Categories Pricing Corporate


Applications of Prolog
Prolog Techniques
Pilar 2: Web 3.0
Automating Openstack using PHP7
Advanced Messaging Using PHP7 and Symfony 5
Using Concurrency and Parallelism Effectively – II
Parallel Programming Made Simple
Digitalisation: Future
SQL: A Comparative Survey
Database Design and Implementation
Java: Graphical User Interfaces
Windows 7 Install to Secure
Digital Systems Design
Law for Computing Students
An Introduction to Windows Operating System
Perl for Beginners
How to Build Software
Internet and Technology Law: A U.S. Perspective
Understanding Computer Simulation
The Basics of User Experience Design
Using Concurrency and Parallelism Effectively – I
Jump into the Metaverse with SpatialPort
Management of large sets of image data
Policing Cyber Crime
Digital Thinking and Mobile Teaching
PaulOS: Part II
Professional Audio and Video
PaulOS F020: An RTOS for the C8051F020
Tech-Know with Uncle URL
A Step-by-Step R Tutorial
Visual Event Computing
A Practical Introduction to 3D Game Development
Java Data Structures and Algorithms
Pilar 5: Crypto
Metaverse Overview & Impact
Metaverse: Sentiment Analysis
Go Faster!
Mathematics for Computer Scientists
The complete web developer
Windows 8.1
Ubuntu® Linux
Automation and Robotics
An Introduction to Matlab
Electronics and Computing in Textiles
Pilar 3: NFT's
Salesforce Document Generation and Why You Need It
Artificial Intelligence
Pilar 4: DAO's
Programming Security Surveillance Systems
Digital Image Processing: Part I
Systems Analysis and Program Development
PaulOS: Part I
Good Digital Hygiene
Visual Cryptography and Its Applications
Ruby Data Structures and Algorithms
Metaverse Impact & Risks
Ethical Hacking for Beginners
How to do the Final Year Projects
Introduction to Complex Numbers
Introduction to Digital Signal and System Analysis
Digitalisation and Kids
Pilar 1: The Metaverse
Understanding XML: A Software Development Approach
3D Video Processing and Transmission Fundamentals
Systems Analysis and Design
Digital Image Processing: Part II
Fundamentals of Media Security
Large Scale Data Handling in Biology