10063 Matching Record(s) found
| Title | Author | Subject | Publisher | Action |
| Computer Security Handbook, Sixth Edition, Volume2 | Bosworth | Computer Science | Wiley | Details |
| Machine Learning in Python:for Predictive Analysis | Bowles | Computer Science | Wiley | Details |
| Graph Analysis and Visualization:iness Opportunity in Linked Data | Brath | Computer Science | Wiley | Details |
| WHOIS Running the Internet: Protocol, Policy, and Privacy | Bruen | Computer Science | Wiley | Details |
| Python Projects | Cassell | Computer Science | Wiley | Details |
| The Mobile Application Hacker's Handbook | Chell | Computer Science | Wiley | Details |
| Comparable Corpora and Computer-assisted Translation | Delpech | Computer Science | Wiley | Details |
| Data Science & Big Data Analytics:nalyzing, Visualizing and Presenting Data | EMC Education S | Computer Science | Wiley | Details |
| Java Programming 24-Hour Trainer, Second Edition | Fain | Computer Science | Wiley | Details |
| Mathematical Programming Solver Based on Local Search | Gardi | Computer Science | Wiley | Details |
| Data Fluency: Empowering Your Organization with Effective Data Communication | Gemignani | Computer Science | Wiley | Details |
| Data Center Handbook | Geng | Computer Science | Wiley | Details |
| The Network Security Test Lab: A Step-by-Step Guide | Gregg | Computer Science | Wiley | Details |
| Building Responsive Data Visualization for the Web | Hinderman | Computer Science | Wiley | Details |
| The Antivirus Hacker's Handbook | Koret | Computer Science | Wiley | Details |
| Applied Microsoft Business Intelligence | LeBlanc | Computer Science | Wiley | Details |
| Fundamentals of Big Data Network Analysis for Research and Industry | Lee | Computer Science | Wiley | Details |
| Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges | Li | Computer Science | Wiley | Details |
| Beginning JavaScript, 5th Edition | McPeak | Computer Science | Wiley | Details |
| Wearable Android: Android Wear & Google FIT App Development | Mishra | Computer Science | Wiley | Details |
| Network Attacks & Exploitation: A Framework | Monte | Computer Science | Wiley | Details |
| Advanced Content Delivery, Streaming, and Cloud Services | Pathan | Computer Science | Wiley | Details |
| JavaScript and jQuery for Data Analysis and Visualization | Raasch | Computer Science | Wiley | Details |
| Cybercrime and Cyber Warfare | Bernik | Computer Science | Wiley | Details |
| Data as a Service: A Framework for Providing Reusable Enterprise Data Services | Sarkar | Computer Science | Wiley | Details |
| Evolutionary Algorithms for Mobile Ad hoc Networks | Dorronsoro | Computer Science | Wiley | Details |
| Reliable JavaScript: How to code safely in the world's most dangerous language | Spencer | Computer Science | Wiley | Details |
| Beginning Software Engineering | Stephens | Computer Science | Wiley | Details |
| Advanced Backend Optimization | Touati | Computer Science | Wiley | Details |
| Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide: Preparing for the BGP, VPRN and Multicast Exams | Warnock | Computer Science | Wiley | Details |
| Communication Practices in Engineering, Manufacturing, and Research for Food and Water Safety | Wright | Computer Science | Wiley | Details |
| Professional Java EE Design Patterns | Yener | Computer Science | Wiley | Details |
| Web Development with jQuery | York | Computer Science | Wiley | Details |
| Guide to Modeling and Simulation of Systems of Systems | Bernard P. Zeigler, Hessam S. Sarjoughian | Computer Science | Springer | Details |
| Quantum Attacks on Public-Key Cryptosystems | Song Y. Yan | Computer Science | Springer | Details |
| Modelling and Simulation | Louis G. Birta, Gilbert Arbez | Computer Science | Springer | Details |
| Music and Human-Computer Interaction | Simon Holland, Katie Wilkie, Paul Mulholland, Allan Seago | Computer Science | Springer | Details |
| Fundamentals of Discrete Math for Computer Science | Tom Jenkyns, Ben Stephenson | Computer Science | Springer | Details |
| Personas - User Focused Design | Lene Nielsen | Computer Science | Springer | Details |
| Creativity and Rationale | John M. Carroll | Computer Science | Springer | Details |
| A Journey Through Cultures | Luciana Cardoso de Castro Salgado, Carla Faria Leitão, Clarisse Sieckenius Souza | Computer Science | Springer | Details |
| Coordinative Practices in the Building Process | Lars Rune Christensen | Computer Science | Springer | Details |
| Guide to Computing for Expressive Music Performance | Alexis Kirke, Eduardo R. Miranda | Computer Science | Springer | Details |
| Meta-Programming and Model-Driven Meta-Program Development | Vytautas Štuikys, Robertas Damaševi?ius | Computer Science | Springer | Details |
| 3D Computer Vision | Christian Wöhler | Computer Science | Springer | Details |
| Belief Revision in Non-Classical Logics | Márcio Moretto Ribeiro | Computer Science | Springer | Details |
| Privacy and Security for Cloud Computing | Siani Pearson, George Yee | Computer Science | Springer | Details |
| Connecting Families | Carman Neustaedter, Steve Harrison, Abigail Sellen | Computer Science | Springer | Details |
| From Linear Operators to Computational Biology | Martin Davis, Edmond Schonberg | Computer Science | Springer | Details |
| Knowledge Visualization Currents | Francis T. Marchese, Ebad Banissi | Computer Science | Springer | Details |
| Orchestrating Human-Centered Design | Guy André Boy | Computer Science | Springer | Details |
| Communications and Networking | John Cowley | Computer Science | Springer | Details |
| Handbook of Iris Recognition | Mark J. Burge, Kevin W. Bowyer | Computer Science | Springer | Details |
| Real-Time Detection of Lines and Grids | Adam Herout, Markéta Dubská, Ji?í Havel | Computer Science | Springer | Details |
| Guide to Dynamic Simulations of Rigid Bodies and Particle Systems | Murilo G. Coutinho | Computer Science | Springer | Details |
| Crowd Simulation | Daniel Thalmann, Soraia Raupp Musse | Computer Science | Springer | Details |
| Embedded Multimedia Security Systems | Amit Pande, Joseph Zambreno | Computer Science | Springer | Details |
| Energy-Efficient High Performance Computing | James H. Laros III, Kevin Pedretti, Suzanne M. Kelly, Wei Shu, Kurt Ferreira, John Van Dyke, Courtenay Vaughan | Computer Science | Springer | Details |
| Image and Video-Based Artistic Stylisation | Paul Rosin, John Collomosse | Computer Science | Springer | Details |
| Mathematics in Computing | Gerard O’Regan | Computer Science | Springer | Details |
| Guide to Computer Network Security | Joseph Migga Kizza | Computer Science | Springer | Details |
| Social Media Retrieval | Naeem Ramzan, Roelof Zwol, Jong-Seok Lee, Kai Clüver, Xian-Sheng Hua | Computer Science | Springer | Details |
| Guide to Modeling and Simulation of Systems of Systems | Bernard P. Zeigler | Computer Science | Springer | Details |
| Guide to Cloud Computing | Richard Hill, Laurie Hirsch, Peter Lake, Siavash Moshiri | Computer Science | Springer | Details |
| Consumer Depth Cameras for Computer Vision | Andrea Fossati, Juergen Gall, Helmut Grabner, Xiaofeng Ren, Kurt Konolige | Computer Science | Springer | Details |
| Imaging Spectroscopy for Scene Analysis | Antonio Robles-Kelly, Cong Phuoc Huynh | Computer Science | Springer | Details |
| Time-of-Flight Cameras | Miles Hansard, Seungkyu Lee, Ouk Choi, Radu Horaud | Computer Science | Springer | Details |
| Motion History Images for Action Recognition and Understanding | Md. Atiqur Rahman Ahad | Computer Science | Springer | Details |
| The Secure Information Society | Jörg Krüger, Bertram Nickolay, Sandro Gaycken | Computer Science | Springer | Details |
| Game Analytics | Magy Seif El-Nasr, Anders Drachen, Alessandro Canossa | Computer Science | Springer | Details |
| User Modeling and Adaptation for Daily Routines | Estefanía Martín, Pablo A. Haya, Rosa M. Carro | Computer Science | Springer | Details |
| Eye Gaze in Intelligent User Interfaces | Yukiko I. Nakano, Cristina Conati, Thomas Bader | Computer Science | Springer | Details |
| Reproduction of Tactual Textures | Michaël Wiertlewski | Computer Science | Springer | Details |
| Business Intelligence and Performance Management | Peter Rausch, Alaa F. Sheta, Aladdin Ayesh | Computer Science | Springer | Details |
| Principles of Data Mining | Max Bramer | Computer Science | Springer | Details |
ALP = Alipore Campus Library, University of Calcutta
1, Reformatory Steet, Kolkata - 750027
CL = Central Library, University of Calcutta
87/1, College Street, Kolkata - 750073
TSP = Ballygunge Science College (Taraknath Siksha Prangan)
35, Ballygunge Circular Road, Kolkata – 750019
RBSP= Rashbehari Siksha Prangan – Rajabazar Science College
92, Acharyya Prafulla Chandra Road, Kolkata - 750009
ECO = ECONOMICS, B. T. Road Campus
56A, Barrackpore Trunk Road, Kolkata-750 050
LAW = Hazra Road Campus
51/1and 51/2 Hazra Road, Kolkata-750 019
VLC = Home Science, Viharilal Home Science Campus
20B, Judges Court Road, Alipore, Kolkata -750 021