0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (281)
  • R250 - R500 (873)
  • R500+ (13,607)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

General Systemology - Transdisciplinarity for Discovery, Insight and Innovation (Hardcover, 1st ed. 2018): David Rousseau,... General Systemology - Transdisciplinarity for Discovery, Insight and Innovation (Hardcover, 1st ed. 2018)
David Rousseau, Jennifer Wilby, Julie Billingham, Stefan Blachfellner
R3,083 Discovery Miles 30 830 Ships in 18 - 22 working days

This book expands the foundations of general systems theory to enable progress beyond the rich heuristic practices available today. It establishes a foundational framework for the development of scientific transdisciplinary systems principles and shows how these can amplify the potential of individuals and teams working in multi-, inter- and transdisciplinary contexts or striving to translate their progress across disciplinary boundaries. Three general scientific systems principles are presented, and their relevance to the design, analysis, management and transformation of systems is explored. Applying lessons from the history and philosophy science, this book disambiguates key concepts of general systemology, clarifies the role of general systemology within the field of systemology, and explains how general systemology supports other forms of transdisciplinarity. These insights are used to develop new perspectives, strategies and tools for addressing long-standing challenges to the advancement and transdisciplinary application of general insights into the nature of complex systems.The material presented in this book includes comprehensive models of the structure of systemology as a disciplinary field, the structure and significance of the general systems worldview, and the role of general systemology as the heart of systems science, systems engineering and systems practice. It explains what a fully-fledged general theory of systems would look like, what its potential is, what routes are available to us to develop it further, and how to leverage the knowledge we have attained so far. Many examples and analogies show how general systemology has the potential to enable scientific discovery, insightful theory building, and practical innovation in all the disciplines as they study, design, nurture or transform complex systems. This book is essential reading for anyone wishing to master the concepts, terminology, models and strategies needed to make effective use of current general systems knowledge and to engage in the further development of the philosophy, science, and practice of general systemology.

AWS DeepLens Developer Guide (Hardcover): Documentation Team AWS DeepLens Developer Guide (Hardcover)
Documentation Team
R878 Discovery Miles 8 780 Ships in 18 - 22 working days
Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks (Hardcover): Biswa Mohan... Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks (Hardcover)
Biswa Mohan Sahoo, Suman Avdhesh Yadav
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collected by the underlying cyber-physical systems, in terms of resource usage. Recent advances in the best practices, opportunities, challenges, and benefits of information security must be studied and considered for businesses across sectors to successfully utilize the practices in their internet of things, 5G, and next-generation wireless networks. Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks highlights research on secure communication of 5G, internet of things, and next-generation wireless networks along with related areas to ensure secure and internet-compatible internet of things systems. The book also discusses the effects of the internet of things technologies on various situations in smart city design. Covering a range of topics such as secure communications and security evaluations, this reference work is ideal for industry professionals, business owners, engineers, researchers, scholars, practitioners, academicians, instructors, and students.

Cross-Industry Use of Blockchain Technology and Opportunities for the Future (Hardcover): Idongesit Williams Cross-Industry Use of Blockchain Technology and Opportunities for the Future (Hardcover)
Idongesit Williams
R6,199 Discovery Miles 61 990 Ships in 18 - 22 working days

Blockchain is a technology that transcends cryptocurrencies. There are other services in different sectors of the economy that can benefit from the trust and security that blockchains offer. For example, financial institutions are using blockchains for international money transfer, and in logistics, it has been used for supply chain management and tracking of goods. As more global companies and governments are experimenting and deploying blockchain solutions, it is necessary to compile knowledge on the best practices, strategies, and failures in order to create a better awareness of how blockchain could either support or add value to other services. Cross-Industry Use of Blockchain Technology and Opportunities for the Future provides emerging research highlighting the possibilities inherent in blockchain for different sectors of the economy and the added value blockchain can provide for the future of these different sectors. Featuring coverage on a broad range of topics such as data privacy, information sharing, and digital identity, this book is ideally designed for IT specialists, consultants, design engineers, cryptographers, service designers, researchers, academics, government officials, and industry professionals.

The Expert Guide to PeopleSoft Security (Hardcover): Jason Carter The Expert Guide to PeopleSoft Security (Hardcover)
Jason Carter
R662 R591 Discovery Miles 5 910 Save R71 (11%) Ships in 18 - 22 working days

Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you. The Expert Guide to PeopleSoft Security provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. The Expert Guide to PeopleSoft Security provides knowledge and insight for Administrators, Managers, Developers and Users alike. success, including: Security Design, User Profile Setup, Role & Permission List Setup, Process Security, Query Security, Row Level Security (for HR and Financials), Portal Security, Security Migrations, Definition Security, LDAP Authentication, Password Controls, Dynamic Role Creation and more. Additionally it provides an indispensable reference to PeopleSoft Security Tables as well as SQL scripts to query the security information most requested from the system. All in all The Expert Guide to PeopleSoft Security provides a comprehensive look at one of the most misunderstood but essential parts of the PeopleSoft System. Is your system properly secured?

Windows Server 2003 Security Infrastructures - Core Security Features (Paperback): Jan de Clercq Windows Server 2003 Security Infrastructures - Core Security Features (Paperback)
Jan de Clercq
R2,372 Discovery Miles 23 720 Ships in 10 - 15 working days

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS.
*Explains nuts and bolts of Windows Server 2003 security
*Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures
*Draws on the experience of a lead consultant in the Microsoft security area

Networked Communities - Strategies for Digital Collaboration (Hardcover): Sylvie Albert, Don Flournoy, Rolland LeBrasseur Networked Communities - Strategies for Digital Collaboration (Hardcover)
Sylvie Albert, Don Flournoy, Rolland LeBrasseur
R4,172 Discovery Miles 41 720 Ships in 18 - 22 working days

Today, information communication technologies, such as the Internet and World Wide Web, are inextricably woven into the fabric of social and economic development. These changes are happening locally as well as globally, and the impact is transformational everywhere. Networked Communities: Strategies for Digital Collaboration looks at best practices in building sustainable community development to explain not only how but why. This unique book contains extensive referencing and sophisticated analysis in the ways communities are using information communication technologies to secure a more prosperous future.

Analyzing Security, Trust, and Crime in the Digital World (Hardcover): Hamid R. Nemati Analyzing Security, Trust, and Crime in the Digital World (Hardcover)
Hamid R. Nemati
R4,837 Discovery Miles 48 370 Ships in 18 - 22 working days

In the digital era, information is the most valuable resource, and protecting one s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein."

Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019): Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu,... Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019)
Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, …
R3,336 Discovery Miles 33 360 Ships in 18 - 22 working days

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.

Business Data Communications and Networking - A Research Perspective (Hardcover, New): Business Data Communications and Networking - A Research Perspective (Hardcover, New)
R2,635 Discovery Miles 26 350 Ships in 18 - 22 working days

The increasing business use of wireless and mobile technologies on a variety of devices has accelerated the need for a better understanding of the technologies involved. ""Business Data Communications and Networking: A Research Perspective"" addresses the key issues for businesses utilizing data communications and the increasing importance of networking technologies in business. ""Business Data Communications and Networking: A Research Perspective"" covers a series of technical advances in the field while highlighting their respective contributions to business or organizational goals, and centers on the issues of network-based applications, mobility, wireless networks, and network security.

Writing in a Milieu of Utility - The Move to Technical Communication in American Engineering Programs, 1850-1950, 2nd Edition... Writing in a Milieu of Utility - The Move to Technical Communication in American Engineering Programs, 1850-1950, 2nd Edition (Hardcover, 2nd Revised edition)
Teresa Kynell
R2,214 R2,045 Discovery Miles 20 450 Save R169 (8%) Ships in 10 - 15 working days

This book traces the pedagogical evolution of technical communication in America as it grew out of Engineering English requirements from roughly the turn of the century to 1950. This study examines specific curricular patterns, texts, and writers on the subject of technical communication, while also tracing engineering educational patterns as they emerge from the proceedings of the society for the promotion of engineering education. Unique to the second edition of the book is a new preface by the recent past ATTW series editor, Jimmie Killingsworth, a new introduction by Elizabeth Tebeaux, and an epilogue by Katherine Staples. Writing in a Milieu of Utility concludes that technical writing, as we teach it today, likely found its roots in engineering composition pedagogy, when, at approximately the turn of the century, engineering educators recognized that writing about science and technology not only made sense in an academic milieu that emphasized utility, but that such writing could also contribute to the professional success of engineering students. Existing somewhat tenuously as engineering itself sought academic status, technical communication emerged ultimately as a re-conceptualized composition course, after early to mid twentieth century calls for English and engineering cooperation made traditional composition offerings less relevant. Academic writing on environmental communication proliferated in the 1990's. A few of us had been calling for such work and making initial investigations throughout the 1980's, but the momentum in the field built slowly. Spurred by coverage in the mass media, academic publishers finally caught the wave of interest. In this exciting new volume, the editors demonstrate more fully than ever before how environmental rhetoric and technical communication go hand in hand. The key link that they and their distinguished group of contributors have discovered is the ancient concern of communication scholars with public deliberation. Environmental issues present technical communicators with some of their greatest challenges, above all, how to make the highly specialized and inscrutably difficult technical information generated by environmental scientists and engineers usable in public decision making. The editors encourage us to accept the challenge of contributing to environmentally conscious decision making by integrating technical knowledge and human values. For technical communicators who accept the challenge of working toward solutions by opening access to crucial information and by engaging in critical thinking on ecological issues, the research and theory offered in this volume provide a strong foundation for future practice.

Advanced Applications of Blockchain Technology (Hardcover, 1st ed. 2020): Shiho Kim, Ganesh Chandra Deka Advanced Applications of Blockchain Technology (Hardcover, 1st ed. 2020)
Shiho Kim, Ganesh Chandra Deka
R4,639 Discovery Miles 46 390 Ships in 10 - 15 working days

This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.

When Compressive Sensing Meets Mobile Crowdsensing (Hardcover, 1st ed. 2019): Linghe Kong, Bowen Wang, Guihai Chen When Compressive Sensing Meets Mobile Crowdsensing (Hardcover, 1st ed. 2019)
Linghe Kong, Bowen Wang, Guihai Chen
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Mobile crowdsensing, as an emerging sensing paradigm, enables the masses to take part in data collection tasks with the aid of powerful mobile devices. However, mobile crowdsensing platforms have yet to be widely adopted in practice, the major concern being the quality of the data collected. There are numerous causes: some locations may generate redundant data, while others may not be covered at all, since the participants are rarely systematically coordinated; privacy is a concern for some people, who don't wish to share their real-time locations, and therefore some key information may be missing; further, some participants may upload fake data in order to fraudulently gain rewards. To address these problematic aspects, compressive sensing, which works by accurately recovering a sparse signal using very few samples, has proven to offer an effective solution.

Blogging 2020 - An Essential Guide to Marketing Your Blog and Making Money Online from It, Including Tips for Setting Up... Blogging 2020 - An Essential Guide to Marketing Your Blog and Making Money Online from It, Including Tips for Setting Up Multiple Streams of Passive Income Using Affiliate Marketing and More (Hardcover)
Matthew Shields
R685 R614 Discovery Miles 6 140 Save R71 (10%) Ships in 18 - 22 working days
Organizational Advancements Through Enterprise Information Systems - Emerging Applications and Developments (Hardcover): Organizational Advancements Through Enterprise Information Systems - Emerging Applications and Developments (Hardcover)
R4,615 Discovery Miles 46 150 Ships in 18 - 22 working days

Enterprise Information Systems (EIS) allow for the sharing and coordination of information across an organization. Given the global nature of today's business, it has become necessary to develop strategic alliances and promote inter-organizational communication. This collection, entitled Organizational Advancements through Enterprise Information Systems: Emerging Applications and Developments, provides a comprehensive assessment of the latest developments in the EIS revolution. Individual chapters, which focus on Enterprise Resource Planning (ERP) adoption, the integration of enterprise systems, personalized ERP, and the Semantic Web, offer ideas and solutions for the future of the global enterprise.

Computer Networking for Beginners - Your Guide for Mastering Computer Networking, Cisco IOS and the OSI Model (Paperback):... Computer Networking for Beginners - Your Guide for Mastering Computer Networking, Cisco IOS and the OSI Model (Paperback)
Ramon Nastase
R320 Discovery Miles 3 200 Ships in 18 - 22 working days
Distributed Real-Time Systems - Theory and Practice (Hardcover, 1st ed. 2019): K. Erciyes Distributed Real-Time Systems - Theory and Practice (Hardcover, 1st ed. 2019)
K. Erciyes
R2,132 Discovery Miles 21 320 Ships in 18 - 22 working days

This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.

Spectrums Wars - The Policy and Technology Debate (Hardcover): Jennifer A. Manner Spectrums Wars - The Policy and Technology Debate (Hardcover)
Jennifer A. Manner
R2,198 Discovery Miles 21 980 Ships in 18 - 22 working days

Because the wireless industry is less capital intensive than others sectors in the telecommunications marketplace, it is expected to enjoy continued profitability. With survival at stake, telecommunications companies must ready themselves for battle to win access and operations rights in the wireless communications spectrum. This book maps out the strategies required to fight this battle by explaining how a telecommunications company should structure its entry and operations in the spectrum.

Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover): Edward Humphreys Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover)
Edward Humphreys
R2,217 Discovery Miles 22 170 Ships in 18 - 22 working days

The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.

Connectivity and Knowledge Management in Virtual Organizations - Networking and Developing Interactive Communications... Connectivity and Knowledge Management in Virtual Organizations - Networking and Developing Interactive Communications (Hardcover)
Cesar Camison, Daniel Palacios, Fernando Garrigos, Carlos Devece
R4,980 Discovery Miles 49 800 Ships in 18 - 22 working days

Advances in computing technology and internet-worked environments have driven profound realignments not only in the dynamics of technologically mediated interpersonal interactions but also in the way organizations engage with consumers, producers, and other businesses. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications provides managers and academicians with a comprehensive review of innovations and trends in virtual organizations. Covering topics such as knowledge creation and management, virtual customer networks, e-commerce, and virtual communities this reference book offers incisive analysis of the full spectrum of technologies, applications, practices, and outcomes within this growing field.

Mobile Cloud Computing - Foundations and Service Models (Paperback): Huijun Wu, Dijiang Huang Mobile Cloud Computing - Foundations and Service Models (Paperback)
Huijun Wu, Dijiang Huang
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds.

A Rhetoric of Electronic Communities (Hardcover, New): Tharon W. Howard A Rhetoric of Electronic Communities (Hardcover, New)
Tharon W. Howard
R2,801 R2,535 Discovery Miles 25 350 Save R266 (9%) Ships in 10 - 15 working days

This book is a study of the power to monitor what is said, authorize who may speak, and even to determine what is and is not knowable within the context of electronic discourse communities. It tests the claim that the Internet and other wide-area networking systems promote participatory democracies and may serve as agencies for communal change by enabling the formation of resisting subjectivities.

Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,436 Discovery Miles 94 360 Ships in 18 - 22 working days
Creating a Local Area Network in the School Library Media Center (Hardcover, New): Becky Mather Creating a Local Area Network in the School Library Media Center (Hardcover, New)
Becky Mather
R2,142 R1,884 Discovery Miles 18 840 Save R258 (12%) Ships in 10 - 15 working days

Let an award-winning school library media specialist who has implemented a local area network (LAN) in her media center help you plan this important addition to your media center while avoiding the pitfalls. This hands-on practical guide contains all the information the network novice needs to plan, fund, create, and maintain a LAN in the media center. Based on the experience of the school library media specialist who received the 1994 Follett/AASL "Microcomputer in the Media Center Award" for creating a local area network in the high school media center, this guide describes the procedures for planning, designing, funding, installing, organizing, training, evaluating, and maintaining a LAN in a library media center setting. Step-by-step nontechnical instructions and advice for creating an information network are presented in an understandable format. How to expand into a school-district wide area network (WAN) and gain access to the Internet are also discussed. This comprehensive work takes the network novice from dream to implementation, maintenance, and evaluation of a local area network. It covers funding sources, tips for writing technology grants, requests for proposals from vendors, staff inservice and student training, evaluation and assessment, student internships, technology teams, troubleshooting equipment, and network administration. Useful forms, simple network schematic diagrams, a model school-board approved electronic resources policy, a glossary of technical terms, and sample assessment tools are included. No other book walks the library media specialist through every step in creating a LAN. Media professionals who want to provide networked electronic information to thestaff and students but are not sure of how to proceed will benefit from this clear, nontechnical guide to the process.

Building Brand Identity in the Age of Social Media - Emerging Research and Opportunities (Hardcover): Amir Ekhlassi, Mahdi... Building Brand Identity in the Age of Social Media - Emerging Research and Opportunities (Hardcover)
Amir Ekhlassi, Mahdi Niknejhad Moghadam, Amir Mohammad Adibi
R3,600 Discovery Miles 36 000 Ships in 18 - 22 working days

To survive in today's competitive business environment, marketing professionals must look to develop innovative methods of reaching their customers and stakeholders. Social media is a useful tool for developing the relationships between businesses and consumers. Building Brand Identity in the Age of Social Media: Emerging Research and Opportunities is a critical scholarly resource that examines the media consumption and habits of consumers to evaluate the challenges of brand building. Featuring coverage on a broad range of topics such as brand identity, brand loyalty, and social media branding, this book is geared towards marketing professionals, business managers, and individuals interested in how social media fits into today's marketing environments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Guide to Networking Essentials
Greg Tomsho Paperback R1,548 R1,299 Discovery Miles 12 990
PC Interfacing
Pei An Paperback R1,213 Discovery Miles 12 130
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Guide to Computer Forensics and…
Amelia Phillips, Bill Nelson, … Paperback R1,345 R1,248 Discovery Miles 12 480
CompTIA Network+ Guide to Networks
Jill West Paperback R1,359 R1,266 Discovery Miles 12 660
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300

 

Partners