List of latest a-t-m Tenders in Indian Tenders. Click on any a-t-m Tenders to view BOQ, NIT and Tender Documents. Get GeM Registration and Bidding Support, Vendor Registration for a-t-m Tenders.
Tender for text-red-selected">advertising business opertext-red-selected">ations btext-red-selected">ased on premium/site rent for dot-btext-red-selected">ased led/btext-red-selected">acklit kiosk poles in vtext-red-selected">arious text-red-selected">aretext-red-selected">as of the city, excluding the previously insttext-red-selected">alled led/btext-red-selected">acklit kiosk poles within the municiptext-red-selected">al limits.
Tender for gem bids for purchtext-red-selected">ase, mettext-red-selected">a sploitthe penetrtext-red-selected">ation testers guide second edition, text-red-selected">applied cryptogrtext-red-selected">aphy protocols, text-red-selected">algorithms text-red-selected">and sourcecode in c, second edition, tribe of htext-red-selected">ackers blue tetext-red-selected">amtribtext-red-selected">al knowledge fromthe best in defensive cybersecurity, countdown to zero dtext-red-selected">ay, future crimes, the text-red-selected">art ofdeception, the text-red-selected">art of invisibility, socitext-red-selected">al engineering thetext-red-selected">art of humtext-red-selected">an htext-red-selected">acking, prtext-red-selected">actictext-red-selected">al mtext-red-selected">alwtext-red-selected">are text-red-selected">antext-red-selected">alysis, industritext-red-selected">al control systemtext-red-selected">and opertext-red-selected">ationtext-red-selected">al technologysecurity, grtext-red-selected">ay htext-red-selected">at htext-red-selected">acking, htext-red-selected">acking exposed wireless, wireshtext-red-selected">ark network text-red-selected">antext-red-selected">alysis, mtext-red-selected">alwtext-red-selected">are text-red-selected">antext-red-selected">alysts cookbook, htext-red-selected">ands on ltext-red-selected">arge ltext-red-selected">angutext-red-selected">age models ltext-red-selected">angutext-red-selected">age understtext-red-selected">andingtext-red-selected">and genertext-red-selected">ation, cyber risk mtext-red-selected">antext-red-selected">agement lessonschtext-red-selected">allenges text-red-selected">and solutions, text-red-selected">advtext-red-selected">anced mtext-red-selected">alwtext-red-selected">are text-red-selected">antext-red-selected">alysis text-red-selected">andintelligence investigtext-red-selected">ating mtext-red-selected">alicious code with sttext-red-selected">atic text-red-selected">anddyntext-red-selected">amic text-red-selected">antext-red-selected">alysis text-red-selected">and thretext-red-selected">at intelligence, htext-red-selected">acking tricks, methods text-red-selected">and offensive strtext-red-selected">ategies digittext-red-selected">al reconntext-red-selected">aisstext-red-selected">ance, network enumertext-red-selected">ation text-red-selected">and system exploittext-red-selected">ation strtext-red-selected">ategies, zero trust networks building secure systems in untrustednetworks, second edition, ukrtext-red-selected">aine, gtext-red-selected">aztext-red-selected">a, ttext-red-selected">aiwtext-red-selected">an text-red-selected">a world text-red-selected">atwtext-red-selected">ar, the russitext-red-selected">a ukrtext-red-selected">aine wtext-red-selected">ar, inditext-red-selected">a btext-red-selected">attlefields fromkurukshetrtext-red-selected">a to btext-red-selected">altext-red-selected">akot incl op sindoor, htext-red-selected">ands on redtetext-red-selected">amttext-red-selected">actics text-red-selected">a prtext-red-selected">actictext-red-selected">al guide to mtext-red-selected">astering red tetext-red-selected">amopertext-red-selected">ations, htext-red-selected">ands on genertext-red-selected">ative text-red-selected">adverstext-red-selected">aritext-red-selected">al networkswith pytorch, ltext-red-selected">arge ltext-red-selected">angutext-red-selected">age models in cybersecuritythretext-red-selected">ats, exposure text-red-selected">and mitigtext-red-selected">ation 2024, htext-red-selected">ands on mtext-red-selected">achineletext-red-selected">arning for cybersecurity 2018, text-red-selected">adverstext-red-selected">aritext-red-selected">al text-red-selected">ai text-red-selected">atttext-red-selected">acks, mitigtext-red-selected">ations, text-red-selected">and defense strtext-red-selected">ategies 2024, building text-red-selected">agentictext-red-selected">ai systems 2024, mtext-red-selected">achine letext-red-selected">arning text-red-selected">and security, mtext-red-selected">alwtext-red-selected">aredevelopment for ethictext-red-selected">al htext-red-selected">ackers, the shellcodershtext-red-selected">andbook, retext-red-selected">ady, relevtext-red-selected">anttext-red-selected">and resurgenttext-red-selected">a blue print fortrtext-red-selected">ansformtext-red-selected">ation of inditext-red-selected">as milittext-red-selected">ary, text-red-selected">adverstext-red-selected">aritext-red-selected">al mtext-red-selected">achineletext-red-selected">arning, gtext-red-selected">ans in text-red-selected">action deep letext-red-selected">arning with genertext-red-selected">ativetext-red-selected">adverstext-red-selected">aritext-red-selected">al networks 2019, htext-red-selected">ands on go progrtext-red-selected">amming, nexus yuvtext-red-selected">al notext-red-selected">ah htext-red-selected">artext-red-selected">ari, e-books, online source of infocyber security concepts, online source of info cybersecurity resetext-red-selected">arch, online source of info text-red-selected">adv cyber techmethodologies, open source for you, pc quest, dtext-red-selected">attext-red-selected">aquest, voice text-red-selected">and dtext-red-selected">attext-red-selected">a, journtext-red-selected">al on digittext-red-selected">al forensics text-red-selected">andcyber security, digit, ntext-red-selected">ationtext-red-selected">al journtext-red-selected">al of cyber securityltext-red-selected">aw, electronics for you, mtext-red-selected">agzter e-subscription, journtext-red-selected">al oftext-red-selected">artificitext-red-selected">al intelligence resetext-red-selected">arch text-red-selected">and text-red-selected">advtext-red-selected">ance, journtext-red-selected">al ofcyber security, interntext-red-selected">ationtext-red-selected">al journtext-red-selected">al of informtext-red-selected">ation securityengineering, interntext-red-selected">ationtext-red-selected">al journtext-red-selected">al of wireless security text-red-selected">andnetworks
Tender for the following civil construction works text-red-selected">are to be underttext-red-selected">aken text-red-selected">atthe bottext-red-selected">anictext-red-selected">al gtext-red-selected">arden in mtext-red-selected">adhertext-red-selected">a under rtext-red-selected">ange deeg, including the construction of text-red-selected">artistic benches text-red-selected">and signtext-red-selected">age, text-red-selected">and the cretext-red-selected">ation of text-red-selected">a city foresttext-red-selected">attext-red-selected">adibtext-red-selected">adri dhtext-red-selected">am.
Tender for reptext-red-selected">air work on the minor bridge from dohtext-red-selected">ariytext-red-selected">a to begmtext-red-selected">abtext-red-selected">ad vitext-red-selected">a km 3 of chtext-red-selected">akoni rotext-red-selected">ad situtext-red-selected">ated text-red-selected">at bhtext-red-selected">akhrtext-red-selected">a river
Tender for insttext-red-selected">alltext-red-selected">ation work of text-red-selected">an open-text-red-selected">air gym netext-red-selected">ar the htext-red-selected">anumtext-red-selected">anji swtext-red-selected">ami temple in btext-red-selected">ahorikpur wtext-red-selected">ard, within the municiptext-red-selected">al limits.