0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (827)
  • R500+ (14,103)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

The Web Application Hacker's Handbook: Finding and  Exploiting Security Flaws 2e (Paperback, 2nd Edition): D Stuttard The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2e (Paperback, 2nd Edition)
D Stuttard
R1,354 R1,111 Discovery Miles 11 110 Save R243 (18%) Ships in 12 - 19 working days

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. * Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition * Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more * Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws. Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.

Resource Allocation with Carrier Aggregation in Cellular Networks - Optimality and Spectrum Sharing using C++ and MATLAB... Resource Allocation with Carrier Aggregation in Cellular Networks - Optimality and Spectrum Sharing using C++ and MATLAB (Hardcover, 1st ed. 2018)
Haya Shajaiah, Ahmed Abdelhadi, Charles Clancy
R4,551 Discovery Miles 45 510 Ships in 12 - 19 working days

This book introduces an efficient resource management approach for future spectrum sharing systems. The book focuses on providing an optimal resource allocation framework based on carrier aggregation to allocate multiple carriers' resources efficiently among mobile users. Furthermore, it provides an optimal traffic dependent pricing mechanism that could be used by network providers to charge mobile users for the allocated resources. The book provides different resource allocation with carrier aggregation solutions, for different spectrum sharing scenarios, and compares them. The provided solutions consider the diverse quality of experience requirement of multiple applications running on the user's equipment since different applications require different application performance. In addition, the book addresses the resource allocation problem for spectrum sharing systems that require user discrimination when allocating the network resources.

AD HOC NETWORKS - Technologies and Protocols (Hardcover, 2005 ed.): Prasant Mohapatra, Srikanth Krishnamurthy AD HOC NETWORKS - Technologies and Protocols (Hardcover, 2005 ed.)
Prasant Mohapatra, Srikanth Krishnamurthy
R4,377 Discovery Miles 43 770 Ships in 10 - 15 working days

AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. Contributors to this volume include experts that have been active in ad hoc network research and have published in the premier conferences and journals in this subject area.

AD HOC NETWORKS: Protocols and Technologies will be immensely useful as a reference work to engineers and researchers as well as to advanced level students in the areas of wireless networks, and computer networks.

Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.): Enrico Nardelli, Sabina... Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.)
Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo
R3,046 Discovery Miles 30 460 Ships in 10 - 15 working days

This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme "An Architecture for Information Se curity Management," and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was "E-Government and Security" and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada)."

Cognitive Wireless Networks - Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications... Cognitive Wireless Networks - Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications (Hardcover, 2007 ed.)
Frank H. P. Fitzek, Marcos D. Katz
R3,037 Discovery Miles 30 370 Ships in 10 - 15 working days

This book presents a detailed overview of a rapidly emerging topic in modern communications: cognitive wireless networks. The key aspects of cognitive and cooperative principles in wireless networks are discussed in this book. Furthermore, 'Cognitive Wireless Networks' advocates the concept of breaking up the cellular communication architecture by introducing cooperative strategies among wireless devices. Cognitive wireless networking is the key to success in handling the upcoming dynamic network configurations and exploiting this cross-over to the fullest extent.

Wimax: Service Standards and Resource Allocation (Hardcover): Timothy Kolaya Wimax: Service Standards and Resource Allocation (Hardcover)
Timothy Kolaya
R3,412 R3,083 Discovery Miles 30 830 Save R329 (10%) Ships in 10 - 15 working days
Network Intrusion Detection and Prevention - Concepts and Techniques (Hardcover, 2010 ed.): Ali A. Ghorbani, Wei Lu, Mahbod... Network Intrusion Detection and Prevention - Concepts and Techniques (Hardcover, 2010 ed.)
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee
R4,284 Discovery Miles 42 840 Ships in 12 - 19 working days

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones.

Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.

Securing Web Services - Practical Usage of Standards and Specifications (Hardcover): Panos Periorellis Securing Web Services - Practical Usage of Standards and Specifications (Hardcover)
Panos Periorellis
R4,999 Discovery Miles 49 990 Ships in 10 - 15 working days

'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.

Creative Urban Regions - Harnessing Urban Technologies to Support Knowledge City Initiatives (Hardcover): Tan Yigitcanlar,... Creative Urban Regions - Harnessing Urban Technologies to Support Knowledge City Initiatives (Hardcover)
Tan Yigitcanlar, Koray Velibeyoglu, Scott Baum
R4,985 Discovery Miles 49 850 Ships in 10 - 15 working days

In a knowledge economy urban form and functions are primarily shaped by global market forces rather than urban planning. As the role of knowledge in wealth creation becomes a critical issue in cities, urban administrations and planners need to discover new approaches to harness the considerable opportunities of abstract production for a global order. ""Creative Urban Regions"" explores the utilization of urban technology to support knowledge city initiatives, providing scholars and practitioners with essential fundamental techniques and processes for the successful integration of information technologies and urban production. Converging timely research on a multitude of cutting-edge urban information communication technology issues, this ""Premier Reference Source"" will make a valuable addition to every reference library.

Design Methodologies for Secure Embedded Systems - Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss (Hardcover, 2011 ed.):... Design Methodologies for Secure Embedded Systems - Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss (Hardcover, 2011 ed.)
Alexander Biedermann, Gregor H Molter
R4,473 Discovery Miles 44 730 Ships in 10 - 15 working days

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

Satellite Network Robust QoS-aware Routing (Hardcover, 2014 ed.): Fei Long Satellite Network Robust QoS-aware Routing (Hardcover, 2014 ed.)
Fei Long
R3,430 Discovery Miles 34 300 Ships in 12 - 19 working days

"Satellite Network Robust QoS-aware Routing" presents a novel routing strategy for satellite networks. This strategy is useful for the design of multi-layered satellite networks as it can greatly reduce the number of time slots in one system cycle. The traffic prediction and engineering approaches make the system robust so that the traffic spikes can be handled effectively. The multi-QoS optimization routing algorithm can satisfy various potential user requirements. Clear and sufficient illustrations are also presented in the book. As the chapters cover the above topics independently, readers from different research backgrounds in constellation design, multi-QoS routing, and traffic engineering can benefit from the book.

Fei Long is a senior engineer at Beijing R&D Center of 54th Research Institute of China Electronics Technology Group Corporation.

Lighter than Air Robots - Guidance and Control of Autonomous Airships (Hardcover, 2012 ed.): Yasmina Bestaoui Sebbane Lighter than Air Robots - Guidance and Control of Autonomous Airships (Hardcover, 2012 ed.)
Yasmina Bestaoui Sebbane
R2,897 Discovery Miles 28 970 Ships in 10 - 15 working days

An aerial robot is a system capable of sustained flight with no direct human control and able to perform a specific task. A lighter than air robot is an aerial robot that relies on the static lift to balance its own weight. It can also be defined as a lighter than air unmanned aerial vehicle or an unmanned airship with sufficient autonomy. Lighter than air systems are particularly appealing since the energy to keep them airborne is small. They are increasingly considered for various tasks such as monitoring, surveillance, advertising, freight carrier, transportation.

This book familiarizes readers with a hierarchical decoupled planning and control strategy that has been proven efficient through research. It is made up of a hierarchy of modules with well defined functions operating at a variety of rates, linked together from top to bottom. The outer loop, closed periodically, consists of a discrete search that produces a set of waypoints leading to the goal while avoiding obstacles and weighed regions. The second level smoothes this set so that the generated paths are feasible given the vehicle's velocity and accelerations limits. The third level generates flyable, timed trajectories and the last one is the tracking controller that attempts to minimize the error between the robot measured trajectory and the reference trajectory.

This hierarchy is reflected in thestructure and contentof the book. Topics treated are: Modelling, Flight Planning, Trajectory Design and Control. Finally, some actual projects are described in the appendix. This volume will prove useful for researchers and practitioners working in Robotics and Automation, Aerospace Technology, Control and Artificial Intelligence.

"

Managed Grids and Cloud Systems in the Asia-Pacific Research Community (Hardcover, 2010 ed.): Simon C. Lin, Eric Yen Managed Grids and Cloud Systems in the Asia-Pacific Research Community (Hardcover, 2010 ed.)
Simon C. Lin, Eric Yen
R5,791 Discovery Miles 57 910 Ships in 10 - 15 working days

ISGC 2009, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan in April 2009 bringing together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and introduce future development in the field of Grid Computing. Managed Grids and Cloud Systems in the Asia-Pacific Research Community presents the latest achievements in grid technology including Cloud Computing. This volume also covers international projects in Grid Operation, Grid Middleware, E-Science applications, technical developments in grid operations and management, Security and Networking, Digital Library and more. The resources used to support these advances, such as volunteer grids, production managed grids, and cloud systems are discussed in detail. This book is designed for a professional audience composed of grid users, developers and researchers working in the grid computing. Advanced-level students focusing on computer science and engineering will find this book valuable as a reference or secondary text book.

Biometric-Based Physical and Cybersecurity Systems (Hardcover, 1st ed. 2019): Mohammad S. Obaidat, Issa Traore, Isaac Woungang Biometric-Based Physical and Cybersecurity Systems (Hardcover, 1st ed. 2019)
Mohammad S. Obaidat, Issa Traore, Isaac Woungang
R4,469 Discovery Miles 44 690 Ships in 10 - 15 working days

This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.

Network Management in Wired and Wireless Networks (Hardcover, 2002 ed.): Tejinder S. Randhawa, Stephen Hardy Network Management in Wired and Wireless Networks (Hardcover, 2002 ed.)
Tejinder S. Randhawa, Stephen Hardy
R4,489 Discovery Miles 44 890 Ships in 10 - 15 working days

This title addresses various open issues related to performance monitoring, performance management and performance control. It covers the performance management aspects of broadband wired and wireless cellular networks in an integrated fashion, and highlights the role of performance management in assisting network control procedures.

Economics of Information Security and Privacy (Hardcover, 2010 Ed.): Tyler Moore, David Pym, Christos Ioannidis Economics of Information Security and Privacy (Hardcover, 2010 Ed.)
Tyler Moore, David Pym, Christos Ioannidis
R5,771 Discovery Miles 57 710 Ships in 10 - 15 working days

The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.

Corporate Portals Empowered with XML and Web Services (Paperback): Anura Guruge Corporate Portals Empowered with XML and Web Services (Paperback)
Anura Guruge
R1,195 Discovery Miles 11 950 Ships in 12 - 19 working days

Following the humbling of the 'dot.coms' it is well implemented corporate portals that are ushering in a new and prosperous era of e-business. Corporate Portals Empowered with XML and Web Services provides decision makers with a clear and concise explanation of what portals are all about, why you really need a portal strategy, how you go about implementing one, and the issues you have to encounter and surmount. Guruge shows how you can successfully use XML and web services to empower your portals for collaboration, knowledge management, CRM, ERP and supply chain management.
.Extensive examples of corporate portals illustrate the viability of the technology
.Architectural and network diagrams show detailed portal implementations
.Comprehensive references to guides, solutions, products and terminology leverage living outside resources

Expert Network Time Protocol - An Experience in Time with NTP (Hardcover, 1st ed.): Peter Rybaczyk Expert Network Time Protocol - An Experience in Time with NTP (Hardcover, 1st ed.)
Peter Rybaczyk
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

Have you ever tried to figure out why your computer clock is off, or why your emails somehow have the wrong timestamp? Most likely, its due to an incorrect network time synchronization, which can be reset using the Network Time Protocol. Until now, most network administrators have been too paranoid to work with this, afraid that they would make the problem even worse. However, Expert Network Time Protocol: An Experience in Time with NTP takes the mystery out of time, and shows the network administrator how to regain the upper hand.

This book is a fascinating look into NTP, and the stories behind the science. Written by Peter Rybaczyk, one of the foremost experts on NTP, this book will show the Network Administrator how to become more comfortable working with time.-->Table of Contents-->Multiple Views of TimeNetwork Administration and IT Trends Throughout History!NTP Operational, Historical, and Futuristic OverviewNTP ArchitectureNTP Design, Configuration, and Troubleshooting

Self-Repair Networks - A Mechanism Design (Hardcover, 1st ed. 2015): Yoshiteru Ishida Self-Repair Networks - A Mechanism Design (Hardcover, 1st ed. 2015)
Yoshiteru Ishida
R3,758 R3,476 Discovery Miles 34 760 Save R282 (8%) Ships in 12 - 19 working days

This book describes the struggle to introduce a mechanism that enables next-generation information systems to maintain themselves. Our generation observed the birth and growth of information systems, and the Internet in particular. Surprisingly information systems are quite different from conventional (energy, material-intensive) artificial systems, and rather resemble biological systems (information-intensive systems). Many artificial systems are designed based on (Newtonian) physics assuming that every element obeys simple and static rules; however, the experience of the Internet suggests a different way of designing where growth cannot be controlled but self-organized with autonomous and selfish agents. This book suggests using game theory, a mechanism design in particular, for designing next-generation information systems which will be self-organized by collective acts with autonomous components. The challenge of mapping a probability to time appears repeatedly in many forms throughout this book. The book contains interdisciplinary research encompassing game theory, complex systems, reliability theory and particle physics. All devoted to its central theme: what happens if systems self-repair themselves?

Continued Rise of the Cloud - Advances and Trends in Cloud Computing (Hardcover, 2014 ed.): Zaigham Mahmood Continued Rise of the Cloud - Advances and Trends in Cloud Computing (Hardcover, 2014 ed.)
Zaigham Mahmood
R4,627 R2,221 Discovery Miles 22 210 Save R2,406 (52%) Ships in 12 - 19 working days

This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of expert researchers and practitioners. Features: presents a focus on security and access control mechanisms for cloud environments, analyses standards and brokerage services, and investigates the role of certification for cloud adoption; evaluates cloud ERP, suggests a framework for implementing "big data" science, and proposes an approach for cloud interoperability; reviews existing elasticity management solutions, discusses the relationship between cloud management and governance, and describes the development of a cloud service capability assessment model; examines cloud applications in higher education, including the use of knowledge-as-a-service in the provision of education, and cloud-based e-learning for students with disabilities.

Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover)
Information Reso Management Association
R10,649 Discovery Miles 106 490 Ships in 10 - 15 working days
Telecommunication Networks - Trends and Developments (Hardcover): Mohammad Abdul Matin Telecommunication Networks - Trends and Developments (Hardcover)
Mohammad Abdul Matin
R3,317 Discovery Miles 33 170 Ships in 10 - 15 working days
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24,... ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Audun Josang, Lynn Futcher, Janne Hagen
R4,182 Discovery Miles 41 820 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.

Dictionary of Acronyms and Technical Abbreviations - For Information and Communication Technologies and Related Areas... Dictionary of Acronyms and Technical Abbreviations - For Information and Communication Technologies and Related Areas (Hardcover, 2nd ed. 2001)
Jakob Vlietstra
R3,023 Discovery Miles 30 230 Ships in 10 - 15 working days

This dictionary is a collection of technical abbreviations and acronyms used in information and communication technologies and other industrial activities. They are used in industries, institutes, organisations and universities, all too often without mentioning their meaning. Areas covered by this dictionary are Information and Communication Technology (ICT), including hardware and software; Information Networks, including the Internet and the World Wide Web; Automatic Control; and ICT-related Computer-Aided Techniques and Activities. Apart from the technical terms this dictionary also lists abbreviated names of relevant organisations, conferences, symposia and workshops. This reference book is important for all practitioners and users in the areas mentioned above and those who consult or write technical material (manuals, guides, books, articles, marketing and teaching material). These publications often omit the meaning of acronyms and confront the reader with jargon too often difficult to understand. This edition contains over 33,000 items and differs from the previous one by deleting obsolete terms and less relevant acronyms. Ten thousand new items have been added.

Sustainable Cloud and Energy Services - Principles and Practice (Hardcover, 1st ed. 2018): Wilson Rivera Sustainable Cloud and Energy Services - Principles and Practice (Hardcover, 1st ed. 2018)
Wilson Rivera
R4,620 Discovery Miles 46 200 Ships in 12 - 19 working days

This is the first book entirely devoted to providing a perspective on the state-of-the-art of cloud computing and energy services and the impact on designing sustainable systems. Cloud computing services provide an efficient approach for connecting infrastructures and can support sustainability in different ways. For example, the design of more efficient cloud services can contribute in reducing energy consumption and environmental impact. The chapters in this book address conceptual principles and illustrate the latest achievements and development updates concerning sustainable cloud and energy services. This book serves as a useful reference for advanced undergraduate students, graduate students and practitioners interested in the design, implementation and deployment of sustainable cloud based energy services. Professionals in the areas of power engineering, computer science, and environmental science and engineering will find value in the multidisciplinary approach to sustainable cloud and energy services presented in this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computational Linguistics and Talking…
Roland Hausser Hardcover R3,151 Discovery Miles 31 510
Multi-Threaded Object-Oriented MPI-Based…
Jean-Marc Adamo Hardcover R4,462 Discovery Miles 44 620
Fullstack D3 and Data Visualization…
Amelia Wattenberger Hardcover R2,707 Discovery Miles 27 070
Guide to Fortran 2008 Programming
Walter S. Brainerd Hardcover R2,550 Discovery Miles 25 500
Starting Out with Java: From Control…
Tony Gaddis Paperback R2,691 Discovery Miles 26 910
PHP Programming For Beginners - The…
Tim Warren Hardcover R596 R540 Discovery Miles 5 400
Using UML - Software Engineering with…
Perdita Stevens Paperback R2,462 Discovery Miles 24 620
Web-Based Services - Concepts…
Information Reso Management Association Hardcover R18,336 Discovery Miles 183 360
Eyetracking and Applied Linguistics
Silvia Hansen-Schirra, Sambor Grucza Hardcover R900 Discovery Miles 9 000
Data Structures & Algorithms in Java 6e…
M.T. Goodrich Paperback R1,482 Discovery Miles 14 820

 

Partners