0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,585)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Distance Learning Technology and Applications (Hardcover): Daniel Minoli Distance Learning Technology and Applications (Hardcover)
Daniel Minoli
R2,775 Discovery Miles 27 750 Ships in 18 - 22 working days

An all-encompassing guide to the business, engineering, and regulatory factors shaping the growth of the distance learning industry. This book examines potential providers, users, applications, and problem solutions, and includes actual case studies. An outstanding reference for educators, network service providers, public policy makers, and graduate level engineering students specializing in telecommunications.

Handbook of Signal Processing Systems (Hardcover, Edition.): Shuvra S. Bhattacharyya, Ed F. Deprettere, Rainer Leupers, Jarmo... Handbook of Signal Processing Systems (Hardcover, Edition.)
Shuvra S. Bhattacharyya, Ed F. Deprettere, Rainer Leupers, Jarmo Takala
R5,392 Discovery Miles 53 920 Ships in 18 - 22 working days

It gives me immense pleasure to introduce this timely handbook to the research/- velopment communities in the ?eld of signal processing systems (SPS). This is the ?rst of its kind and represents state-of-the-arts coverage of research in this ?eld. The driving force behind information technologies (IT) hinges critically upon the major advances in both component integration and system integration. The major breakthrough for the former is undoubtedly the invention of IC in the 50's by Jack S. Kilby, the Nobel Prize Laureate in Physics 2000. In an integrated circuit, all components were made of the same semiconductor material. Beginning with the pocket calculator in 1964, there have been many increasingly complex applications followed. In fact, processing gates and memory storage on a chip have since then grown at an exponential rate, following Moore's Law. (Moore himself admitted that Moore's Law had turned out to be more accurate, longer lasting and deeper in impact than he ever imagined. ) With greater device integration, various signal processing systems have been realized for many killer IT applications. Further breakthroughs in computer sciences and Internet technologies have also catalyzed large-scale system integration. All these have led to today's IT revolution which has profound impacts on our lifestyle and overall prospect of humanity. (It is hard to imagine life today without mobiles or Internets ) The success of SPS requires a well-concerted integrated approach from mul- ple disciplines, such as device, design, and application.

Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover): Amy Wenxuan Ding Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover)
Amy Wenxuan Ding
R4,210 Discovery Miles 42 100 Ships in 18 - 22 working days

The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. ""Social Computing in Homeland Security: Disaster Promulgation and Response"" presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.

The Mobile Communications Handbook (Hardcover, 2nd ed. 1999): Jerry D. Gibson The Mobile Communications Handbook (Hardcover, 2nd ed. 1999)
Jerry D. Gibson
R5,340 Discovery Miles 53 400 Ships in 18 - 22 working days

In a single volume, The Mobile Communications Handbook covers the entire field, from principles of analog and digital communications to cordless telephones, wireless local area networks (LANs), and international technology standards. The tremendous scope of this second edition ensures that it will be the primary reference for every aspect of mobile communications. Details and references follow preliminary discussions, ensuring that the reader obtains the most accurate information available on the particular topic.

Peer-to-Peer Video - The Economics, Policy, and Culture of Today's New Mass Medium (Hardcover, 2008 ed.): Eli M. Noam,... Peer-to-Peer Video - The Economics, Policy, and Culture of Today's New Mass Medium (Hardcover, 2008 ed.)
Eli M. Noam, Lorenzo Maria Pupillo
R2,830 Discovery Miles 28 300 Ships in 18 - 22 working days

Peer-to-Peer (P2P) networks allow individuals to share digital content files in real time. They facilitate communication and promote community without hierarchy or strict control. This book applies economic principles to analyze and understand the P2P phenomenon. It also provides numerous contemporary examples from the US and around the world to shed light on the implications of P2P as a mass medium, considering such issues as pricing, licensing, security, and regulation.

Data Communications and Networking: Volume I (Hardcover): Michel Levine Data Communications and Networking: Volume I (Hardcover)
Michel Levine
R3,155 R2,857 Discovery Miles 28 570 Save R298 (9%) Ships in 18 - 22 working days
Computer-Mediated Communication (Hardcover): Indrakshi Dey Computer-Mediated Communication (Hardcover)
Indrakshi Dey
R3,069 Discovery Miles 30 690 Ships in 18 - 22 working days
Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017): Chungwei Lin, Alberto... Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017)
Chungwei Lin, Alberto Sangiovanni-Vincentelli
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.

WirelessHART (TM) - Real-Time Mesh Network for Industrial Automation (Hardcover, 2010 ed.): Deji Chen, Mark Nixon, Aloysius Mok WirelessHART (TM) - Real-Time Mesh Network for Industrial Automation (Hardcover, 2010 ed.)
Deji Chen, Mark Nixon, Aloysius Mok
R2,810 Discovery Miles 28 100 Ships in 18 - 22 working days

The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.

AWS Elastic Beanstalk Developer Guide (Hardcover): Documentation Team AWS Elastic Beanstalk Developer Guide (Hardcover)
Documentation Team
R2,967 Discovery Miles 29 670 Ships in 18 - 22 working days
Phase and Phase-Difference Modulation in Digital Communications (Hardcover): Yuriy Okunev Phase and Phase-Difference Modulation in Digital Communications (Hardcover)
Yuriy Okunev
R4,384 Discovery Miles 43 840 Ships in 18 - 22 working days

Learn how and when to apply the latest phase and phase-difference modulation (PDM) techniques with this valuable guide for systems engineers and researchers. It helps you cut design time and fine-tune system performance.

Cyber Security in Business and Management (Hardcover): Stephen Mason Cyber Security in Business and Management (Hardcover)
Stephen Mason
R3,055 R2,770 Discovery Miles 27 700 Save R285 (9%) Ships in 18 - 22 working days
Multi-Technology Positioning (Hardcover, 1st ed. 2017): Jari Nurmi, Elena Simona Lohan, Henk Wymeersch, Gonzalo Seco-Granados,... Multi-Technology Positioning (Hardcover, 1st ed. 2017)
Jari Nurmi, Elena Simona Lohan, Henk Wymeersch, Gonzalo Seco-Granados, Ossi Nykanen
R4,434 Discovery Miles 44 340 Ships in 10 - 15 working days

This book provides an overview of positioning technologies, applications and services in a format accessible to a wide variety of readers. Readers who have always wanted to understand how satellite-based positioning, wireless network positioning, inertial navigation, and their combinations work will find great value in this book. Readers will also learn about the advantages and disadvantages of different positioning methods, their limitations and challenges. Cognitive positioning, adding the brain to determine which technologies to use at device runtime, is introduced as well. Coverage also includes the use of position information for Location Based Services (LBS), as well as context-aware positioning services, designed for better user experience.

Cyber Security Awareness for Lawyers (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Lawyers (Paperback)
David Willson, Henry Dalziel
R1,104 Discovery Miles 11 040 Ships in 10 - 15 working days

Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.

Eleventh Hour Security+ - Exam SY0-201 Study Guide (Paperback): Ido Dubrawsky Eleventh Hour Security+ - Exam SY0-201 Study Guide (Paperback)
Ido Dubrawsky
R733 Discovery Miles 7 330 Ships in 10 - 15 working days

This book will focus on just the essentials needed to pass the Security+ certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours. The book will include: Exam Objectives Fast Track Review Key words/definitions Five Toughest questions and their answers Exam Warnings What to pay attention to

The only book keyed to the new SY0-201 objectives that has been crafted for last minute cramming
Easy to find, essential material with no fluff this book does not talk about security in general, just how it applies to the test
Includes review of five toughest questions by topic - sure to improve your score

Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.): Christoph Boehm, Maximilian Hofer Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.)
Christoph Boehm, Maximilian Hofer
R4,190 R3,389 Discovery Miles 33 890 Save R801 (19%) Ships in 10 - 15 working days

In "Physical Unclonable Functions in Theory and Practice," the authorspresent an in-depth overview ofvarious topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits.

Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit s perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement resultsDifferent error rate reducing pre-selection techniques

This monographgives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic."

Broadband Satellite Communications for Internet Access (Hardcover, 2004 ed.): Sastri L Kota, Kaveh Pahlavan, Pentti A. Leppanen Broadband Satellite Communications for Internet Access (Hardcover, 2004 ed.)
Sastri L Kota, Kaveh Pahlavan, Pentti A. Leppanen
R4,087 Discovery Miles 40 870 Ships in 18 - 22 working days

"This book is by far the most comprehensive and orderly treatment of the subject. It is the work of experts with a wealth of both theoretical and practical experience with the subject and its connecting disciplines. It is an integral work... concepts and notation are at the same consistent level throughout the book. Quality of Service (QoS) is an absolutely critical part of any telecommunication services. This work fills a gap in the literature of what possibilities there are for satellites in providing global Internet services." Excerpted from the Foreword by Raymond L. Pickholtz, The George Washington University
Broadband Satellite Communications for Internet Access is a systems engineering methodology for satellite communication networks. It discusses the implementation of Internet applications that involve network design issues usually addressed in standard organizations. Various protocols for IP- and ATM-based networks are examined and a comparative performance evaluation of different alternatives is described. This methodology can be applied to similar evaluations over any other transport medium.
This book, suitable as a teaching text as well as a reference, covers:
-Satellite networks: technology, history and broadband communication satellites planned and launched into service.
-Trends Analysis: satellite networks covering physical, MAC, IP, transport layer protocols with an emphasis on TCP enhancements to account for fading, errors, noise, Doppler shifts and nomadic behavior.
-Quality of Service (QoS): end-to-end QoS model, framework and architectures including IntServ, DiffServ and MPLS traffic engineering for satellite IP networks, application QoS mapping.
-Satellite IP: design and implementation, DiffServ based QoS performance models for TCP and UDP traffic for GEO and MEO configurations.
-Interactive Multimedia over Satellite: TDMA and CDMA based return channel protocol models and analysis for DVB-RCS networks.
-Satellite ATM: analysis of fundamental questions (e.g. buffer requirements, TCP/ATM, efficiency, fairness, and multiple access models).
-International Standards: definitions, processes and agreed objectives for satellite IP and satellite ATM networks-ITU-R, ITU-T, IETF, ETSI, ATM Forum.
Whether you're a researcher, systems engineer, or a telecommunications/network specialist, Broadband Satellite Communications for Internet Access provides a comprehensive perspective on satellite networks. It addresses the end-to-end protocol stack, satellite design principles, QoS methodologies and international standards for building satellite network systems for multimedia applications.

Growth and Development of Computer Aided Innovation - Third IFIP WG 5.4 Working Conference, CAI 2009, Harbin, China, August... Growth and Development of Computer Aided Innovation - Third IFIP WG 5.4 Working Conference, CAI 2009, Harbin, China, August 20-21, 2009, Proceedings (Hardcover, 2009 ed.)
Runhua Tan, Guozhong Cao, Noel Leon
R2,694 Discovery Miles 26 940 Ships in 18 - 22 working days

Computer-AidedInnovation(CAI)isayoungdomaininthearrayofCAxte- nologies. ThegoalofCAIistosupportengineersandenterprisesthroughoutthe completeinnovationprocess. AlthoughsomeexistingideasandconceptsofCAI focus on assisting product designers in their creative stage, a more compreh- sive vision conceives CAI systems beginning at the creative stage of perceiving business opportunities and customer demands, then helping in developing - ventions and, further on, providing help up to the point of turning inventions into successful innovations in the market. Following the track of the last two successful CAI conferences held in 2005, in Germany, and 2007 in USA, the ThirdIFIPWorkingConferenceonComputer-AidedInnovation(CAI)washeld in Harbin, China, and attractedparticipants fromacademia and industry. This workingconferencecontinuedthe traditionofstronglylinkingacademicand- dustrymembers. Theconferencehadseveralparallelsessions, andeightkeynote sessions. Over 100 participants attended the conference. Some famous scholars wereinvited askeynotespeakers. I would liketo takethe opportunityto thank all the authors for their quality research, the international Program Comm- teemembersfortheirsupportinreviewingthepapers, andthelocalOrganizing Committeefortheirpreparationoftheconference. Furthermore, IthanktheC- neseNaturalScienceFoundation, theDepartmentofScienceandTechnologyof HeilongjiangProvincialGovernment, theInstituteofDesignforInnovation, and Hebei University of Technology, for their ?nancial support of the conference. I wouldalsoliketothankZhuLin, YaoYihang, XueGuiying, andCaoGuozhong for their signi?cantcontributions towardthe successof the conference. August 2009 Runhua Tan Organization TheThirdIFIPWorkingConferenceonComputer-AidedInnovation(CAI)was organized by Hebei University of Technology and the Department of Science andTechnologyofHeilongjiangProvincialGovernmentincooperationwiththe National Natural Science Foundationof China. Program Committee Conference Chair Runhua Tan, (Hebei University ofTechnology, China) Noel Leon(ITESM, Campus Monterrey, Mexico) OrganizingChair T. S. Yang (Department ofScience and Technologyof Heilongjiang Provincial Government, China) Referees T. Arciszewski(USA) Y. Li (China) M. Ashtiani (USA) H. Liu (China) G. Cascini(Italy) M. L. Maher (Australia) D. Cavalucci (France) M. B. Mc Grath(USA) R. De Guio(France) G. Mukundan (USA) S. K. Cho (USA) G. Olling (USA) S. Finger (USA) J. Ovtcharova(Germany) J. Gero(Australia) E. Schueler-Hainsch(Germany) C. Gundlach(Germ

Building Secure Business Models Through Blockchain Technology - Tactics, Methods, Limitations, and Performance (Hardcover):... Building Secure Business Models Through Blockchain Technology - Tactics, Methods, Limitations, and Performance (Hardcover)
Shweta Dewangan, Sapna Singh Kshatri, Astha Bhanot, Mushtaq Ahmed Shah
R6,221 Discovery Miles 62 210 Ships in 18 - 22 working days

Blockchain technology provided a buzz-seeking opportunity for all industries to implement improved corporate procedures and trust-building. Still, some industries, such as the banking sector, may view it as a disruptive technology that must be adopted. A transaction ledger's contents can be verified, maintained, and synchronized by community members using blockchain technology. A transaction can never be changed or removed from the blockchain; updates may only be made by participants in the system. Its distributed database cannot be manipulated, disrupted, or hacked in the same manner as conventional, user-controlled access systems and centralized databases. Building Secure Business Models Through Blockchain Technology: Tactics, Methods, Limitations, and Performance studies and explores the status of blockchain technology and, through the latest technology, builds business models to secure the future direction in the field of business. This book discusses the tactics and methods, as well as their limitations and performance. Covering topics such as AI-based efficient models, digital technology and services, and financial trading, this premier reference source is a valuable resource for business leaders and managers, IT managers, students and educators of higher education, entrepreneurs, government officials, librarians, researchers, and academicians.

Communications and Multimedia Security - Volume 3 (Hardcover, 1997 ed.): Sokratis Katsikas Communications and Multimedia Security - Volume 3 (Hardcover, 1997 ed.)
Sokratis Katsikas
R4,186 Discovery Miles 41 860 Ships in 18 - 22 working days

This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the Proceedings of the 3rd Joint Working Conference of IFIP TC6 and TC11, arranged by the International Federation for Information Processing and held in Athens, Greece in September 1997. The book aims to cover the subject of Communications and Multimedia Systems Security, as fully as possible. It constitutes an essential reading for information technology security specialists; computer professionals; communication systems professionals; EDP managers; EDP auditors; managers, researchers and students working on the subject.

Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing -... Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing - IDC 2016, Paris, France, October 10-12 2016 (Hardcover, 1st ed. 2017)
Costin Badica, Amal EL Fallah-Seghrouchni, Aurelie Beynier, David Camacho, Cedric Herpson, …
R4,653 Discovery Miles 46 530 Ships in 10 - 15 working days

This book presents the combined peer-reviewed proceedings of the tenth International Symposium on Intelligent Distributed Computing (IDC'2016), which was held in Paris, France from October 10th to 12th, 2016. The 23 contributions address a range of topics related to theory and application of intelligent distributed computing, including: Intelligent Distributed Agent-Based Systems, Ambient Intelligence and Social Networks, Computational Sustainability, Intelligent Distributed Knowledge Representation and Processing, Smart Networks, Networked Intelligence and Intelligent Distributed Applications, amongst others.

Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017): Suresh Chandra... Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017)
Suresh Chandra Satapathy, Vikrant Bhateja, K Srujan Raju, B. Janakiramaiah
R7,758 Discovery Miles 77 580 Ships in 18 - 22 working days

The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

ATM Networks - Performance Modelling and Evaluation (Hardcover, 1997 ed.): Demetres D. Kouvatsos ATM Networks - Performance Modelling and Evaluation (Hardcover, 1997 ed.)
Demetres D. Kouvatsos
R5,402 Discovery Miles 54 020 Ships in 18 - 22 working days

This book presents a selection of expanded research papers from the Fourth IFIP Workshop on the Performance Modelling and Evaluation of ATM Networks. It provides a fundamental source of reference on the latest research techniques and tools concerning ATM networks worldwide. A number of important topics are featured including: traffic modelling and characterisation, models of ATM switches, network management, high speed LANs and MANs and routing and optimization.

Heavy Traffic Analysis of Controlled Queueing and Communication Networks (Hardcover, 2001 ed.): Harold Kushner Heavy Traffic Analysis of Controlled Queueing and Communication Networks (Hardcover, 2001 ed.)
Harold Kushner
R1,512 Discovery Miles 15 120 Ships in 18 - 22 working days

This book provides a thorough development of the powerful methods of heavy traffic analysis and approximations with applications to a wide variety of stochastic (e.g. queueing and communication) networks, for both controlled and uncontrolled systems. The approximating models are reflected stochastic differential equations. The analytical and numerical methods yield considerable simplifications and insights and good approximations to both path properties and optimal controls under broad conditions on the data and structure. The general theory is developed, with possibly state dependent parameters, and specialized to many different cases of practical interest. Control problems in telecommunications and applications to scheduling, admissions control, polling, and elsewhere are treated. The necessary probability background is reviewed, including a detailed survey of reflected stochastic differential equations, weak convergence theory, methods for characterizing limit processes, and ergodic problems.

Roadside Networks for Vehicular Communications - Architectures, Applications, and Test Fields (Hardcover): Robil Daher, Alexey... Roadside Networks for Vehicular Communications - Architectures, Applications, and Test Fields (Hardcover)
Robil Daher, Alexey Vinel
R4,816 Discovery Miles 48 160 Ships in 18 - 22 working days

Roadside Networks for Vehicular Communications: Architectures, Applications, and Test Fields attempts to close the gap between science and technology in the field of roadside backbones for VCNs. This collection will be useful not only for researchers and engineers at universities, but for students in the fields of wireless communication networks, especially vehicular communication networks, and backbone networks as well.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
E-Learning and Digital Education in the…
M. Mahruf C. Shohel Hardcover R3,584 Discovery Miles 35 840
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610

 

Partners