TenderDekho Logo
GEM

Bids are Invited For Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch in PATNA, BIHAR

Bid Publish Date

17-Apr-2025, 5:43 pm

Bid End Date

08-May-2025, 6:00 pm

EMD

₹18,000

Value

₹9,00,000

Location

Progress

Issue17-Apr-2025, 5:43 pm
Technical05-May-2025, 4:54 pm
Financial
Award04-Jul-2025, 12:07 am
Explore all 5 tabs to view complete tender details

Quantity

200

Bid Type

Two Packet Bid

Categories 56

Centre For Development Of Advanced Computing (c-dac) invites bids for Linux Kernel Programming Second Edition, Linux Kernel Debugging, Windows Internals Part 1 System Arch in PATNA, BIHAR. Quantity: 200. Submission Deadline: 08-05-2025 18: 00: 00. Submit your proposal before the deadline.

Documents 5

GeM-Bidding-7749083.pdf

Main Document

BOQ Document

BOQ

BOQ Document

BOQ

Buyer uploaded ATC document

ATC

GEM General Terms and Conditions Document

GEM_GENERAL_TERMS_AND_CONDITIONS

Bill of Quantities (BOQ) 200 Items

Item # Title Description Quantity Unit Consignee Delivery (Days)
1 Linux Kernel Programming Second Edition Kaiwan Billimoria 1 nos rakesh@cpat 15
2 Linux Kernel Debugging Kaiwan Billimoria 1 nos rakesh@cpat 15
3 Windows Internals Part 1 System Architecture Processes Brian Calin Jamie Hanrahan 1 nos rakesh@cpat 15
4 Windows Internals Part 2 Andrea Allievi Mark E 1 nos rakesh@cpat 15
5 Windows Kernel Programming Pavel Yosifovich 1 nos rakesh@cpat 15
6 Practical Malware Analysis Michael Sikorski Andrew Honig 1 nos rakesh@cpat 15
7 Mastering Malware Analysis Second Edition Alexey Kleymenov 1 nos rakesh@cpat 15
8 Malware Development for Ethical Hackers Zhassulan Zhussupov 1 nos rakesh@cpat 15
9 Malware Data Science Joshua Saxe Hillary Sanders 1 nos rakesh@cpat 15
10 Malware Analysis Techniques Dylan Barker 1 nos rakesh@cpat 15
11 Evasive Malware Kyle Cucci 1 nos rakesh@cpat 15
12 Mastering Malware Analysis Alexey Kleymenov 1 nos rakesh@cpat 15
13 Malware Analysis and Detection Engineering Abhijit Mohanta 1 nos rakesh@cpat 15
14 Learning Malware Analysis Explore the concepts tools Monnappa Ka 1 nos rakesh@cpat 15
15 The Art Of MAC Malware The Guide To Analyzing Malicious Software Patrick Wardle 1 nos rakesh@cpat 15
16 The Android Malware Handbook Detection and Analysis by Human and Machine Qian Han Author Salvador Mandujano 1 nos rakesh@cpat 15
17 Evading EDR The definitive Guide to Defeating Endpoint Detection Systems Matt Hand 1 nos rakesh@cpat 15
18 Learning eBPF programming the linux kernel for enhanced observability Liz Rice 1 nos rakesh@cpat 15
19 Incident response techniques for ransomware attacks Oleg skulkin 1 nos rakesh@cpat 15
20 Breaking ransomware Jitender narula 1 nos rakesh@cpat 15
21 Windows ransomware detection and protection Marius sandbu 1 nos rakesh@cpat 15
22 Ransomware Analysis Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence Claudia lanza author abdelkader lahmadi author jrme franois author 1 nos rakesh@cpat 15
23 Ransomware Revealed A Beginners Guide to Protecting and Recovering from Ransomware Attacks Nihad a hassan 1 nos rakesh@cpat 15
24 Attacking Network Protocols James forshaw 1 nos rakesh@cpat 15
25 Incident Response for Windows Adapt effective strategies Anatoly tykushin a 1 nos rakesh@cpat 15
26 Practical Reverse Engineering x86 x64 ARM Windows Kernel Reversing Tools and Obfuscation Bruce Dang Author Alexandre Gazet 1 nos rakesh@cpat 15
27 Black Hat Python 2nd Edition Justin Seitz Author Tim Arnold Author 1 nos rakesh@cpat 15
28 Software Reverse Engineering Cracking and Counter Measures Tech Today Stephanie Domas Author Christopher Domas Author 1 nos rakesh@cpat 15
29 Rootkits And Bootkits ALEX MATROSOV Eugene Rodionov Sergey Bratus Author 1 nos rakesh@cpat 15
30 The Ghidra Book Chris Eagle Author Kara Nance Author 1 nos rakesh@cpat 15
31 Practical Binary Analysis Dennis Andriesse Author 1 nos rakesh@cpat 15
32 Windows Security Internals A Deep Dive into Windows James Forshaw Author 1 nos rakesh@cpat 15
33 Mastering Linux Security and Hardening Third Edition Donald A Tevault Author Contributor 1 nos rakesh@cpat 15
34 Hacking APIs Corey J Ball Author 1 nos rakesh@cpat 15
35 The Art of Memory Forensics Detecting Malware and Threats in Windows Linux and Mac Memory Michael Ligh Andrew Case 1 nos rakesh@cpat 15
36 Hacking The Art of Exploitation 2nd Ed Jon Erickson Author 1 nos rakesh@cpat 15
37 Practical Threat Intelligence and Data Driven Threat Hunting Valentina Costa Gazcon 1 nos rakesh@cpat 15
38 Learn Computer Forensics Second Edition William Oettinger Author 1 nos rakesh@cpat 15
39 Learn Computer Forensics Second Edition William Oettinger Author Contributor 1 nos rakesh@cpat 15
40 Practical Digital Forensics DrAkashdeep Bhardwaj Author 1 nos rakesh@cpat 15
41 Practical Cyber Forensics An Incident Based Approach to Forensic Investigations Niranjan Reddy Author 1 nos rakesh@cpat 15
42 Ethical Password Cracking Decode passwords James Leyte Vidal Author 1 nos rakesh@cpat 15
43 Automating Security Detection Engineering Dennis Chow Author David Bruskin Foreword 1 nos rakesh@cpat 15
44 Practical Linux Forensics A Guide for Digital Investigators Bruce Nikkel Author 1 nos rakesh@cpat 15
45 Implementing Reverse Engineering Jitender Narula Author 1 nos rakesh@cpat 15
46 Practical Mobile Forensics Fourth Edition Rohit Tamma Author Contributor 1 nos rakesh@cpat 15
47 Digital Forensics and Incident Response Third Edition Gerard Johansen Author Contributor 1 nos rakesh@cpat 15
48 Digital Forensics and Incident Response A practical guide to using Kali Linux for cyber investigations Deepanshu Khanna Author 1 nos rakesh@cpat 15
49 HandsOn Network Forensics Nipun Jaswal Author Contributor 1 nos rakesh@cpat 15
50 Mastering Network Forensics practical approach to investigating and defending against network attacks Nipun Jaswal Author 1 nos rakesh@cpat 15
51 Fundamentals of Network Forensics A Research Perspective Computer Communications and Networks RC Joshi Author Emmanuel S Pilli Author 1 nos rakesh@cpat 15
52 Multimedia Forensics Advances in Computer Vision and Pattern Recognition Husrev Taha Sencar Editor Luisa Verdoliva Editor Nasir Memon Editor 1 nos rakesh@cpat 15
53 Mastering Windows Network Forensics and Investigation Steve Anson Author Steve Bunting Author Ryan Johnson Author Scott Pearson Author 1 nos rakesh@cpat 15
54 Digital Forensics with Kali Linux Third Edition Enhance Shiva VN Parasram Author Contributor 1 nos rakesh@cpat 15
55 Learning by Practicing Mastering TShark Network Forensics Moving From Zero to Hero Nik Alleyne Author 1 nos rakesh@cpat 15
56 Cloud Forensics Demystified Ganesh Ramakrishnan Author Mansoor Haqanee Author 1 nos rakesh@cpat 15
57 Wireshark for Network Forensics An Essential Guide for IT and Cloud Professionals Nagendra Kumar Nainar Author Ashish Panda Author 1 nos rakesh@cpat 15
58 Virtualization and Forensics A Digital Forensic Investigators Guide to Virtual Environments Greg Kipper Author Diane Barrett Author 1 nos rakesh@cpat 15
59 The Practice of Network Security Monitor Richard Bejtlich Author 1 nos rakesh@cpat 15
60 Bayesian Networks for Probabilistic Inference and Decision Analysis F Taroni Author 1 nos rakesh@cpat 15
61 Digital Forensics and Incident Response Second Edition Gerard Johansen Author Contributor 1 nos rakesh@cpat 15
62 PRACTICAL CYBER INTELLIGENCE A HANDS ON GUIDE TO DIGITAL FORENSICS HB 2024 JAKOBSEN AT Author 1 nos rakesh@cpat 15
63 Practical Cyber Forensics An Incident Based Approach to Forensic Investigations Niranjan Reddy Author 1 nos rakesh@cpat 15
64 Windows Forensics Analyst Field Guide Muhiballah Mohammed Author 1 nos rakesh@cpat 15
65 Digital Forensics Basics A Practical Guide Using Windows OS Nihad A Hassan Author 1 nos rakesh@cpat 15
66 Cyber Forensics Examining Emerging and Hybrid Technologies Jr Marcella Albert J Editor 1 nos rakesh@cpat 15
67 Learning Python for Forensics Second Edition Preston Miller Author Contributor 1 nos rakesh@cpat 15
68 Practical Linux Forensics A Guide for Digital Investigators Bruce Nikkel Author 1 nos rakesh@cpat 15
69 Digital Forensics with Open Source Tools Cory Altheide 1 nos rakesh@cpat 15
70 Practical Forensic Imaging Securing Digital Evidence with Linux Tools Bruce Nikkel Author 1 nos rakesh@cpat 15
71 Practical Memory Forensics Jumpstart effective forensic analysis of volatile memory Svetlana Ostrovskaya Author Oleg Skulkin Author 1 nos rakesh@cpat 15
72 Computer Networking 8e Kurose Author 1 nos rakesh@cpat 15
73 Linux Kernel Networking Implementation and Theory Rami Rosen Author 1 nos rakesh@cpat 15
74 A Bug Hunters Diary A Guided Tour Through the Wilds of Software Security Tobias Klein Author 1 nos rakesh@cpat 15
75 Real World Bug Hunting A Field Guide to web hacking Peter Yaworski Author 1 nos rakesh@cpat 15
76 Black Hat Bash Creative Scripting for Hackers and Pentesters Nick Aleks Author Dolev Farhi Author 1 nos rakesh@cpat 15
77 Blue fox arm assembly internals binary analys iotdevices Maria Markstedter 1 nos rakesh@cpat 15
78 mastering windows security and hardening mark dunkerley author 1 nos rakesh@cpat 15
79 iOS Forensics for Investigators Gianluca tiepolo author contributor 1 nos rakesh@cpat 15
80 The Hardware Hacking Handbook Jasper van Woudenberg Author Colin O Flynn Author 1 nos rakesh@cpat 15
81 Effective Threat Investigation for SOC Analysts Mostafa Yahia Author Contributor 1 nos rakesh@cpat 15
82 Hands on Hacking Become an Expert at Next Gen Penetration Testing and Purple Teaming Matthew Hickey Author Jennifer Arcuri Author 1 nos rakesh@cpat 15
83 Penetration Testing Georgia Weidman Author 1 nos rakesh@cpat 15
84 Mastering active directory third edition Dishan Francis Author Contributor 1 nos rakesh@cpat 15
85 Attacking and Exploiting Modern Web Application Simone Onofri Author Contributor 1 nos rakesh@cpat 15
86 Burp Suite Cookbook Second Edition Dr Sunny Wear Author 1 nos rakesh@cpat 15
87 networking for dummies Doug lowe 1 nos rakesh@cpat 15
88 Bug Bounty Bootcamp vickie Li author 1 nos rakesh@cpat 15
89 CompTIA Security Get Certified Get Ahead SY0 701 Study Guide Joe Shelley Author Darril Gibson Author 1 nos rakesh@cpat 15
90 CompTIA Security SY0 701 Certification Guide Ian Neil Author 1 nos rakesh@cpat 15
91 The Definitive Guide to the Xen Hypervisor Prentice Hall Open Source Software Development David Chisnall Author 1 nos rakesh@cpat 15
92 ISC2 CISSP Certified Information Systems Security Professional Official Study Guide Mike Chapple Author James Michael Stewart Author Darril Gibson Author 1 nos rakesh@cpat 15
93 isc2 Cissp Certified Information Systems Security Professional Official Study Guide and Practice Mike Chapple Author James Michael Stewart Author Darril Gibson Author 1 nos rakesh@cpat 15
94 Cisco CyberOps Associate CBROPS 200 201 Official Cert Guide 1e Omar Santos Author 1 nos rakesh@cpat 15
95 Designing Data Intensive Applications Martin Kleppmann Author 1 nos rakesh@cpat 15
96 System Design Interview 2 books in 1 Cyberedge Press Author Mark Reed Author 1 nos rakesh@cpat 15
97 Extreme C Taking you to the limit in Concurrency OOP Kamran Amini Author 1 nos rakesh@cpat 15
98 WRITING A C COMPILER Nora Sandler Author 1 nos rakesh@cpat 15
99 FUNDAMENTALS OF SOFTWARE ARCHITECTURE AN ENGINEERING APPROACH Mark Richards Author Neal Ford Author Benjamin Lange Narrator 1 nos rakesh@cpat 15
100 Building Microservices Designing Fine Grained Systems Second Edition Grayscale Indian Edition Sam Newman Author 1 nos rakesh@cpat 15
101 Acing the System Design Interview Zhiyong Tan Author 1 nos rakesh@cpat 15
102 Design Patterns Elements of Reusable Object Oriented Software Gamma Erich Author Helm Richard Author Johnson Ralph Author 1 nos rakesh@cpat 15
103 Head First Design Patterns Building Extensible and Maintainable Object Oriented Software Eric Freeman Author Elisabeth Robson Author 1 nos rakesh@cpat 15
104 Design Patterns for Cloud Native Applications Patterns in Practice U Kasun Indrasiri Author Sriskandarajah Suhothayan Author 1 nos rakesh@cpat 15
105 Mastering KVM Virtualization Vedran Dakic 1 nos rakesh@cpat 15
106 Concise Guide to Formal Methods Theory Fundamentals and Industry Applications Gerard ORegan 1 nos rakesh@cpat 15
107 Building Secure Firmware Armoring the Foundation of the Platform Jiewen Yao Vincent Zimmer 1 nos rakesh@cpat 15
108 Cryptography and Network Security Principles and Practice Dr william stallings 1 nos rakesh@cpat 15
109 An Introduction to Practical Formal Methods Using Temporal Logic Michael Fisher 1 nos rakesh@cpat 15
110 INTRODUCTION TO MODERN CRYPTOGRAPHY Katz Jonathan and Lindell Yehuda 1 nos rakesh@cpat 15
111 An introduction to mathematical cryptography Hoffstein 1 nos rakesh@cpat 15
112 Understanding cryptography established symmetric asymmetric christof paar jan pelzl guneysu 1 nos rakesh@cpat 15
113 serious cryptography a practical introduction to modern encryption Jean philippe aumasson 1 nos rakesh@cpat 15
114 security without obscurity a guide to PKI operations Jeff Stapleton W Clay Epstein 1 nos rakesh@cpat 15
115 Zero Trust Security An Enterprise Guide Jason Garbis Jerry W Chapman 1 nos rakesh@cpat 15
116 emerging topics in hardware security PhD tehranipoor mark 1 nos rakesh@cpat 15
117 mastering linux security and hardening Donald a tevault 1 nos rakesh@cpat 15
118 The Hardware Hacking Handbook Jasper van Woudenberg 1 nos rakesh@cpat 15
119 Microelectronics Circuit Analysis and Design Donald Neaman 1 nos rakesh@cpat 15
120 Microelectronic Circuits Sedra and Smith 1 nos rakesh@cpat 15
121 Microelectronics Behzad Razavi 1 nos rakesh@cpat 15
122 Secure processors part 1 background taxonomy for secure enclaves victor vlad costan Ilia lebedev srinivas devadas 1 nos rakesh@cpat 15
123 Computer organization and design the hardware software interface Patterson 1 nos rakesh@cpat 15
124 Introduction to Probability and Stochastic Processes with Applications Liliana Blanco Castaneda Viswanathan Arunachalam Selvamuthu Dharmaraja 1 nos rakesh@cpat 15
125 Signal and Systems Oppenheim Willsky Hamid 1 nos rakesh@cpat 15
126 Digital Logic and Computer Design M Morris Mano 1 nos rakesh@cpat 15
127 Compilers Principles Techniques and Tools Alfred V Aho 1 nos rakesh@cpat 15
128 Communication Systems Simon Haykin 1 nos rakesh@cpat 15
129 The 8051 Microcontrollers and Embedded Systems Mazidi 1 nos rakesh@cpat 15
130 Hands on generative ai with transformers and diffusion models Omar sanseviero pedro cuenca apolinario 1 nos rakesh@cpat 15
131 Build a Large Language Model from Scratch Sebastian raschka 1 nos rakesh@cpat 15
132 Web Application Security Exploitation and Counter measures for Modern Web Applications Andrew hoffman 1 nos rakesh@cpat 15
133 Hands On Machine Learning with Scikit Learn Keras and TensorFlow Aurelien Geron 1 nos rakesh@cpat 15
134 Deep Learning with Python Francois Chollet 1 nos rakesh@cpat 15
135 Data Structures and Algorithms Made Easy Thomas H Cormen 1 nos rakesh@cpat 15
136 Clean Architecture A Craftsmans Guide to Software Structure and Design Robert C Martin 1 nos rakesh@cpat 15
137 Fundamentals of Software Architecture An Engineering Approach Mark Richards Neal Ford 1 nos rakesh@cpat 15
138 Full Stack Development with Spring Boot 3 and React Juha Hinkula 1 nos rakesh@cpat 15
139 Database System Concepts Abraham Silberschatz Henry F Korth SSudarshan 1 nos rakesh@cpat 15
140 Operating system a design oriented approach Charles Crowley 1 nos rakesh@cpat 15
141 The devops handbook how to create world class agility reliability security Gene kim jez patrick debois 1 nos rakesh@cpat 15
142 Docker Deep Dive Zero to Docker in a single book Nigel poulton 1 nos rakesh@cpat 15
143 Machine Learning Engineering with Python Second Edition Andrew mcmahon 1 nos rakesh@cpat 15
144 Designing Data Intensive Applications Martin kleppmann 1 nos rakesh@cpat 15
145 Computer Networks Andrew s tanenbaum 1 nos rakesh@cpat 15
146 Beginning unreal game development foundation for simple to complex games David nixon 1 nos rakesh@cpat 15
147 Digital twin technologies cities internet of things Drmaryam 1 nos rakesh@cpat 15
148 Architectural visualization in unreal engine Ludovico palmeri 1 nos rakesh@cpat 15
149 Selenium Framework Design in DataDriven Testing Build data by Carl Cocchiaro 1 nos rakesh@cpat 15
150 API Testing and Development with Postman Dave Westerveld Packt Publishin 1 nos rakesh@cpat 15
151 Game Theory and Decision Theory in Agent Based Systems Simon D Parsons Springer Verlag 1 nos rakesh@cpat 15
152 Game Theory Understanding the Mathematics of Life Brian Clegg Icon Books 1 nos rakesh@cpat 15
153 Prince of Mathematics M B W Tent CRC Press 1 nos rakesh@cpat 15
154 The Story of Proof Logic and the History of Mathematics John Stillwell Princeton University Pr 1 nos rakesh@cpat 15
155 Reverse Mathematics Proofs from the Inside Out John Stillwell Princeton University Pr 1 nos rakesh@cpat 15
156 what we cannot know Marcus du Sautoy Fourth Estate 1 nos rakesh@cpat 15
157 The Cauchy Schwarz Master Class An Introduction to the Art of Mathematical Inequalities J Michael Steele 1 nos rakesh@cpat 15
158 Debugging The 9 Indispensable Rules for Finding David J AGANS Amacom 1 nos rakesh@cpat 15
159 Clean Code A Handbook of Agile Software Craftsmanship Robert C Martin PHI 1 nos rakesh@cpat 15
160 Clean Architecture 3 Books in 1 Beginners Guide to Learn Software Structures William Vance Joiningthedotstv Limited 1 nos rakesh@cpat 15
161 GAME PROGRAMMING PATTERNS Robert Nystrom Lightning Source Inc 1 nos rakesh@cpat 15
162 Unreal Engine 5 Game Development with Cplusplus scripting Zhenyu George Li Packt Publishing 1 nos rakesh@cpat 15
163 Unreal Engine Cplusplus the Ultimate Developers Handbook Stephen Seth Ulibarri Independently Published 1 nos rakesh@cpat 15
164 Blueprints visual scripting for unreal engine Marcos romero brenden sewell packt publishing 1 nos rakesh@cpat 15
165 Learn Blender Simulations the Right Way Stephen Pearson Packt Publishing 1 nos rakesh@cpat 15
166 Artificial Intelligence in Unreal Engine 5 Marco Secchi Packt Publishing 1 nos rakesh@cpat 15
167 Creating Games with Unreal Engine Kassandra Arevalo Packt Publishing 1 nos rakesh@cpat 15
168 ROS 2 from Scratch Edouard Renard Packt Publishing 1 nos rakesh@cpat 15
169 Roboverse ROS ROS2 and Beyond Roboverse ROS ROS2 and Beyond A Learning Journey through ROS ROS2 NVIDIA Omniverse and Digital Twin Technologie 1 nos rakesh@cpat 15
170 Mastering ROS for Robotics Programming third edition Lentin Joseph Packt Publishing 1 nos rakesh@cpat 15
171 ROS Robotics By Example Second Edition Carol Fairchild Packt Publishing 1 nos rakesh@cpat 15
172 Autonomous Control of Unmanned Aerial Vehicles Victor Becerra Mdpi AG 1 nos rakesh@cpat 15
173 Planning and Decision Making for Aerial Robots Yasmina Bestaoui Sebbane Springer 2014th edition 1 nos rakesh@cpat 15
174 Swarm Intelligence Algorithms Two Volume Set Adam Slowik CRC Press 1st edition 1 nos rakesh@cpat 15
175 Intelligent Autonomous Drones with Cognitive Deep Learning Benjamin Sears David Allen Blubaugh Apress 1st edition 1 nos rakesh@cpat 15
176 Data Structures And Algorithms Made Easy Data Structures And Algorithmic Puzzles Narasimha Karumanchi Careermonk Publications 1 nos rakesh@cpat 15
177 The devops handbook how to create world Gene Kim Jez Humble Revolution Press 2nd edition 1 nos rakesh@cpat 15
178 DevOps Puppet Docker and Kubernetes Thomas Uphill John Arundel Packt Publishing 1 nos rakesh@cpat 15
179 Practical MLOps Operationalizing Machine Learning Models Grayscale Indian Edition Noah Gift Alfredo Deza Oreilly 1st edition 1 nos rakesh@cpat 15
180 Implementing MLOps in the Enterprise Yaron Haviv Noah Gift OReilly 1st edition 1 nos rakesh@cpat 15
181 Bim and 3d Gis Integration for Digital Twins An Itroduction Mohsen Kalantari Christian Clemen CRC Press 1st edition 1 nos rakesh@cpat 15
182 Building Industrial digital twins Shyam varan nath packt publishing 1 nos rakesh@cpat 15
183 Quantum computing since democritus Scott aaronson 1 nos rakesh@cpat 15
184 Quantum continuous variables Alessio serafini 1 nos rakesh@cpat 15
185 Machine learning with quantum computers Maria schuld francesco petruccione 1 nos rakesh@cpat 15
186 Building quantum computers a practical introduction Shayan majidy christopher wilson raymond 1 nos rakesh@cpat 15
187 Quantum computing an applied approach Jack D hidary 1 nos rakesh@cpat 15
188 Quantum machine learning Peter wittek 1 nos rakesh@cpat 15
189 Quantum computation with topological codes Keisuke fujii 1 nos rakesh@cpat 15
190 Quantum computing from linear algebra to physical realizations Mikio nakahara tetsuo ohmi 1 nos rakesh@cpat 15
191 Quantum machine learning a modern approach S karthikeyan 1 nos rakesh@cpat 15
192 Quantum communications and cryptography Alexander v sergienko 1 nos rakesh@cpat 15
193 Gravitation from priceton university Charles wmisner 1 nos rakesh@cpat 15
194 introduction to general relativity cosmology book Jerzy plebanski 1 nos rakesh@cpat 15
195 Quantum communications signals communication technology Gianfranco cariolaro 1 nos rakesh@cpat 15
196 Decision making under deep uncertainty from theory to practice Vincent walker 1 nos rakesh@cpat 15
197 Applications of Game Theory in Deep Learning Springerbriefs in computer science Tanmoy hazra kushal anjaria aditi bajpai 1 nos rakesh@cpat 15
198 Decision and game theory for security 15th International conference Arunesh sinha jie fu quanyan zhu 1 nos rakesh@cpat 15
199 Graph theory with applications to engineering and computer science Narshing Deo 1 nos rakesh@cpat 15
200 Graph Learning and Network Science for Natural Language Processing Muskan Garg Amit Kumar Gupta 1 nos rakesh@cpat 15

Required Documents

1

Experience Criteria

2

Past Performance

3

Bidder Turnover

4

Certificate (Requested in ATC)

5

OEM Authorization Certificate

6

OEM Annual Turnover

7

Additional Doc 1 (Requested in ATC) *In case any bidder is seeking exemption from Experience / Turnover Criteria

8

the supporting documents to prove his eligibility for exemption must be uploaded for evaluation by the buyer

Technical Results

S.No Seller Item Date Status
1GTAC SOLUTIONS PRIVATE LIMITED   Under PMA-05-05-2025 16:54:50Qualified
2KL BOOK HOUSE   Under PMA-07-05-2025 17:23:43Qualified
3Rahul Enterprises   Under PMA-08-05-2025 17:57:46Qualified
4Sterling Book House   Under PMA-07-05-2025 14:20:49Qualified
5VORA BOOK HOUSE   Under PMA-08-05-2025 17:40:41Qualified

Financial Results

Rank Seller Price Item
L1GTAC SOLUTIONS PRIVATE LIMITED(MII)   Under PMA₹6,45,525Item Categories : Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch
L2Sterling Book House (MSE)( MSE Social Category:General )    Under PMA₹7,08,788Item Categories : Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch
L3KL BOOK HOUSE (MSE,MII)( MSE Social Category:General )    Under PMA₹7,13,783Item Categories : Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch
L4VORA BOOK HOUSE (MSE,MII)( MSE Social Category:General )    Under PMA₹7,36,468Item Categories : Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch
L5Rahul Enterprises (MII)   Under PMA₹8,96,000Item Categories : Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch

Contract / Result Documents 3

Please sign in or create an account to view contract details and download result documents.

Frequently Asked Questions

Key insights about BIHAR tender market

What are the eligibility requirements for participation in this tender?

The eligibility requirements include being a registered entity capable of supplying educational materials, demonstrating prior experience in the procurement and supply of books, and compliance with any specific local regulations applicable to education. It is essential that bidders review detailed documentation for any additional qualifications required for this tender.

What types of certificates are required for participation?

Bidders are typically required to provide relevant certificates such as a registration certificate, tax compliance documents, and any certifications that demonstrate quality and compliance with industry standards related to educational materials. Ensuring that these documents are up to date is vital for a successful submission.

What are the accepted formats for document submission?

The accepted document formats for submissions generally include PDF or other electronically verifiable formats specified in the tender documents. It is encouraged that bidders follow the guidelines closely to include all necessary documentation in the correctly specified formats to avoid disqualification.

What payment terms should bidders expect after winning the tender?

Payment terms may vary based on agreement specifics but are typically outlined in the tender documents. Common arrangements may include advance payments, milestone payments upon delivery, or complete payment after successful submission and acceptance of all materials in compliance with the tender’s requirements.

How does the tender support Micro, Small, and Medium Enterprises (MSEs)?

This tender is designed to support MSEs by providing added advantages in the evaluation process. MSEs may receive points towards their qualification assessment, ensuring they have a fair chance of competing against larger entities. Details of these provisions can be found in the official tender documentation.