کتاب های Himanshu
![PLC BASICS COURSE](http://cdn.ketabkoo.com/covers/0/12956-n.jpg)
PLC BASICS COURSE
Himanshu Mishra, 2010![Advanced ASIC Chip Synthesis Using Synopsys Tools](http://cdn.ketabkoo.com/covers/0/16343-n.jpg)
Advanced ASIC Chip Synthesis Using Synopsys Tools
Himanshu Bhatnagar, 2001![Advanced ASIC chip synthesis: using Synopsys Design Compiler, Physical Compiler, and PrimeTime](http://cdn.ketabkoo.com/covers/0/16344-n.jpg)
Advanced ASIC chip synthesis: using Synopsys Design Compiler, Physical Compiler, and PrimeTime
Himanshu Bhatnagar, 2002![Dynamics and Balancing of Multibody Systems](http://cdn.ketabkoo.com/covers/0/50993-n.jpg)
Dynamics and Balancing of Multibody Systems
Dr. Himanshu Chaudhary, Dr. Subir Kumar Saha (auth.), 2009![Hack Proofing Your Network: Internet Tradecraft](http://cdn.ketabkoo.com/covers/0/75189-n.jpg)
Hack Proofing Your Network: Internet Tradecraft
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi, 2000![Advanced ASIC Chip Synthesis: Using Synopsys® Design Compiler™ and PrimeTime®](http://cdn.ketabkoo.com/covers/0/88352-n.jpg)
Advanced ASIC Chip Synthesis: Using Synopsys® Design Compiler™ and PrimeTime®
Himanshu Bhathagar (auth.), 1999![Open Source Mesh Generation and CFD Simulations for Francis Turbine [master's thesis]](http://cdn.ketabkoo.com/covers/1/101335-n.jpg)
Open Source Mesh Generation and CFD Simulations for Francis Turbine [master's thesis]
Himanshu Kapoor, 2014![Big Data Application Architecture Q & A: A Problem-Solution Approach](http://cdn.ketabkoo.com/covers/1/114356-n.jpg)
Big Data Application Architecture Q & A: A Problem-Solution Approach
Nitin Sawant, Himanshu Shah (auth.), 2013![Big Data Application Architecture Q&A: A Problem - Solution Approach](http://cdn.ketabkoo.com/covers/1/114357-n.jpg)
Big Data Application Architecture Q&A: A Problem - Solution Approach
Nitin Sawant, Himanshu Shah, 2013![Big Data Application Architecture Q&A: A Problem - Solution Approach](http://cdn.ketabkoo.com/covers/1/114358-n.jpg)
Big Data Application Architecture Q&A: A Problem - Solution Approach
Nitin Sawant, Himanshu Shah, 2013![Big Data Application Architecture Q&A: A Problem - Solution Approach](http://cdn.ketabkoo.com/covers/1/114359-n.jpg)
Big Data Application Architecture Q&A: A Problem - Solution Approach
Nitin Sawant, Himanshu Shah, 2013![Botnets: The Killer Web Applications](http://cdn.ketabkoo.com/covers/1/129247-n.jpg)
Botnets: The Killer Web Applications
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi, 2006![Essential Computer Security](http://cdn.ketabkoo.com/covers/1/129264-n.jpg)
Essential Computer Security
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi, 2006![Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions](http://cdn.ketabkoo.com/covers/1/129732-n.jpg)
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions
Rich Cannings; Himanshu Dwivedi; Zane Lackey, 2008![Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions](http://cdn.ketabkoo.com/covers/1/129733-n.jpg)
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions
Rich Cannings; Himanshu Dwivedi; Zane Lackey, 2008![Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions](http://cdn.ketabkoo.com/covers/1/129734-n.jpg)
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Rich Cannings, Himanshu Dwivedi, Zane Lackey, 2007![Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions (Hacking Exposed)](http://cdn.ketabkoo.com/covers/1/129735-n.jpg)
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions (Hacking Exposed)
Rich Cannings, Himanshu Dwivedi, Zane Lackey, 2007![Hacking VoIP: Protocols, Attacks, and Countermeasures](http://cdn.ketabkoo.com/covers/1/129873-n.jpg)
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi, 2008![Hacking VoIP: Protocols, Attacks, and Countermeasures](http://cdn.ketabkoo.com/covers/1/129874-n.jpg)
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi, 2008![Hacking VoIP: Protocols, Attacks, and Countermeasures](http://cdn.ketabkoo.com/covers/1/129875-n.jpg)
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi, 2008![Hacking VoIP: Protocols, Attacks, and Countermeasures](http://cdn.ketabkoo.com/covers/1/129876-n.jpg)
Hacking VoIP: Protocols, Attacks, and Countermeasures
Himanshu Dwivedi, 2008![Planning for Community Resilience: A Handbook for Reducing Vulnerability to Disasters](http://cdn.ketabkoo.com/covers/1/138786-n.jpg)
Planning for Community Resilience: A Handbook for Reducing Vulnerability to Disasters
Dr. Jaimie Hicks Masterson, Walter Gillis Peacock, Shannon S. Van Zandt, Himanshu Grover, Lori Feild Schwarz, John T. Cooper Jr. (auth.), 2014![Characterization and Treatment of Textile Wastewater](http://cdn.ketabkoo.com/covers/1/151936-n.jpg)
Characterization and Treatment of Textile Wastewater
Patel, Himanshu; Vashi, R. T, 2015![Characterization and Treatment of Textile Wastewater](http://cdn.ketabkoo.com/covers/1/151937-n.jpg)
Characterization and Treatment of Textile Wastewater
Himanshu Patel, R. T. Vashi, 2015![The Electronic Nose: Artificial Olfaction Technology](http://cdn.ketabkoo.com/covers/1/197630-n.jpg)