0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (334)
  • R250 - R500 (887)
  • R500+ (14,101)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,066 Discovery Miles 10 660 Ships in 12 - 17 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

ATM Networks - Performance Modelling and Evaluation (Hardcover, 1997 ed.): Demetres D. Kouvatsos ATM Networks - Performance Modelling and Evaluation (Hardcover, 1997 ed.)
Demetres D. Kouvatsos
R5,990 Discovery Miles 59 900 Ships in 10 - 15 working days

This book presents a selection of expanded research papers from the Fourth IFIP Workshop on the Performance Modelling and Evaluation of ATM Networks. It provides a fundamental source of reference on the latest research techniques and tools concerning ATM networks worldwide. A number of important topics are featured including: traffic modelling and characterisation, models of ATM switches, network management, high speed LANs and MANs and routing and optimization.

High Performance Networking VII - IFIP TC6 Seventh International Conference on High Performance Networks (HPN ' 97), 28th... High Performance Networking VII - IFIP TC6 Seventh International Conference on High Performance Networks (HPN ' 97), 28th April - 2nd May 1997, White Plains, New York, USA (Hardcover, 1997 ed.)
A. Tantawy
R4,548 Discovery Miles 45 480 Ships in 12 - 17 working days

It is always confusing, and perhaps inconvenient at times, using generic terms that will mean something to everyone but different things to different people. "High Performance" is one of those terms. High Performance can be viewed as synonymous to High Speed or Low Latency or a number of other characteristics. The interesting thing is that such ambiguity can sometimes be useful in a world where focus shifts quite easily from one issue to another as times and needs evolve. Many things have changed since the first HPN conference held in Aachen, Germany in 1987. The focus then was mainly on Media Access Control (MAC) protocols that allow users to share the high bandwidth of optical fiber. FDDI (Fiber Distributed Data Interface) was making its debut with its amazing 100 Mbps speed. ATM (Asynchronous Transfer Mode) and SONET (the Synchronous Optical Network) were beginning to capture our imagination. What could users possibly do with such "high performance"? Share it! After realizing that the real problems had gradually shifted away from the network media to the periphery of the network, focus also began to shift. Adapter design, protocol implementation, and communication systems architecture began to attract our interest. Networking -not Networks-became the hot issue.

Operating System Forensics (Paperback): Ric Messier Operating System Forensics (Paperback)
Ric Messier
R1,640 R1,530 Discovery Miles 15 300 Save R110 (7%) Ships in 12 - 17 working days

Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.

Making Grids Work - Proceedings of the CoreGRID Workshop on Programming Models Grid and P2P System Architecture Grid Systems,... Making Grids Work - Proceedings of the CoreGRID Workshop on Programming Models Grid and P2P System Architecture Grid Systems, Tools and Environments 12-13 June 2007, Heraklion, Crete, Greece (Hardcover, 2008 ed.)
Marco Danelutto, Paraskevi Fragopoulou, Vladimir Getov
R4,562 Discovery Miles 45 620 Ships in 12 - 17 working days

Making Grids Work includes selected articles from the CoreGRID Workshop on Grid Programming Models, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments held at the Institute of Computer Science, Foundation for Research and Technology - Hellas in Crete, Greece, June 2007. The workshop brought together representatives of the academic and industrial communities performing Grid research in Europe. The workshop was organized in the context of the CoreGRID Network of Excellence in order to provide a forum for the presentation and exchange of views on the latest developments in Grid Technology research. This volume is the 7th in the series of CoreGRID books. Making Grids Work is designed for a professional audience, composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science.

5G Cyber Risks and Mitigation (Hardcover): Sabhyata Soni 5G Cyber Risks and Mitigation (Hardcover)
Sabhyata Soni
R3,277 Discovery Miles 32 770 Ships in 9 - 15 working days

• Technical language made simple • Researched matter • Maximum illustrations • To the point matter • Authored by a qualified person who is teaching in this field for the last 25 years

Design and Engineering of Intelligent Communication Systems (Hardcover, 1997 ed.): Syed V. Ahamed, Victor B. Lawrence Design and Engineering of Intelligent Communication Systems (Hardcover, 1997 ed.)
Syed V. Ahamed, Victor B. Lawrence
R6,137 Discovery Miles 61 370 Ships in 10 - 15 working days

FIGURE 18.13e. Detector Output. ..................................................................... 618 FIGURE 18.14a. WDM Energy Distrubution into the Fiber ........................... 619 FIGURE 18.14b. Fiber Loss for the WDM Band .............................................. 619 FIGURE 18.14c. Fiber Group Delay Distribution ............................................ 619 FIGURE 18.14d. Receive Energy Distribution ................................................. 619 FIGURE 18.15a. Channell Eye Diagram at PIN Diode ................................. 621 FIGURE 18.15b. Channel 2 Eye Diagram at PIN Diode ................................. 621 FIGURE 18.15c. Channell System Output at Detector ................................. 621 FIGURE 18.15d. Channel 2 System Output at Detector ................................. 621 PREFACE The emerging networks in our society will touch upon the life of everyone. These networks have started to bring about an immense information revolution. The revolution within our intellectual life will be similar to the materialistic revolution that followed the invention of the steam and the internal combustion engines. From the perspective of the 1980s, the information networks are indeed evolving and their influence can only be gradual. However, the strides of progress are accelerating in the 1990s. Networks in our society offer the most candid area of convergence for the computer and the communication technologies. The two technologies are mature in their own right. However, there are a few major factors that prevent network engineers from constructing modern communication systems from components borrowed from each of these two technologies: * Major innovations are happening. * Specialized components evolve in synergistic patterns. * New technologies emerge. * Inquisitive minds cross disciplinary barriers.

Formal Methods for Open Object-based Distributed Systems - Volume 1 (Hardcover, 1996 ed.): Elie Najm, Jean-Bernard Stefani Formal Methods for Open Object-based Distributed Systems - Volume 1 (Hardcover, 1996 ed.)
Elie Najm, Jean-Bernard Stefani
R5,956 Discovery Miles 59 560 Ships in 10 - 15 working days

Object-based Distributed Computing is being established as the most pertinent basis for the support of large, heterogeneous computing and telecommunications systems. The advent of Open Object-based Distributed Systems (OODS) brings new challenges and opportunities for the use and development of formal methods. Formal Methods for Open Object-based Distributed Systems presents the latest research in several related fields, and the exchange of ideas and experiences in a number of topics including: formal models for object-based distributed computing; semantics of object-based distributed systems and programming languages; formal techniques in object-based and object oriented specification, analysis and design; refinement and transformation of specifications; multiple viewpoint modeling and consistency between different models; formal techniques in distributed systems verification and testing; types, service types and subtyping; specification, verification and testing of quality of service constraints and formal methods and the object life cycle. It contains the selected proceedings of the International Workshop on Formal Methods for Open Object-based Distributed Systems, sponsored by the International Federation for Information Processing, and based in Paris, France, in March 1996.

CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions (Paperback): Ric Messier CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions (Paperback)
Ric Messier
R1,329 Discovery Miles 13 290 Ships in 12 - 17 working days

The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry. In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you’ll find a comprehensive overview of the CEH certification requirements. Concise and easy-to-follow instructions are combined with intuitive organization that allows you to learn each exam objective in your own time and at your own pace. The Study Guide now contains more end of chapter review questions and more online practice tests. This combines the value from the previous two-book set including a practice test book into a more valuable Study Guide. The book offers thorough and robust coverage of every relevant topic, as well as challenging chapter review questions, even more end of chapter review questions to validate your knowledge, and Exam Essentials, a key feature that identifies important areas for study. There are also twice as many online practice tests included. You’ll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides: Practical, hands-on exercises that reinforce vital, real-world job skills and exam competencies Essential guidance for a certification that meets the requirements of the Department of Defense 8570 Directive for Information Assurance positions Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy.

Data Communications Principles (Hardcover, 1992 ed.): Richard D. Gitlin, Jeremiah F. Hayes, Stephen B Weinstein Data Communications Principles (Hardcover, 1992 ed.)
Richard D. Gitlin, Jeremiah F. Hayes, Stephen B Weinstein
R5,891 Discovery Miles 58 910 Ships in 10 - 15 working days

This unique text, for both the first year graduate student and the newcomer to the field, provides in-depth coverage of the basic principles of data communications and covers material which is not treated in other texts, including phase and timing recovery and echo cancellation. Throughout the book, exercises and applications illustrate the material while up-to-date references round out the work.

Wideband, Multiband, and Smart Antenna Systems (Hardcover, 1st ed. 2021): Mohammad Abdul Matin Wideband, Multiband, and Smart Antenna Systems (Hardcover, 1st ed. 2021)
Mohammad Abdul Matin
R3,487 Discovery Miles 34 870 Ships in 12 - 17 working days

This book provides current R&D trends and novel approaches in design and analysis of broadband, multiband, and smart antennas for 5G and B5G mobile and wireless applications, as well as the identification of integration techniques of these antennas in a diverse range of devices. The book presents theoretical and experimental approaches to help the reader in understanding the unique design issues and more advanced research. Moreover, the book includes chapters on the fundamentals of antenna theory. The book is pertinent to professionals and researchers working in the field of antenna engineering; it is written for graduate students, researchers, academics, and industry practitioners who want to improve their understanding in the current research trends in design analysis of broadband, multiband, and smart antennas for wireless applications.

Distributed Event-Based Systems (Hardcover, 2006 ed.): Gero Muhl, Ludger Fiege, Peter Pietzuch Distributed Event-Based Systems (Hardcover, 2006 ed.)
Gero Muhl, Ludger Fiege, Peter Pietzuch
R2,496 R1,699 Discovery Miles 16 990 Save R797 (32%) Ships in 12 - 17 working days

In today s world, services and data are integrated in ever new constellations, requiring the easy, flexible and scalable integration of autonomous, heterogeneous components into complex systems at any time.

Event-based architectures inherently decouple system components. Event-based components are not designed to work with specific other components in a traditional request/reply mode, but separate communication from computation through asynchronous communication mechanisms via a dedicated notification service.

Muhl, Fiege, and Pietzuch provide the reader with an in-depth description of event-based systems. They cover the complete spectrum of topics, ranging from a treatment of local event matching and distributed event forwarding algorithms, through a more practical discussion of software engineering issues raised by the event-based style, to a presentation of state-of-the-art research topics in event-based systems, such as composite event detection and security. Their presentation gives researchers a comprehensive overview of the area and lots of hints for future research. In addition, they show the power of event-based architectures in modern system design, thus encouraging professionals to exploit this technique in next generation large-scale distributed applications like information dissemination, network monitoring, enterprise application integration, or mobile systems.

Blockchain and Cryptocurrencies (Hardcover): Asma Salman, Muthanna G. Abdul Razzaq Blockchain and Cryptocurrencies (Hardcover)
Asma Salman, Muthanna G. Abdul Razzaq
R3,377 Discovery Miles 33 770 Ships in 10 - 15 working days
Managing QoS in Multimedia Networks and Services - IEEE / IFIP TC6 - WG6.4 & WG6.6 Third International Conference on Management... Managing QoS in Multimedia Networks and Services - IEEE / IFIP TC6 - WG6.4 & WG6.6 Third International Conference on Management of Multimedia Networks and Services (MMNS'2000) September 25-28, 2000, Fortaleza, Ceara, Brazil (Hardcover, 2000 ed.)
Jose Neuman De Souza, Raouf Boutaba
R5,885 Discovery Miles 58 850 Ships in 10 - 15 working days

Welcome to the third International Conference on Management of Multimedia Networks and Services (MMNS'2000) in Fortaleza (Brazil) The first MMNS was held in Montreal ( Canada) in july 1997 and the second MMNS was held in Versailles (France) in November 1998. The MMNS conference takes place every year and a half and is aimed to be a truly international event by bringing together researchers and practitioners from all around the world and by organising the conference each time in a different continent/country. Over the past several years, there has been a considerable amount of research within the fields of multimedia networking and network management. Much of that work has taken place within the context of managing Quality-of Service in broadband integrated services digital networks such as the A TM, and more recently in IP-based networks, to respond to the requirements of emerging multimedia applications. A TM networks were designed to support multimedia traffic with diverse characteristics and can be used as the transfer mode for both wired and wireless networks. A new set of Internet protocols is being developed to provide better quality of service, which is a prerequisite for supporting multimedia applications. Multimedia applications have a different set of requirements, which impacts the design of the underlying communication network as well as its management. Several QoS management mechanisms intervening at different layers of the communication network are required including QoS-routing, QoS-based transport, QoS negotiation, QoS adaptation, FCAPS management, and mobility management."

Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover): Kenneth J. Knapp Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover)
Kenneth J. Knapp
R5,405 Discovery Miles 54 050 Ships in 12 - 17 working days

Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

Dimensions of Uncertainty in Communication Engineering (Paperback): Ezio Biglieri Dimensions of Uncertainty in Communication Engineering (Paperback)
Ezio Biglieri
R2,817 R2,555 Discovery Miles 25 550 Save R262 (9%) Ships in 12 - 17 working days

Dimensions of Uncertainty in Communication Engineering is a comprehensive and self-contained introduction to the problems of nonaleatory uncertainty and the mathematical tools needed to solve them. The book gathers together tools derived from statistics, information theory, moment theory, interval analysis and probability boxes, dependence bounds, nonadditive measures, and Dempster-Shafer theory. While the book is mainly devoted to communication engineering, the techniques described are also of interest to other application areas, and commonalities to these are often alluded to through a number of references to books and research papers. This is an ideal supplementary book for courses in wireless communications, providing techniques for addressing epistemic uncertainty, as well as an important resource for researchers and industry engineers. Students and researchers in other fields such as statistics, financial mathematics, and transport theory will gain an overview and understanding on these methods relevant to their field.

SAP R/3 Implementation - Methods and Tools (Hardcover, 2000 ed.): Hans-Jurgen Appelrath, Joerg Ritter SAP R/3 Implementation - Methods and Tools (Hardcover, 2000 ed.)
Hans-Jurgen Appelrath, Joerg Ritter
R2,896 R1,652 Discovery Miles 16 520 Save R1,244 (43%) Ships in 12 - 17 working days

Before use, standard ERP systems such as SAP R/3 need to be customized to meet the concrete requirements of the individual enterprise. This book provides an overview of the process models, methods, and tools offered by SAP and its partners to support this complex and time-consuming process. It begins by characterizing the foundations of the latest ERP systems from both a conceptual and technical viewpoint, whereby the most important components and functions of SAP R/3 are described. The main part of the book then goes on to present the current methods and tools for the R/3 implementation based on newer process models (roadmaps).

Mobile Information Systems II - IFIP Working Conference on Mobile Information Systems, MOBIS 2005, Leeds, UK, December 6-7,... Mobile Information Systems II - IFIP Working Conference on Mobile Information Systems, MOBIS 2005, Leeds, UK, December 6-7, 2005 (Hardcover, 2005 ed.)
John Krogstie, Karlheinz Kautz, David Allen
R2,964 Discovery Miles 29 640 Ships in 10 - 15 working days

Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems. The articles focus on the implications of this research in the world of commerce, and address technical issues and constraints on mobile information systems functionalities and design.

Applied Social Network Analysis With R: Emerging Research and Opportunities (Hardcover): Mehmet Gencer Applied Social Network Analysis With R: Emerging Research and Opportunities (Hardcover)
Mehmet Gencer
R5,094 Discovery Miles 50 940 Ships in 12 - 17 working days

Understanding the social relations within the fields of business and economics is vital for the promotion of success within a certain organization. Analytics and statistics have taken a prominent role in marketing and management practices as professionals are constantly searching for a competitive advantage. Converging these technological tools with traditional methods of business relations is a trending area of research. Applied Social Network Analysis With R: Emerging Research and Opportunities is an essential reference source that materializes and analyzes the issue of structure in terms of its effects on human societies and the state of the individuals in these communities. Even though the theme of the book is business-oriented, an approach underlining and strengthening the ties of this field of study with social sciences for further development is adopted throughout. Therefore, the knowledge presented is valid for analyzing not only the organization of the business world but also for the organization of any given community. Featuring research on topics such as network visualization, graph theory, and micro-dynamics, this book is ideally designed for researchers, practitioners, business professionals, managers, programmers, academicians, and students seeking coverage on analyzing social and business networks using modern methods of statistics, programming, and data sets.

Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event,... Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Hardcover, 1st ed. 2021)
Steven Furnell, Nathan Clarke
R2,941 Discovery Miles 29 410 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.

Quantum Communication, Quantum Networks, and Quantum Sensing (Paperback): Ivan B. Djordjevic Quantum Communication, Quantum Networks, and Quantum Sensing (Paperback)
Ivan B. Djordjevic
R3,061 Discovery Miles 30 610 Ships in 12 - 17 working days

Quantum Communication, Quantum Networks, and Quantum Sensing represents a self-contained introduction to quantum communication, quantum error-correction, quantum networks, and quantum sensing. It starts with basic concepts from classical detection theory, information theory, and channel coding fundamentals before continuing with basic principles of quantum mechanics including state vectors, operators, density operators, measurements, and dynamics of a quantum system. It continues with fundamental principles of quantum information processing, basic quantum gates, no-cloning and theorem on indistinguishability of arbitrary quantum states. The book then focuses on quantum information theory, quantum detection and Gaussian quantum information theories, and quantum key distribution (QKD). The book then covers quantum error correction codes (QECCs) before introducing quantum networks. The book concludes with quantum sensing and quantum radars, quantum machine learning and fault-tolerant quantum error correction concepts.

Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.): Guido Schryen Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.)
Guido Schryen
R1,552 Discovery Miles 15 520 Ships in 10 - 15 working days

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.

Reflexing Interfaces - The Complex Coevolution of Information Technology Ecosystems (Hardcover): Franco F. Orsucci, Nicoletta... Reflexing Interfaces - The Complex Coevolution of Information Technology Ecosystems (Hardcover)
Franco F. Orsucci, Nicoletta Sala
R5,000 Discovery Miles 50 000 Ships in 12 - 17 working days

Information and communication technologies are increasingly prolific worldwide, exposing the issues and challenges of the assimilation of existing living environments to the shift in technological communication infrastructure. ""Reflexing Interfaces"" discusses the application of complex theories in information and communication technology, with a focus on the interaction between living systems and information technologies. This innovative view provides researcher, scholars, and IT professionals with a fundamental resource on such compelling topics as virtual reality; fuzzy logic systems; and complexity science in artificial intelligence, evolutionary computation, neural networks, and 3-D modeling.

How I Rob Banks - And Other Such Places (Hardcover): F. C. Barker How I Rob Banks - And Other Such Places (Hardcover)
F. C. Barker
R493 R450 Discovery Miles 4 500 Save R43 (9%) Ships in 12 - 17 working days

Follow FC as he steals from the world’s most secure banks and government facilities—without breaking a single law In How I Rob Banks: And Other Such Places, renowned ethical hacker and social engineer FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to “steal” money, data, and anything else he can get his hands on. In the book, you’ll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes. The author explains how banks and other secure facilities operate, both digitally and physically, and shows you the tools and techniques he uses to gain access to some of the world’s most locked-down buildings. You’ll also find: Strategies you can implement immediately to better secure your own company, home, and data against malicious actors Detailed photos, maps, and drawings to bring to life the unbelievable true stories contained inside An inside and candid look at a rarely examined industry through the eyes of one of its most respected penetration testers A can’t-miss account of real-life security exploits perfect for infosec pros, including red and blue teamers, pentesters, CIOs, CISSPs, and social engineers, How I Rob Banks also belongs in the hands of anyone who loves a great Ocean’s 11-style story pulled straight from the real world.

Amazon Elastic Compute Cloud User Guide for Windows Instances (Hardcover): Documentation Team Amazon Elastic Compute Cloud User Guide for Windows Instances (Hardcover)
Documentation Team
R3,205 Discovery Miles 32 050 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
Introduction to Copper Cabling…
John Crisp Paperback R985 Discovery Miles 9 850
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,859 Discovery Miles 18 590
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,491 Discovery Miles 14 910
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,351 Discovery Miles 13 510
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,197 Discovery Miles 11 970
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,908 Discovery Miles 59 080
Managing Business Projects - The…
Frank Einhorn Paperback R478 Discovery Miles 4 780
Distributed Systems: Theory and…
Ghosh Hardcover R2,568 Discovery Miles 25 680
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990

 

Partners