Design Using Network Processors | TK5105 .C85 | 1 | 2003 | |
54 | David Cyganshi | Information Technology Inside and Outside | T58.5.D28 | 2 | 2001 | |
55 | Rajaraman V. | Self-study guide to analysis and design of information systems | T58.6 .R35 | 2 | 2001 | |
56 | Rajaraman,V.et.al | Parallel computers: architecture and Programming | QA76.8.R35 | 2 | 2000 | |
57 | Rajaraman,V | ANALYSIS & Design of Information system | QA76.8.R3 | 2 | 2000 | |
58 | Rajaraman,V | ANALYSIS & Design of Information system | QA76.8.R3 | 2 | 2000 | |
59 | Series Cashman S. | System Analysis and Design 7th ed. | QA76.6.T55 | 1 |