Tender For corrigendum : providing of operation and maintenance of other machines and plants - comprehensive annual maintenancecontract i.e operation, maintenance,cleaning, security arrangement for theinput coal feeding arrangement towashery (i.e. part of chp fromreclaim feeder complex up toconveyor discharge chute at th-3)with allied auxiliary facilities such as allthe associated systems and sub-systemslike power supply, internal andexternal illumination, control &instrumentation, communication system,dust suppression system, firefighting andplant cleaning systems, pressurization &air conditioning system, ventilationsystem, material handling system (liftingtackles, hoist, monorail etc.), signaling &alarm system, control & monitoringsystem, plc, earthing & lightning protection system, sampling system,etc. of ilbl ocp of lakhanpur area,mcl
Tender For providing of annual maintenance contract of integrated security and surveillance system - annual maintenance contract of cctv systems; comprehensive; networking system, hardware, software; cost of consumables to be provided to service provider based on actuals; branch and divisional office; control room; quart..
Tender For providing of annual maintenance service -data center assets - security systems devices; network/web security appliances; as oem, oem authorised service provider
Tender For providing of annual maintenance service -data center assets - security systems devices; firewall---ngfw; as oem, oem authorised service provider
Tender For supply ,installation , testing and commissioning of integrated security systems consisting cctv surveillance system in the campus of 12bn/rpsf/thk and warranty period of 01 year
Tender For maintenance of electrical installation and fans at hm/dhm, ex. pm, former president of india various bungalow under sd-4/ded-102, new delhi. sub head- providing and installation of digital emergencycalling system at 3 krishna menon road.
Tender For construction of regional centre for national security guard at new town, rajarhat, kolkata, w.b. (sh: providing and fixing of reversible axial fans for ventilation inside central explosive magazine tunnel & escape chamber along with support systems and ancillary works).subwork/packages:providing and fixing of reversible axial fans for ventilation inside central explosive magazine tunnel & escape chamber along with support systems and ancillary works.
Tender For procurement of books - intelligence and data driven threat hunting , learn computer forensics second edition , practical digital forensics , practical cyber forensics an incident based approach to forensic investigations , ethical password cracking decode passwords , automating security detection engineering , practical linux forensics a guide for digital investigators , implementing reverse engineering , practical mobile forensics fourth edition , digital forensics and incident response third edition , digital forensics and incident response a practical guide to using kali linux for cyber investigations , handson network forensics , mastering network forensics practical approach to investigating and defending against network attacks , fundamentals of network forensics a research perspective computer communications and networks , multimedia forensics advances in computer vision and pattern recognition , mastering windows network forensics and investigation , digital forensics with kali linux third edition enhance , learning by practicing mastering tshark network forensics moving from zero to hero , cloud forensics demystified , wireshark for network forensics an essential guide for it and cloud professionals , virtualization and forensics a digital forensic investigators guide to virtual environments , the practice of network security monitor , bayesian networks for probabilistic inference and decision analysis , digital forensics and incident response second edition , practical cyber intelligence a hands on guide to digital forensics hb 2024 , windows forensics analyst field guide , digital forensics basics a practical guide using windows os , cyber forensics examining emerging and hybrid technologies , learning python for forensics second edition , digital forensics with open source tools , practical forensic imaging securing digital evidence with linux tools , practical memory forensics jumpstart effective forensic analysis of volatile memory , computer networking 8e , linux kernel networking implementation and theory , a bug hunters diary a guided tour through the wilds of software security , real world bug hunting a field guide to web hacking , black hat bash creative scripting for hackers and pentesters , blue fox arm assembly internals binary analys iotdevices , mastering windows security and hardening , ios forensics for investigators , the hardware hacking handbook , effective threat investigation for soc analysts , hands on hacking become an expert at next gen penetration testing and purple teaming , penetration testing , mastering active directory third edition , attacking and exploiting modern web application , burp suite cookbook second edition , networking for dummies , bug bounty bootcamp , comptia security get certified get ahead sy0 701 study guide , comptia security sy0 701 certification guide , the definitive guide to the xen hypervisor prentice hall open source software development , isc2 cissp certified information systems security professional official study guide , isc2 cissp certified information systems security professional official study guide and practice , cisco cyberops associate cbrops 200 201 official cert guide 1e , designing data intensive applications , system design interview 2 books in 1 , extreme c taking you to the limit in concurrency oop , writing a c compiler , fundamentals of software architecture an engineering approach , building microservices designing fine grained systems second edition grayscale indian edition , acing the system design interview , design bid details/ 2 / 123 patterns elements of reusable object oriented software , head first design patterns building extensible and maintainable object oriented software , design patterns for cloud native applications patterns in practice u , mastering kvm virtualization , concise guide to formal methods theory fundamentals and industry applications , building secure firmware armoring the foundation of the platform , cryptography an