0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (848)
  • R500+ (14,096)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor,... Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21-23, 2020, Proceedings (Hardcover, 1st ed. 2020)
Lynette Drevin, Sune Von Solms, Marianthi Theocharidou
R1,528 Discovery Miles 15 280 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover)
George Mansour
R670 Discovery Miles 6 700 Ships in 10 - 15 working days
Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback): Naomi Alpern Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback)
Naomi Alpern
R517 R437 Discovery Miles 4 370 Save R80 (15%) Ships in 12 - 19 working days

The "11th Hour Network+ Study Guide" is keyed to theN10-004 revision of the CompTIA Network+ exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered with key concepts highlighted. Fast Facts quickly review fundamentalsExam Warnings highlight particularly tough sections of the examCrunch Time sidebars point out key concepts to rememberDid You Know? sidebars cover sometimes forgotten detailsTop Five Toughest Questions and answers help you to prepare

The 11th Hour Study Guide Series focuses on just the essentials needed to pass your certification exam and make the most of the last days before the test
The only book keyed to the new 2009 objectives that has beencrafted for last minute cramming
Easy to find, essential material with no fluff this book does not talk about security in general, just how it applies to the test
Includesreview of five toughest questions by topic- sure to improve your score"

Multimedia Security Using Chaotic Maps: Principles and Methodologies (Hardcover, 1st ed. 2020): Khalid M. Hosny Multimedia Security Using Chaotic Maps: Principles and Methodologies (Hardcover, 1st ed. 2020)
Khalid M. Hosny
R2,900 Discovery Miles 29 000 Ships in 10 - 15 working days

This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields. It is also a valuable reference resource for postgraduate and senior undergraduate students who are studying multimedia, multimedia security, and information security, as well as for professionals in the IT industry.

Online Banking Security Measures and Data Protection (Hardcover): Shadi A. Aljawarneh Online Banking Security Measures and Data Protection (Hardcover)
Shadi A. Aljawarneh
R5,818 Discovery Miles 58 180 Ships in 10 - 15 working days

Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever. Online Banking Security Measures and Data Protection is an authoritative reference source for the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary financial systems. Presenting emerging techniques to secure these systems against potential threats and highlighting theoretical foundations and real-world case studies, this book is ideally designed for professionals, practitioners, upper-level students, and technology developers interested in the latest developments in e-banking security.

Big Data Analytics for Cyber-Physical Systems (Hardcover, 1st ed. 2020): Shiyan Hu, Bei Yu Big Data Analytics for Cyber-Physical Systems (Hardcover, 1st ed. 2020)
Shiyan Hu, Bei Yu
R5,113 Discovery Miles 51 130 Ships in 10 - 15 working days

This book highlights research and survey articles dedicated to big data techniques for cyber-physical system (CPS), which addresses the close interactions and feedback controls between cyber components and physical components. The book first discusses some fundamental big data problems and solutions in large scale distributed CPSs. The book then addresses the design and control challenges in multiple CPS domains such as vehicular system, smart city, smart building, and digital microfluidic biochips. This book also presents the recent advances and trends in the maritime simulation system and the flood defence system.

IPv6 Socket API Extensions: Programmer's Guide (Paperback): Qing Li, Jinmei Tatuya, Keiichi Shima IPv6 Socket API Extensions: Programmer's Guide (Paperback)
Qing Li, Jinmei Tatuya, Keiichi Shima
R726 Discovery Miles 7 260 Ships in 12 - 19 working days

"IPv6 Socket API Extensions: Programmer's Guide" covers the IPv6 application programming intercfaces (API) extensions and enhancements that have been made to the socket APIs. The book begins with a brief overview of the API specifications along with sample code usage. Then an explanation of the internal kernel implementation that realizes the services offered by the API sets is detailed. Also descriptions of several standard user libraries that have been extended or created to support IPV6 are reviewed. Includes various examples which illustrate how to write portable applications that can run on either IPv4 or IPv6 networks. Succinct treatment of everything you need know to get up and running with IPv6 socket programming in one affordable volume.
Provides a detailed introduction to the IETF standards for IPv6 APIsIncludes extensive line-by-line code sets with meticulous explanations of their implementationNumerous diagrams and illustrations to aid in fully understanding the socket APIs

Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki
R2,981 R2,085 Discovery Miles 20 850 Save R896 (30%) Ships in 12 - 19 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

Intelligent Quality of Service Technologies and Network Management - Models for Enhancing Communication (Hardcover): Intelligent Quality of Service Technologies and Network Management - Models for Enhancing Communication (Hardcover)
R4,992 Discovery Miles 49 920 Ships in 10 - 15 working days

The increasing reliance upon networking and mobile networking devices in the modern world demands constant improvement of network Quality of Service (QoS). Intelligent Quality of Service Technologies and Network Management: Models for Enhancing Communication explores the interrelated natures of network control mechanisms and QoS and offers fundamental knowledge on the subject, describing the significance of network management and the integration of knowledge to demonstrate how network management is related to QoS in real applications. Engaging and innovative, this book provides practical solutions that integrate network management and QoS strategies for real-world application.

Mobile IPv6 - Protocols and Implementation (Paperback): Qing Li, Tatuya Jinmei, Keiichi Shima Mobile IPv6 - Protocols and Implementation (Paperback)
Qing Li, Tatuya Jinmei, Keiichi Shima
R1,503 Discovery Miles 15 030 Ships in 12 - 19 working days

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.).

This book covers the IPv6 host mobility protocol known as "mobile IPv6" and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation. A sample configuration for a real Mobile IPv6 operation is provided at the end of the book. Source code will be downloadable form a companion website.
Provides a detailed introduction to the IETF Mobile IPv6 standard
Includes extensive line-by-line code sets with meticulous explanations of their implementation
Numerous diagrams and illustrations to help in visualizing the implementation

Amazon CloudWatch User Guide (Hardcover): Documentation Team Amazon CloudWatch User Guide (Hardcover)
Documentation Team
R1,859 Discovery Miles 18 590 Ships in 10 - 15 working days
Words and Power - Computers, Language, and U.S. Cold War Values (Hardcover, 1st ed. 2021): Bernadette Longo Words and Power - Computers, Language, and U.S. Cold War Values (Hardcover, 1st ed. 2021)
Bernadette Longo
R1,094 Discovery Miles 10 940 Ships in 10 - 15 working days

When viewed through a political lens, the act of defining terms in natural language arguably transforms knowledge into values. This unique volume explores how corporate, military, academic, and professional values shaped efforts to define computer terminology and establish an information engineering profession as a precursor to what would become computer science. As the Cold War heated up, U.S. federal agencies increasingly funded university researchers and labs to develop technologies, like the computer, that would ensure that the U.S. maintained economic prosperity and military dominance over the Soviet Union. At the same time, private corporations saw opportunities for partnering with university labs and military agencies to generate profits as they strengthened their business positions in civilian sectors. They needed a common vocabulary and principles of streamlined communication to underpin the technology development that would ensure national prosperity and military dominance. investigates how language standardization contributed to the professionalization of computer science as separate from mathematics, electrical engineering, and physics examines traditions of language standardization in earlier eras of rapid technology development around electricity and radio highlights the importance of the analogy of "the computer is like a human" to early explanations of computer design and logic traces design and development of electronic computers within political and economic contexts foregrounds the importance of human relationships in decisions about computer design This in-depth humanistic study argues for the importance of natural language in shaping what people come to think of as possible and impossible relationships between computers and humans. The work is a key reference in the history of technology and serves as a source textbook on the human-level history of computing. In addition, it addresses those with interests in sociolinguistic questions around technology studies, as well as technology development at the nexus of politics, business, and human relations.

Data Governance and Compliance - Evolving to Our Current High Stakes Environment (Hardcover, 1st ed. 2021): Rupa Mahanti Data Governance and Compliance - Evolving to Our Current High Stakes Environment (Hardcover, 1st ed. 2021)
Rupa Mahanti
R2,522 Discovery Miles 25 220 Ships in 12 - 19 working days

This book sets the stage of the evolution of corporate governance, laws and regulations, other forms of governance, and the interaction between data governance and other corporate governance sub-disciplines. Given the continuously evolving and complex regulatory landscape and the growing number of laws and regulations, compliance is a widely discussed issue in the field of data. This book considers the cost of non-compliance bringing in examples from different industries of instances in which companies failed to comply with rules, regulations, and other legal obligations, and goes on to explain how data governance helps in avoiding such pitfalls. The first in a three-volume series on data governance, this book does not assume any prior or specialist knowledge in data governance and will be highly beneficial for IT, management and law students, academics, information management and business professionals, and researchers to enhance their knowledge and get guidance in managing their own data governance projects from a governance and compliance perspective.

Selected Readings on Electronic Commerce Technologies - Contemporary Applications (Hardcover): Wen-Chen Hu Selected Readings on Electronic Commerce Technologies - Contemporary Applications (Hardcover)
Wen-Chen Hu
R5,442 Discovery Miles 54 420 Ships in 10 - 15 working days

Education and research in the field of electronic commerce technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Electronic Commerce Technologies: Contemporary Applications supplements course instruction and student research with quality articles focused on key issues concerning the technologies and applications of electronic commerce. Containing over 30 chapters from authors across the globe, these selected readings in areas such as e-marketing, IT business, and mobile commerce depict the most relevant and important areas of classroom discussion within the categories of fundamental concepts and theories; development and design methodologies; tools and technologies; application and utilization; critical issues; and emerging trends.

Wireless Radio-Frequency Standards and System Design - Advanced Techniques (Hardcover, New): Gianluca Cornetta, David J Santos,... Wireless Radio-Frequency Standards and System Design - Advanced Techniques (Hardcover, New)
Gianluca Cornetta, David J Santos, Jose Manuel Vazquez
R5,360 Discovery Miles 53 600 Ships in 10 - 15 working days

Radio-frequency (RF) integrated circuits in CMOS technology are gaining increasing popularity in the commercial world, and CMOS technology has become the dominant technology for applications such as GPS receivers, GSM cellular transceivers, wireless LAN, and wireless short-range personal area networks based on IEEE 802.15.1 (Bluetooth) or IEEE 802.15.4 (ZigBee) standards. Furthermore, the increasing interest in wireless technologies and the widespread of wireless communications has prompted an ever increasing demand for radio frequency transceivers. Wireless Radio-Frequency Standards and System Design: Advanced Techniques provides perspectives on radio-frequency circuit and systems design, covering recent topics and developments in the RF area. Exploring topics such as LNA linearization, behavioral modeling and co-simulation of analog and mixed-signal complex blocks for RF applications, integrated passive devices for RF-ICs and baseband design techniques and wireless standards, this is a comprehensive reference for students as well as practicing professionals.

Quantum Cryptography in Advanced Networks (Hardcover): Oleg G. Morozov Quantum Cryptography in Advanced Networks (Hardcover)
Oleg G. Morozov
R2,762 Discovery Miles 27 620 Ships in 10 - 15 working days
Malware Analysis Using Artificial Intelligence and Deep Learning (Hardcover, 1st ed. 2021): Mark Stamp, Mamoun Alazab, Andrii... Malware Analysis Using Artificial Intelligence and Deep Learning (Hardcover, 1st ed. 2021)
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
R5,226 Discovery Miles 52 260 Ships in 10 - 15 working days

This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.

Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 1 (Hardcover, 1st ed. 2021): Sabu M.... Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 1 (Hardcover, 1st ed. 2021)
Sabu M. Thampi, Erol Gelenbe, Mohammed Atiquzzaman, Vipin Chaudhary, Kuan-Ching Li
R8,756 Discovery Miles 87 560 Ships in 12 - 19 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.

Selected Readings on Telecommunication and Networking (Hardcover): Jairo Gutierrez Selected Readings on Telecommunication and Networking (Hardcover)
Jairo Gutierrez
R5,408 Discovery Miles 54 080 Ships in 10 - 15 working days

Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality articles focused on key issues concerning the planning, design, maintenance, and management of telecommunications and networking technologies. Containing over 30 chapters from authors across the globe, these selected readings in areas such as collaborative technologies, virtual teams, and wireless systems depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.

Planning, Negotiating, Implementing, and Managing Wide Area Networks - A Practical Guide (Hardcover): Luiz Augusto de Carvalho,... Planning, Negotiating, Implementing, and Managing Wide Area Networks - A Practical Guide (Hardcover)
Luiz Augusto de Carvalho, Benjamin Naude
R605 Discovery Miles 6 050 Ships in 12 - 19 working days

Luiz Augusto de Carvalho - WANOPT Wide area network Specialist
Benjamin Naude - Magna international

"Telecommunications is usually responsible for a large percentage of the IT infrastructure costs, usually only surpassed by personnel. Therefore identifying savings, even small in terms of percentage in a large corporate network may mean hundreds of thousands of dollars per month."

"The techniques described in this book already helped and continuous helping hundreds of organizations to save millions of dollars with their telecommunications infra-structures."

Contents Presents the concepts of the WAN design algorithms Provides practical examples of algorithms and demonstrates how to deploy them Discusses cases where the techniques described were deployed with favorable results Discusses negotiating and managerial strategies Presents a practical guide about how to implement and manage a large WAN

Amazon Comprehend Developer Guide (Hardcover): Documentation Team Amazon Comprehend Developer Guide (Hardcover)
Documentation Team
R961 Discovery Miles 9 610 Ships in 10 - 15 working days
Advanced Methods for Complex Network Analysis (Hardcover): Natarajan Meghanathan Advanced Methods for Complex Network Analysis (Hardcover)
Natarajan Meghanathan
R5,936 Discovery Miles 59 360 Ships in 10 - 15 working days

As network science and technology continues to gain popularity, it becomes imperative to develop procedures to examine emergent network domains, as well as classical networks, to help ensure their overall optimization. Advanced Methods for Complex Network Analysis features the latest research on the algorithms and analysis measures being employed in the field of network science. Highlighting the application of graph models, advanced computation, and analytical procedures, this publication is a pivotal resource for students, faculty, industry practitioners, and business professionals interested in theoretical concepts and current developments in network domains.

Smart and Sustainable Collaborative Networks 4.0 - 22nd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2021,... Smart and Sustainable Collaborative Networks 4.0 - 22nd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2021, Saint-Etienne, France, November 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Luis M. Camarinha-Matos, Xavier Boucher, Hamideh Afsarmanesh
R6,500 Discovery Miles 65 000 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2021, held in Saint-Etienne, and virtually in November 2021. The 70 papers (15 full and 55 short) presented with 5 industrial workshop papers were carefully reviewed and selected from 189 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.

Information Warfare (Hardcover): Daniel Ventre Information Warfare (Hardcover)
Daniel Ventre
R4,095 Discovery Miles 40 950 Ships in 10 - 15 working days

This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.

GFI Network Security and PCI Compliance Power Tools (Paperback, New): Brien Posey GFI Network Security and PCI Compliance Power Tools (Paperback, New)
Brien Posey
R1,373 Discovery Miles 13 730 Ships in 12 - 19 working days

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.
In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.
* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.
* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.
* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.
* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.
* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.
* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.
* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.
* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.
* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports.
* Use GFI EndPointSecurity to Lock Down Hardware
* Create Protection Policies to Control the Level of Device Access
* Master Advanced Features of GFI: Locking Device Categories, Blacklisting and Whitelisting Devices, Using File Type Restrictions and More

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Gathering Cloud
J. R. Carpenter Paperback R421 Discovery Miles 4 210
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl Hardcover R10,065 Discovery Miles 100 650
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R3,056 Discovery Miles 30 560
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,397 Discovery Miles 13 970
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,932 Discovery Miles 19 320
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,539 Discovery Miles 15 390

 

Partners