Progress
Quantity
200
Bid Type
Two Packet Bid
Centre For Development Of Advanced Computing (c-dac) invites bids for Linux Kernel Programming Second Edition, Linux Kernel Debugging, Windows Internals Part 1 System Arch in PATNA, BIHAR. Quantity: 200. Submission Deadline: 08-05-2025 18: 00: 00. Submit your proposal before the deadline.
Main Document
BOQ
BOQ
ATC
GEM_GENERAL_TERMS_AND_CONDITIONS
| Item # | Title | Description | Quantity | Unit | Consignee | Delivery (Days) |
|---|---|---|---|---|---|---|
| 1 | Linux Kernel Programming Second Edition | Kaiwan Billimoria | 1 | nos | rakesh@cpat | 15 |
| 2 | Linux Kernel Debugging | Kaiwan Billimoria | 1 | nos | rakesh@cpat | 15 |
| 3 | Windows Internals Part 1 System Architecture Processes | Brian Calin Jamie Hanrahan | 1 | nos | rakesh@cpat | 15 |
| 4 | Windows Internals Part 2 | Andrea Allievi Mark E | 1 | nos | rakesh@cpat | 15 |
| 5 | Windows Kernel Programming | Pavel Yosifovich | 1 | nos | rakesh@cpat | 15 |
| 6 | Practical Malware Analysis | Michael Sikorski Andrew Honig | 1 | nos | rakesh@cpat | 15 |
| 7 | Mastering Malware Analysis Second Edition | Alexey Kleymenov | 1 | nos | rakesh@cpat | 15 |
| 8 | Malware Development for Ethical Hackers | Zhassulan Zhussupov | 1 | nos | rakesh@cpat | 15 |
| 9 | Malware Data Science | Joshua Saxe Hillary Sanders | 1 | nos | rakesh@cpat | 15 |
| 10 | Malware Analysis Techniques | Dylan Barker | 1 | nos | rakesh@cpat | 15 |
| 11 | Evasive Malware | Kyle Cucci | 1 | nos | rakesh@cpat | 15 |
| 12 | Mastering Malware Analysis | Alexey Kleymenov | 1 | nos | rakesh@cpat | 15 |
| 13 | Malware Analysis and Detection Engineering | Abhijit Mohanta | 1 | nos | rakesh@cpat | 15 |
| 14 | Learning Malware Analysis Explore the concepts tools | Monnappa Ka | 1 | nos | rakesh@cpat | 15 |
| 15 | The Art Of MAC Malware The Guide To Analyzing Malicious Software | Patrick Wardle | 1 | nos | rakesh@cpat | 15 |
| 16 | The Android Malware Handbook Detection and Analysis by Human and Machine | Qian Han Author Salvador Mandujano | 1 | nos | rakesh@cpat | 15 |
| 17 | Evading EDR The definitive Guide to Defeating Endpoint Detection Systems | Matt Hand | 1 | nos | rakesh@cpat | 15 |
| 18 | Learning eBPF programming the linux kernel for enhanced observability | Liz Rice | 1 | nos | rakesh@cpat | 15 |
| 19 | Incident response techniques for ransomware attacks | Oleg skulkin | 1 | nos | rakesh@cpat | 15 |
| 20 | Breaking ransomware | Jitender narula | 1 | nos | rakesh@cpat | 15 |
| 21 | Windows ransomware detection and protection | Marius sandbu | 1 | nos | rakesh@cpat | 15 |
| 22 | Ransomware Analysis Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence | Claudia lanza author abdelkader lahmadi author jrme franois author | 1 | nos | rakesh@cpat | 15 |
| 23 | Ransomware Revealed A Beginners Guide to Protecting and Recovering from Ransomware Attacks | Nihad a hassan | 1 | nos | rakesh@cpat | 15 |
| 24 | Attacking Network Protocols | James forshaw | 1 | nos | rakesh@cpat | 15 |
| 25 | Incident Response for Windows Adapt effective strategies | Anatoly tykushin a | 1 | nos | rakesh@cpat | 15 |
| 26 | Practical Reverse Engineering x86 x64 ARM Windows Kernel Reversing Tools and Obfuscation | Bruce Dang Author Alexandre Gazet | 1 | nos | rakesh@cpat | 15 |
| 27 | Black Hat Python 2nd Edition | Justin Seitz Author Tim Arnold Author | 1 | nos | rakesh@cpat | 15 |
| 28 | Software Reverse Engineering Cracking and Counter Measures Tech Today | Stephanie Domas Author Christopher Domas Author | 1 | nos | rakesh@cpat | 15 |
| 29 | Rootkits And Bootkits | ALEX MATROSOV Eugene Rodionov Sergey Bratus Author | 1 | nos | rakesh@cpat | 15 |
| 30 | The Ghidra Book | Chris Eagle Author Kara Nance Author | 1 | nos | rakesh@cpat | 15 |
| 31 | Practical Binary Analysis | Dennis Andriesse Author | 1 | nos | rakesh@cpat | 15 |
| 32 | Windows Security Internals A Deep Dive into Windows | James Forshaw Author | 1 | nos | rakesh@cpat | 15 |
| 33 | Mastering Linux Security and Hardening Third Edition | Donald A Tevault Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 34 | Hacking APIs | Corey J Ball Author | 1 | nos | rakesh@cpat | 15 |
| 35 | The Art of Memory Forensics Detecting Malware and Threats in Windows Linux and Mac Memory | Michael Ligh Andrew Case | 1 | nos | rakesh@cpat | 15 |
| 36 | Hacking The Art of Exploitation 2nd Ed | Jon Erickson Author | 1 | nos | rakesh@cpat | 15 |
| 37 | Practical Threat Intelligence and Data Driven Threat Hunting | Valentina Costa Gazcon | 1 | nos | rakesh@cpat | 15 |
| 38 | Learn Computer Forensics Second Edition | William Oettinger Author | 1 | nos | rakesh@cpat | 15 |
| 39 | Learn Computer Forensics Second Edition | William Oettinger Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 40 | Practical Digital Forensics | DrAkashdeep Bhardwaj Author | 1 | nos | rakesh@cpat | 15 |
| 41 | Practical Cyber Forensics An Incident Based Approach to Forensic Investigations | Niranjan Reddy Author | 1 | nos | rakesh@cpat | 15 |
| 42 | Ethical Password Cracking Decode passwords | James Leyte Vidal Author | 1 | nos | rakesh@cpat | 15 |
| 43 | Automating Security Detection Engineering | Dennis Chow Author David Bruskin Foreword | 1 | nos | rakesh@cpat | 15 |
| 44 | Practical Linux Forensics A Guide for Digital Investigators | Bruce Nikkel Author | 1 | nos | rakesh@cpat | 15 |
| 45 | Implementing Reverse Engineering | Jitender Narula Author | 1 | nos | rakesh@cpat | 15 |
| 46 | Practical Mobile Forensics Fourth Edition | Rohit Tamma Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 47 | Digital Forensics and Incident Response Third Edition | Gerard Johansen Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 48 | Digital Forensics and Incident Response A practical guide to using Kali Linux for cyber investigations | Deepanshu Khanna Author | 1 | nos | rakesh@cpat | 15 |
| 49 | HandsOn Network Forensics | Nipun Jaswal Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 50 | Mastering Network Forensics practical approach to investigating and defending against network attacks | Nipun Jaswal Author | 1 | nos | rakesh@cpat | 15 |
| 51 | Fundamentals of Network Forensics A Research Perspective Computer Communications and Networks | RC Joshi Author Emmanuel S Pilli Author | 1 | nos | rakesh@cpat | 15 |
| 52 | Multimedia Forensics Advances in Computer Vision and Pattern Recognition | Husrev Taha Sencar Editor Luisa Verdoliva Editor Nasir Memon Editor | 1 | nos | rakesh@cpat | 15 |
| 53 | Mastering Windows Network Forensics and Investigation | Steve Anson Author Steve Bunting Author Ryan Johnson Author Scott Pearson Author | 1 | nos | rakesh@cpat | 15 |
| 54 | Digital Forensics with Kali Linux Third Edition Enhance | Shiva VN Parasram Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 55 | Learning by Practicing Mastering TShark Network Forensics Moving From Zero to Hero | Nik Alleyne Author | 1 | nos | rakesh@cpat | 15 |
| 56 | Cloud Forensics Demystified | Ganesh Ramakrishnan Author Mansoor Haqanee Author | 1 | nos | rakesh@cpat | 15 |
| 57 | Wireshark for Network Forensics An Essential Guide for IT and Cloud Professionals | Nagendra Kumar Nainar Author Ashish Panda Author | 1 | nos | rakesh@cpat | 15 |
| 58 | Virtualization and Forensics A Digital Forensic Investigators Guide to Virtual Environments | Greg Kipper Author Diane Barrett Author | 1 | nos | rakesh@cpat | 15 |
| 59 | The Practice of Network Security Monitor | Richard Bejtlich Author | 1 | nos | rakesh@cpat | 15 |
| 60 | Bayesian Networks for Probabilistic Inference and Decision Analysis | F Taroni Author | 1 | nos | rakesh@cpat | 15 |
| 61 | Digital Forensics and Incident Response Second Edition | Gerard Johansen Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 62 | PRACTICAL CYBER INTELLIGENCE A HANDS ON GUIDE TO DIGITAL FORENSICS HB 2024 | JAKOBSEN AT Author | 1 | nos | rakesh@cpat | 15 |
| 63 | Practical Cyber Forensics An Incident Based Approach to Forensic Investigations | Niranjan Reddy Author | 1 | nos | rakesh@cpat | 15 |
| 64 | Windows Forensics Analyst Field Guide | Muhiballah Mohammed Author | 1 | nos | rakesh@cpat | 15 |
| 65 | Digital Forensics Basics A Practical Guide Using Windows OS | Nihad A Hassan Author | 1 | nos | rakesh@cpat | 15 |
| 66 | Cyber Forensics Examining Emerging and Hybrid Technologies | Jr Marcella Albert J Editor | 1 | nos | rakesh@cpat | 15 |
| 67 | Learning Python for Forensics Second Edition | Preston Miller Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 68 | Practical Linux Forensics A Guide for Digital Investigators | Bruce Nikkel Author | 1 | nos | rakesh@cpat | 15 |
| 69 | Digital Forensics with Open Source Tools | Cory Altheide | 1 | nos | rakesh@cpat | 15 |
| 70 | Practical Forensic Imaging Securing Digital Evidence with Linux Tools | Bruce Nikkel Author | 1 | nos | rakesh@cpat | 15 |
| 71 | Practical Memory Forensics Jumpstart effective forensic analysis of volatile memory | Svetlana Ostrovskaya Author Oleg Skulkin Author | 1 | nos | rakesh@cpat | 15 |
| 72 | Computer Networking 8e | Kurose Author | 1 | nos | rakesh@cpat | 15 |
| 73 | Linux Kernel Networking Implementation and Theory | Rami Rosen Author | 1 | nos | rakesh@cpat | 15 |
| 74 | A Bug Hunters Diary A Guided Tour Through the Wilds of Software Security | Tobias Klein Author | 1 | nos | rakesh@cpat | 15 |
| 75 | Real World Bug Hunting A Field Guide to web hacking | Peter Yaworski Author | 1 | nos | rakesh@cpat | 15 |
| 76 | Black Hat Bash Creative Scripting for Hackers and Pentesters | Nick Aleks Author Dolev Farhi Author | 1 | nos | rakesh@cpat | 15 |
| 77 | Blue fox arm assembly internals binary analys iotdevices | Maria Markstedter | 1 | nos | rakesh@cpat | 15 |
| 78 | mastering windows security and hardening | mark dunkerley author | 1 | nos | rakesh@cpat | 15 |
| 79 | iOS Forensics for Investigators | Gianluca tiepolo author contributor | 1 | nos | rakesh@cpat | 15 |
| 80 | The Hardware Hacking Handbook | Jasper van Woudenberg Author Colin O Flynn Author | 1 | nos | rakesh@cpat | 15 |
| 81 | Effective Threat Investigation for SOC Analysts | Mostafa Yahia Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 82 | Hands on Hacking Become an Expert at Next Gen Penetration Testing and Purple Teaming | Matthew Hickey Author Jennifer Arcuri Author | 1 | nos | rakesh@cpat | 15 |
| 83 | Penetration Testing | Georgia Weidman Author | 1 | nos | rakesh@cpat | 15 |
| 84 | Mastering active directory third edition | Dishan Francis Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 85 | Attacking and Exploiting Modern Web Application | Simone Onofri Author Contributor | 1 | nos | rakesh@cpat | 15 |
| 86 | Burp Suite Cookbook Second Edition | Dr Sunny Wear Author | 1 | nos | rakesh@cpat | 15 |
| 87 | networking for dummies | Doug lowe | 1 | nos | rakesh@cpat | 15 |
| 88 | Bug Bounty Bootcamp | vickie Li author | 1 | nos | rakesh@cpat | 15 |
| 89 | CompTIA Security Get Certified Get Ahead SY0 701 Study Guide | Joe Shelley Author Darril Gibson Author | 1 | nos | rakesh@cpat | 15 |
| 90 | CompTIA Security SY0 701 Certification Guide | Ian Neil Author | 1 | nos | rakesh@cpat | 15 |
| 91 | The Definitive Guide to the Xen Hypervisor Prentice Hall Open Source Software Development | David Chisnall Author | 1 | nos | rakesh@cpat | 15 |
| 92 | ISC2 CISSP Certified Information Systems Security Professional Official Study Guide | Mike Chapple Author James Michael Stewart Author Darril Gibson Author | 1 | nos | rakesh@cpat | 15 |
| 93 | isc2 Cissp Certified Information Systems Security Professional Official Study Guide and Practice | Mike Chapple Author James Michael Stewart Author Darril Gibson Author | 1 | nos | rakesh@cpat | 15 |
| 94 | Cisco CyberOps Associate CBROPS 200 201 Official Cert Guide 1e | Omar Santos Author | 1 | nos | rakesh@cpat | 15 |
| 95 | Designing Data Intensive Applications | Martin Kleppmann Author | 1 | nos | rakesh@cpat | 15 |
| 96 | System Design Interview 2 books in 1 | Cyberedge Press Author Mark Reed Author | 1 | nos | rakesh@cpat | 15 |
| 97 | Extreme C Taking you to the limit in Concurrency OOP | Kamran Amini Author | 1 | nos | rakesh@cpat | 15 |
| 98 | WRITING A C COMPILER | Nora Sandler Author | 1 | nos | rakesh@cpat | 15 |
| 99 | FUNDAMENTALS OF SOFTWARE ARCHITECTURE AN ENGINEERING APPROACH | Mark Richards Author Neal Ford Author Benjamin Lange Narrator | 1 | nos | rakesh@cpat | 15 |
| 100 | Building Microservices Designing Fine Grained Systems Second Edition Grayscale Indian Edition | Sam Newman Author | 1 | nos | rakesh@cpat | 15 |
| 101 | Acing the System Design Interview | Zhiyong Tan Author | 1 | nos | rakesh@cpat | 15 |
| 102 | Design Patterns Elements of Reusable Object Oriented Software | Gamma Erich Author Helm Richard Author Johnson Ralph Author | 1 | nos | rakesh@cpat | 15 |
| 103 | Head First Design Patterns Building Extensible and Maintainable Object Oriented Software | Eric Freeman Author Elisabeth Robson Author | 1 | nos | rakesh@cpat | 15 |
| 104 | Design Patterns for Cloud Native Applications Patterns in Practice U | Kasun Indrasiri Author Sriskandarajah Suhothayan Author | 1 | nos | rakesh@cpat | 15 |
| 105 | Mastering KVM Virtualization | Vedran Dakic | 1 | nos | rakesh@cpat | 15 |
| 106 | Concise Guide to Formal Methods Theory Fundamentals and Industry Applications | Gerard ORegan | 1 | nos | rakesh@cpat | 15 |
| 107 | Building Secure Firmware Armoring the Foundation of the Platform | Jiewen Yao Vincent Zimmer | 1 | nos | rakesh@cpat | 15 |
| 108 | Cryptography and Network Security Principles and Practice | Dr william stallings | 1 | nos | rakesh@cpat | 15 |
| 109 | An Introduction to Practical Formal Methods Using Temporal Logic | Michael Fisher | 1 | nos | rakesh@cpat | 15 |
| 110 | INTRODUCTION TO MODERN CRYPTOGRAPHY | Katz Jonathan and Lindell Yehuda | 1 | nos | rakesh@cpat | 15 |
| 111 | An introduction to mathematical cryptography | Hoffstein | 1 | nos | rakesh@cpat | 15 |
| 112 | Understanding cryptography established symmetric asymmetric | christof paar jan pelzl guneysu | 1 | nos | rakesh@cpat | 15 |
| 113 | serious cryptography a practical introduction to modern encryption | Jean philippe aumasson | 1 | nos | rakesh@cpat | 15 |
| 114 | security without obscurity a guide to PKI operations | Jeff Stapleton W Clay Epstein | 1 | nos | rakesh@cpat | 15 |
| 115 | Zero Trust Security An Enterprise Guide | Jason Garbis Jerry W Chapman | 1 | nos | rakesh@cpat | 15 |
| 116 | emerging topics in hardware security | PhD tehranipoor mark | 1 | nos | rakesh@cpat | 15 |
| 117 | mastering linux security and hardening | Donald a tevault | 1 | nos | rakesh@cpat | 15 |
| 118 | The Hardware Hacking Handbook | Jasper van Woudenberg | 1 | nos | rakesh@cpat | 15 |
| 119 | Microelectronics Circuit Analysis and Design | Donald Neaman | 1 | nos | rakesh@cpat | 15 |
| 120 | Microelectronic Circuits | Sedra and Smith | 1 | nos | rakesh@cpat | 15 |
| 121 | Microelectronics | Behzad Razavi | 1 | nos | rakesh@cpat | 15 |
| 122 | Secure processors part 1 background taxonomy for secure enclaves | victor vlad costan Ilia lebedev srinivas devadas | 1 | nos | rakesh@cpat | 15 |
| 123 | Computer organization and design the hardware software interface | Patterson | 1 | nos | rakesh@cpat | 15 |
| 124 | Introduction to Probability and Stochastic Processes with Applications | Liliana Blanco Castaneda Viswanathan Arunachalam Selvamuthu Dharmaraja | 1 | nos | rakesh@cpat | 15 |
| 125 | Signal and Systems | Oppenheim Willsky Hamid | 1 | nos | rakesh@cpat | 15 |
| 126 | Digital Logic and Computer Design | M Morris Mano | 1 | nos | rakesh@cpat | 15 |
| 127 | Compilers Principles Techniques and Tools | Alfred V Aho | 1 | nos | rakesh@cpat | 15 |
| 128 | Communication Systems | Simon Haykin | 1 | nos | rakesh@cpat | 15 |
| 129 | The 8051 Microcontrollers and Embedded Systems | Mazidi | 1 | nos | rakesh@cpat | 15 |
| 130 | Hands on generative ai with transformers and diffusion models | Omar sanseviero pedro cuenca apolinario | 1 | nos | rakesh@cpat | 15 |
| 131 | Build a Large Language Model from Scratch | Sebastian raschka | 1 | nos | rakesh@cpat | 15 |
| 132 | Web Application Security Exploitation and Counter measures for Modern Web Applications | Andrew hoffman | 1 | nos | rakesh@cpat | 15 |
| 133 | Hands On Machine Learning with Scikit Learn Keras and TensorFlow | Aurelien Geron | 1 | nos | rakesh@cpat | 15 |
| 134 | Deep Learning with Python | Francois Chollet | 1 | nos | rakesh@cpat | 15 |
| 135 | Data Structures and Algorithms Made Easy | Thomas H Cormen | 1 | nos | rakesh@cpat | 15 |
| 136 | Clean Architecture A Craftsmans Guide to Software Structure and Design | Robert C Martin | 1 | nos | rakesh@cpat | 15 |
| 137 | Fundamentals of Software Architecture An Engineering Approach | Mark Richards Neal Ford | 1 | nos | rakesh@cpat | 15 |
| 138 | Full Stack Development with Spring Boot 3 and React | Juha Hinkula | 1 | nos | rakesh@cpat | 15 |
| 139 | Database System Concepts | Abraham Silberschatz Henry F Korth SSudarshan | 1 | nos | rakesh@cpat | 15 |
| 140 | Operating system a design oriented approach | Charles Crowley | 1 | nos | rakesh@cpat | 15 |
| 141 | The devops handbook how to create world class agility reliability security | Gene kim jez patrick debois | 1 | nos | rakesh@cpat | 15 |
| 142 | Docker Deep Dive Zero to Docker in a single book | Nigel poulton | 1 | nos | rakesh@cpat | 15 |
| 143 | Machine Learning Engineering with Python Second Edition | Andrew mcmahon | 1 | nos | rakesh@cpat | 15 |
| 144 | Designing Data Intensive Applications | Martin kleppmann | 1 | nos | rakesh@cpat | 15 |
| 145 | Computer Networks | Andrew s tanenbaum | 1 | nos | rakesh@cpat | 15 |
| 146 | Beginning unreal game development foundation for simple to complex games | David nixon | 1 | nos | rakesh@cpat | 15 |
| 147 | Digital twin technologies cities internet of things | Drmaryam | 1 | nos | rakesh@cpat | 15 |
| 148 | Architectural visualization in unreal engine | Ludovico palmeri | 1 | nos | rakesh@cpat | 15 |
| 149 | Selenium Framework Design in DataDriven Testing Build data | by Carl Cocchiaro | 1 | nos | rakesh@cpat | 15 |
| 150 | API Testing and Development with Postman | Dave Westerveld Packt Publishin | 1 | nos | rakesh@cpat | 15 |
| 151 | Game Theory and Decision Theory in Agent Based Systems | Simon D Parsons Springer Verlag | 1 | nos | rakesh@cpat | 15 |
| 152 | Game Theory Understanding the Mathematics of Life | Brian Clegg Icon Books | 1 | nos | rakesh@cpat | 15 |
| 153 | Prince of Mathematics | M B W Tent CRC Press | 1 | nos | rakesh@cpat | 15 |
| 154 | The Story of Proof Logic and the History of Mathematics | John Stillwell Princeton University Pr | 1 | nos | rakesh@cpat | 15 |
| 155 | Reverse Mathematics Proofs from the Inside Out | John Stillwell Princeton University Pr | 1 | nos | rakesh@cpat | 15 |
| 156 | what we cannot know | Marcus du Sautoy Fourth Estate | 1 | nos | rakesh@cpat | 15 |
| 157 | The Cauchy Schwarz Master Class An Introduction to the Art of Mathematical Inequalities | J Michael Steele | 1 | nos | rakesh@cpat | 15 |
| 158 | Debugging The 9 Indispensable Rules for Finding | David J AGANS Amacom | 1 | nos | rakesh@cpat | 15 |
| 159 | Clean Code A Handbook of Agile Software Craftsmanship | Robert C Martin PHI | 1 | nos | rakesh@cpat | 15 |
| 160 | Clean Architecture 3 Books in 1 Beginners Guide to Learn Software Structures | William Vance Joiningthedotstv Limited | 1 | nos | rakesh@cpat | 15 |
| 161 | GAME PROGRAMMING PATTERNS | Robert Nystrom Lightning Source Inc | 1 | nos | rakesh@cpat | 15 |
| 162 | Unreal Engine 5 Game Development with Cplusplus scripting | Zhenyu George Li Packt Publishing | 1 | nos | rakesh@cpat | 15 |
| 163 | Unreal Engine Cplusplus the Ultimate Developers Handbook | Stephen Seth Ulibarri Independently Published | 1 | nos | rakesh@cpat | 15 |
| 164 | Blueprints visual scripting for unreal engine | Marcos romero brenden sewell packt publishing | 1 | nos | rakesh@cpat | 15 |
| 165 | Learn Blender Simulations the Right Way | Stephen Pearson Packt Publishing | 1 | nos | rakesh@cpat | 15 |
| 166 | Artificial Intelligence in Unreal Engine 5 | Marco Secchi Packt Publishing | 1 | nos | rakesh@cpat | 15 |
| 167 | Creating Games with Unreal Engine | Kassandra Arevalo Packt Publishing | 1 | nos | rakesh@cpat | 15 |
| 168 | ROS 2 from Scratch | Edouard Renard Packt Publishing | 1 | nos | rakesh@cpat | 15 |
| 169 | Roboverse ROS ROS2 and Beyond | Roboverse ROS ROS2 and Beyond A Learning Journey through ROS ROS2 NVIDIA Omniverse and Digital Twin Technologie | 1 | nos | rakesh@cpat | 15 |
| 170 | Mastering ROS for Robotics Programming third edition | Lentin Joseph Packt Publishing | 1 | nos | rakesh@cpat | 15 |
| 171 | ROS Robotics By Example Second Edition | Carol Fairchild Packt Publishing | 1 | nos | rakesh@cpat | 15 |
| 172 | Autonomous Control of Unmanned Aerial Vehicles | Victor Becerra Mdpi AG | 1 | nos | rakesh@cpat | 15 |
| 173 | Planning and Decision Making for Aerial Robots | Yasmina Bestaoui Sebbane Springer 2014th edition | 1 | nos | rakesh@cpat | 15 |
| 174 | Swarm Intelligence Algorithms Two Volume Set | Adam Slowik CRC Press 1st edition | 1 | nos | rakesh@cpat | 15 |
| 175 | Intelligent Autonomous Drones with Cognitive Deep Learning | Benjamin Sears David Allen Blubaugh Apress 1st edition | 1 | nos | rakesh@cpat | 15 |
| 176 | Data Structures And Algorithms Made Easy Data Structures And Algorithmic Puzzles | Narasimha Karumanchi Careermonk Publications | 1 | nos | rakesh@cpat | 15 |
| 177 | The devops handbook how to create world | Gene Kim Jez Humble Revolution Press 2nd edition | 1 | nos | rakesh@cpat | 15 |
| 178 | DevOps Puppet Docker and Kubernetes | Thomas Uphill John Arundel Packt Publishing | 1 | nos | rakesh@cpat | 15 |
| 179 | Practical MLOps Operationalizing Machine Learning Models Grayscale Indian Edition | Noah Gift Alfredo Deza Oreilly 1st edition | 1 | nos | rakesh@cpat | 15 |
| 180 | Implementing MLOps in the Enterprise | Yaron Haviv Noah Gift OReilly 1st edition | 1 | nos | rakesh@cpat | 15 |
| 181 | Bim and 3d Gis Integration for Digital Twins An Itroduction | Mohsen Kalantari Christian Clemen CRC Press 1st edition | 1 | nos | rakesh@cpat | 15 |
| 182 | Building Industrial digital twins | Shyam varan nath packt publishing | 1 | nos | rakesh@cpat | 15 |
| 183 | Quantum computing since democritus | Scott aaronson | 1 | nos | rakesh@cpat | 15 |
| 184 | Quantum continuous variables | Alessio serafini | 1 | nos | rakesh@cpat | 15 |
| 185 | Machine learning with quantum computers | Maria schuld francesco petruccione | 1 | nos | rakesh@cpat | 15 |
| 186 | Building quantum computers a practical introduction | Shayan majidy christopher wilson raymond | 1 | nos | rakesh@cpat | 15 |
| 187 | Quantum computing an applied approach | Jack D hidary | 1 | nos | rakesh@cpat | 15 |
| 188 | Quantum machine learning | Peter wittek | 1 | nos | rakesh@cpat | 15 |
| 189 | Quantum computation with topological codes | Keisuke fujii | 1 | nos | rakesh@cpat | 15 |
| 190 | Quantum computing from linear algebra to physical realizations | Mikio nakahara tetsuo ohmi | 1 | nos | rakesh@cpat | 15 |
| 191 | Quantum machine learning a modern approach | S karthikeyan | 1 | nos | rakesh@cpat | 15 |
| 192 | Quantum communications and cryptography | Alexander v sergienko | 1 | nos | rakesh@cpat | 15 |
| 193 | Gravitation from priceton university | Charles wmisner | 1 | nos | rakesh@cpat | 15 |
| 194 | introduction to general relativity cosmology book | Jerzy plebanski | 1 | nos | rakesh@cpat | 15 |
| 195 | Quantum communications signals communication technology | Gianfranco cariolaro | 1 | nos | rakesh@cpat | 15 |
| 196 | Decision making under deep uncertainty from theory to practice | Vincent walker | 1 | nos | rakesh@cpat | 15 |
| 197 | Applications of Game Theory in Deep Learning Springerbriefs in computer science | Tanmoy hazra kushal anjaria aditi bajpai | 1 | nos | rakesh@cpat | 15 |
| 198 | Decision and game theory for security 15th International conference | Arunesh sinha jie fu quanyan zhu | 1 | nos | rakesh@cpat | 15 |
| 199 | Graph theory with applications to engineering and computer science | Narshing Deo | 1 | nos | rakesh@cpat | 15 |
| 200 | Graph Learning and Network Science for Natural Language Processing | Muskan Garg Amit Kumar Gupta | 1 | nos | rakesh@cpat | 15 |
Experience Criteria
Past Performance
Bidder Turnover
Certificate (Requested in ATC)
OEM Authorization Certificate
OEM Annual Turnover
Additional Doc 1 (Requested in ATC) *In case any bidder is seeking exemption from Experience / Turnover Criteria
the supporting documents to prove his eligibility for exemption must be uploaded for evaluation by the buyer
| S.No | Seller | Item | Date | Status |
|---|---|---|---|---|
| 1 | GTAC SOLUTIONS PRIVATE LIMITED Under PMA | - | 05-05-2025 16:54:50 | Qualified |
| 2 | KL BOOK HOUSE Under PMA | - | 07-05-2025 17:23:43 | Qualified |
| 3 | Rahul Enterprises Under PMA | - | 08-05-2025 17:57:46 | Qualified |
| 4 | Sterling Book House Under PMA | - | 07-05-2025 14:20:49 | Qualified |
| 5 | VORA BOOK HOUSE Under PMA | - | 08-05-2025 17:40:41 | Qualified |
| Rank | Seller | Price | Item |
|---|---|---|---|
| L1 | GTAC SOLUTIONS PRIVATE LIMITED(MII) Under PMA | ₹6,45,525 | Item Categories : Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch |
| L2 | Sterling Book House (MSE)( MSE Social Category:General ) Under PMA | ₹7,08,788 | Item Categories : Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch |
| L3 | KL BOOK HOUSE (MSE,MII)( MSE Social Category:General ) Under PMA | ₹7,13,783 | Item Categories : Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch |
| L4 | VORA BOOK HOUSE (MSE,MII)( MSE Social Category:General ) Under PMA | ₹7,36,468 | Item Categories : Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch |
| L5 | Rahul Enterprises (MII) Under PMA | ₹8,96,000 | Item Categories : Linux Kernel Programming Second Edition,Linux Kernel Debugging,Windows Internals Part 1 System Arch |
Please sign in or create an account to view contract details and download result documents.
Key insights about BIHAR tender market
The eligibility requirements include being a registered entity capable of supplying educational materials, demonstrating prior experience in the procurement and supply of books, and compliance with any specific local regulations applicable to education. It is essential that bidders review detailed documentation for any additional qualifications required for this tender.
Bidders are typically required to provide relevant certificates such as a registration certificate, tax compliance documents, and any certifications that demonstrate quality and compliance with industry standards related to educational materials. Ensuring that these documents are up to date is vital for a successful submission.
The accepted document formats for submissions generally include PDF or other electronically verifiable formats specified in the tender documents. It is encouraged that bidders follow the guidelines closely to include all necessary documentation in the correctly specified formats to avoid disqualification.
Payment terms may vary based on agreement specifics but are typically outlined in the tender documents. Common arrangements may include advance payments, milestone payments upon delivery, or complete payment after successful submission and acceptance of all materials in compliance with the tender’s requirements.
This tender is designed to support MSEs by providing added advantages in the evaluation process. MSEs may receive points towards their qualification assessment, ensuring they have a fair chance of competing against larger entities. Details of these provisions can be found in the official tender documentation.
Sign up now to access all documents
Main Document
BOQ
BOQ
ATC
GEM_GENERAL_TERMS_AND_CONDITIONS