0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,630)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cybersecurity Breaches and Issues Surrounding Online Threat Protection (Hardcover): Michelle Moore Cybersecurity Breaches and Issues Surrounding Online Threat Protection (Hardcover)
Michelle Moore
R4,916 Discovery Miles 49 160 Ships in 18 - 22 working days

Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats. Cybersecurity Breaches and Issues Surrounding Online Threat Protection is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology.

Broadband - Business Services, Technologies and Strategic Impact (Hardcover): David Wright Broadband - Business Services, Technologies and Strategic Impact (Hardcover)
David Wright
R3,280 Discovery Miles 32 800 Ships in 18 - 22 working days

Broadband technology is ushering the telecom industry through a unique period of change with profound business implications for suppliers and users. This single source describes the four major broadband technologies that are shaping telecommunications networks: frame relay; optical fiber (including SONET); distributed queue dual bus (DQDB); and asynchronous transfer mode (ATM).

Principles of Security and Trust (Hardcover): David Sands, Flemming Nielson Principles of Security and Trust (Hardcover)
David Sands, Flemming Nielson
R1,427 Discovery Miles 14 270 Ships in 18 - 22 working days
Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017): Nilanjan Dey, V. Santhi Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017)
Nilanjan Dey, V. Santhi
R4,903 Discovery Miles 49 030 Ships in 10 - 15 working days

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.

Advances in Geocomputation - Geocomputation 2015--The 13th International Conference (Hardcover, 1st ed. 2017): Daniel A.... Advances in Geocomputation - Geocomputation 2015--The 13th International Conference (Hardcover, 1st ed. 2017)
Daniel A. Griffith, Yongwan Chun, Denis J. Dean
R7,352 R6,481 Discovery Miles 64 810 Save R871 (12%) Ships in 10 - 15 working days

This book contains refereed papers from the 13th International Conference on GeoComputation held at the University of Texas, Dallas, May 20-23, 2015. Since 1996, the members of the GeoComputation (the art and science of solving complex spatial problems with computers) community have joined together to develop a series of conferences in the United Kingdom, New Zealand, Australia, Ireland and the United States of America. The conference encourages diverse topics related to novel methodologies and technologies to enrich the future development of GeoComputation research.

Mass Customization for Personalized Communication Environments - Integrating Human Factors (Hardcover): Constantinos Mourlas,... Mass Customization for Personalized Communication Environments - Integrating Human Factors (Hardcover)
Constantinos Mourlas, Panagiotis Germanakos
R4,569 Discovery Miles 45 690 Ships in 18 - 22 working days

Mass customization and personalization are widely appreciated as viable and promising strategies which aim to provide products and services that best serve individuals' personal needs with near mass production efficiency. ""Mass Customization for Personalized Communication Environments: Integrating Human Factors"" focuses on the customization of services and communication environments to advance user satisfaction and provide a total redefinition of the way goods and services are created or sold and customers and vendors interact. This authoritative collection of chapters offers relevant theoretical foundations, principles, methodologies, frameworks, and best practices within the field of research.

The Future Internet - Alternative Visions (Hardcover, 1st ed. 2015): Jenifer Winter, Ryota Ono The Future Internet - Alternative Visions (Hardcover, 1st ed. 2015)
Jenifer Winter, Ryota Ono
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

Readers seeking to gain a handle on the internet's global expansion will find this book rich in scholarly foundations combined with cutting-edge discussion of emerging ICTs and services and the complex societal contexts in which they are embedded. To explore possibilities to the fullest extent, a sociotechnical systems approach is employed, focusing on the interplay of technical, social, cultural, political, and economic dynamics to explore alternative futures (ones that are not part of the dominant discourse about the internet). These shared perspectives are not well addressed elsewhere in current discussions. Awareness of these dynamics, and the fluidity of the future, is important, as humankind moves forward into the uncertain future. Due to the sociotechnical complexity of the Internet, policymakers, businesspeople, and academics worldwide have struggled to keep abreast of developments. This volume's approach is intended to stimulate dialogue between academics and practitioners on a topic that will affect most aspects of human life in the near-term future.

Fundamentals of Network Security (Hardcover): John E. Canavan Fundamentals of Network Security (Hardcover)
John E. Canavan
R2,425 Discovery Miles 24 250 Ships in 18 - 22 working days

Network security has quickly become an area of primary concern in the world of telecommunications. This easy-to-understand book introduces professionals to fundamental network security concepts, principles, and terms, while providing practical techniques that can be applied on the job. It helps identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.

Automated Workflow Scheduling in Self-Adaptive Clouds - Concepts, Algorithms and Methods (Hardcover, 1st ed. 2017): G.... Automated Workflow Scheduling in Self-Adaptive Clouds - Concepts, Algorithms and Methods (Hardcover, 1st ed. 2017)
G. Kousalya, P. Balakrishnan, C. Pethuru Raj
R1,600 Discovery Miles 16 000 Ships in 10 - 15 working days

This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential for a range of software applications, due to their ability to efficiently leverage diverse and distributed cloud resources. Particular emphasis is placed on how workflow-based automation in software-defined cloud centers and hybrid IT systems can significantly enhance resource utilization and optimize energy efficiency. Topics and features: describes dynamic workflow and task scheduling techniques that work across multiple (on-premise and off-premise) clouds; presents simulation-based case studies, and details of real-time test bed-based implementations; offers analyses and comparisons of a broad selection of static and dynamic workflow algorithms; examines the considerations for the main parameters in projects limited by budget and time constraints; covers workflow management systems, workflow modeling and simulation techniques, and machine learning approaches for predictive workflow analytics. This must-read work provides invaluable practical insights from three subject matter experts in the cloud paradigm, which will empower IT practitioners and industry professionals in their daily assignments. Researchers and students interested in next-generation software-defined cloud environments will also greatly benefit from the material in the book.

Residue Number Systems - Theory and Applications (Hardcover, 1st ed. 2016): P.V. Anandamohan Residue Number Systems - Theory and Applications (Hardcover, 1st ed. 2016)
P.V. Anandamohan
R3,793 Discovery Miles 37 930 Ships in 10 - 15 working days

This new and expanded monograph improves upon Mohan's earlier book, Residue Number Systems (Springer, 2002) with a state of the art treatment of the subject. Replete with detailed illustrations and helpful examples, this book covers a host of cutting edge topics such as the core function, the quotient function, new Chinese Remainder theorems, and large integer operations. It also features many significant applications to practical communication systems and cryptography such as FIR filters and elliptic curve cryptography. Starting with a comprehensive introduction to the basics and leading up to current research trends that are not yet widely distributed in other publications, this book will be of interest to both researchers and students alike.

Amazon CloudWatch User Guide (Hardcover): Documentation Team Amazon CloudWatch User Guide (Hardcover)
Documentation Team
R1,718 Discovery Miles 17 180 Ships in 18 - 22 working days
Group-target Tracking (Hardcover, 1st ed. 2017): Wen-dong Geng, Yuan-qin Wang, Zheng-hong Dong Group-target Tracking (Hardcover, 1st ed. 2017)
Wen-dong Geng, Yuan-qin Wang, Zheng-hong Dong; Translated by Ge Geng, Fan Yang
R2,645 R2,470 Discovery Miles 24 700 Save R175 (7%) Ships in 10 - 15 working days

This book describes grouping detection and initiation; group initiation algorithm based on geometry center; data association and track continuity; as well as separate-detection and situation cognition for group-target. It specifies the tracking of the target in different quantities and densities. At the same time, it integrates cognition into the application. Group-target Tracking is designed as a book for advanced-level students and researchers in the area of radar systems, information fusion of multi-sensors and electronic countermeasures. It is also a valuable reference resource for professionals working in this field.

Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019): N. Jeyanthi, Ajith Abraham, Hamid Mcheick Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019)
N. Jeyanthi, Ajith Abraham, Hamid Mcheick
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Indoor Location-Based Services - Prerequisites and Foundations (Hardcover, 2014 ed.): Martin Werner Indoor Location-Based Services - Prerequisites and Foundations (Hardcover, 2014 ed.)
Martin Werner
R2,669 Discovery Miles 26 690 Ships in 18 - 22 working days

This book delivers concise coverage of classical methods and new developments related to indoor location-based services. It collects results from isolated domains including geometry, artificial intelligence, statistics, cooperative algorithms, and distributed systems and thus provides an accessible overview of fundamental methods and technologies. This makes it an ideal starting point for researchers, students, and professionals in pervasive computing. Location-based services are services using the location of a mobile computing device as their primary input. While such services are fairly easy to implement outside buildings thanks to accessible global positioning systems and high-quality environmental information, the situation inside buildings is fundamentally different. In general, there is no simple way of determining the position of a moving target inside a building without an additional dedicated infrastructure. The book's structure is learning oriented, starting with a short introduction to wireless communication systems and basic positioning techniques and ending with advanced features like event detection, simultaneous localization and mapping, and privacy aspects. Readers who are not familiar with the individual topics will be able to work through the book from start to finish. At the same time all chapters are self-contained to support readers who are already familiar with some of the content and only want to pick selected topics that are of particular interest.

Computational Inference and Control of Quality in Multimedia Services (Hardcover, 1st ed. 2015): Vlado Menkovski Computational Inference and Control of Quality in Multimedia Services (Hardcover, 1st ed. 2015)
Vlado Menkovski
R3,290 R1,791 Discovery Miles 17 910 Save R1,499 (46%) Ships in 10 - 15 working days

This thesis focuses on the problem of optimizing the quality of network multimedia services. This problem spans multiple domains, from subjective perception of multimedia quality to computer networks management. The work done in this thesis approaches the problem at different levels, developing methods for modeling the subjective perception of quality based on objectively measurable parameters of the multimedia coding process as well as the transport over computer networks. The modeling of subjective perception is motivated by work done in psychophysics, while using Machine Learning techniques to map network conditions to the human perception of video services. Furthermore, the work develops models for efficient control of multimedia systems operating in dynamic networked environments with the goal of delivering optimized Quality of Experience. Overall this thesis delivers a set of methods for monitoring and optimizing the quality of multimedia services that adapt to the dynamic environment of computer networks in which they operate.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover)
George Mansour
R623 Discovery Miles 6 230 Ships in 18 - 22 working days
Cloud Computing for Optimization: Foundations, Applications, and Challenges (Hardcover, 1st ed. 2018): Bhabani Shankar Prasad... Cloud Computing for Optimization: Foundations, Applications, and Challenges (Hardcover, 1st ed. 2018)
Bhabani Shankar Prasad Mishra, Himansu Das, Satchidananda Dehuri, Alok Kumar Jagadev
R4,167 R3,596 Discovery Miles 35 960 Save R571 (14%) Ships in 10 - 15 working days

This book discusses harnessing the real power of cloud computing in optimization problems, presenting state-of-the-art computing paradigms, advances in applications, and challenges concerning both the theories and applications of cloud computing in optimization with a focus on diverse fields like the Internet of Things, fog-assisted cloud computing, and big data. In real life, many problems - ranging from social science to engineering sciences - can be identified as complex optimization problems. Very often these are intractable, and as a result researchers from industry as well as the academic community are concentrating their efforts on developing methods of addressing them. Further, the cloud computing paradigm plays a vital role in many areas of interest, like resource allocation, scheduling, energy management, virtualization, and security, and these areas are intertwined with many optimization problems. Using illustrations and figures, this book offers students and researchers a clear overview of the concepts and practices of cloud computing and its use in numerous complex optimization problems.

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover)
James Aweya
R9,306 Discovery Miles 93 060 Ships in 10 - 15 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Cosine-/Sine-Modulated Filter Banks - General Properties, Fast Algorithms and Integer Approximations (Hardcover, 1st ed. 2018):... Cosine-/Sine-Modulated Filter Banks - General Properties, Fast Algorithms and Integer Approximations (Hardcover, 1st ed. 2018)
Vladimir Britanak, K.R. Rao
R5,328 Discovery Miles 53 280 Ships in 18 - 22 working days

This book covers various algorithmic developments in the perfect reconstruction cosine/sine-modulated filter banks (TDAC-MDCT/MDST or MLT, MCLT, low delay MDCT, complex exponential/cosine/sine-modulated QMF filter banks), and near-perfect reconstruction QMF banks (pseudo-QMF banks) in detail, including their general mathematical properties, matrix representations, fast algorithms and various methods to integer approximations being recently a new transform technology for lossless audio coding. Each chapter will contain a number of examples and will conclude with problems and exercises. The book reflects the research efforts/activities and achieved results of the authors in the time period over the last 20 years.

Wireless Information Highways (Hardcover, New): Dimitrios Katsaros, Alexandros Nanopoulos, Yannis Manolopoulos Wireless Information Highways (Hardcover, New)
Dimitrios Katsaros, Alexandros Nanopoulos, Yannis Manolopoulos
R2,306 Discovery Miles 23 060 Ships in 18 - 22 working days

Wireless Information Highways provides an excellent introduction and balanced coverage of the most important topics related to the methodologies developed to support data management in asymmetric communication environments. This book is based on a number of self-contained chapters and provides an opportunity for practitioners and researchers to explore the connection between various computer science techniques and develop solutions to problems that arise in the rapidly emerging field of wireless networks.

On the Line - Business Education in the Digital Age (Hardcover, 1st ed. 2018): Anshuman Khare, Deborah Hurst On the Line - Business Education in the Digital Age (Hardcover, 1st ed. 2018)
Anshuman Khare, Deborah Hurst
R3,735 R3,475 Discovery Miles 34 750 Save R260 (7%) Ships in 10 - 15 working days

This book presents different perspectives of online business education - how it is designed, delivered and how it supports advances in management disciplines. The authors describe online platforms in their provision of timely, excellent and relevant business education. The book starts by examining the emergence of online business education. It offers insights for use to business educators in design and implementation of online learning. It presents and discusses technologies for class facilitation and collaboration including tools used to bring content and issues to life. Disruptive approaches and new directions in online business education are examined. The book is ideal for business educators, administrators, as well as business practitioners that have an interest in delivering high quality business education using online platforms and tools. On the Line: Business Education in the Digital Age is divided into three sections. Section 1 presents papers on "why" business education is viable and sustainable in today's context. Treating education as a service, this section describes new techniques for creating a better online business education experience. It also looks at the role advanced data analytics can play in enhancing the quality of online business education. Section 2 delves into "how" online business education works. It presents conceptual models for teaching in specific disciplines, learning design that describes what business educators do and how programs work. This section also addresses performance assessments and quality assurance measures that help to demonstrate the efficacy of online pedagogy. Practical applied papers are used in this section to highlight the use of learning platforms, tools and their application specific to businesses that build knowledge and skills and make students 'work ready'. Finally Section 3 of the book addresses the "so what?" or the outcomes and impacts of online business education. This section targets where business education needs to take learning next, for example to support sustainable business, ethical decision making and inclusive and collaborative leadership. Chapters deal with topics such as how distributed online environments may work better to support knowledge and soft skill building directly relevant for organizations today. Other learning outcomes showing the value of online business education are discussed. Academics, alumni and consultants from over fifteen institutions and organizations around the world contributed to this book.

Handbook of Software Engineering (Hardcover, 1st ed. 2019): Sungdeok Cha, Richard N. Taylor, Kyo-Chul Kang Handbook of Software Engineering (Hardcover, 1st ed. 2019)
Sungdeok Cha, Richard N. Taylor, Kyo-Chul Kang
R5,237 Discovery Miles 52 370 Ships in 18 - 22 working days

This handbook provides a unique and in-depth survey of the current state-of-the-art in software engineering, covering its major topics, the conceptual genealogy of each subfield, and discussing future research directions. Subjects include foundational areas of software engineering (e.g. software processes, requirements engineering, software architecture, software testing, formal methods, software maintenance) as well as emerging areas (e.g., self-adaptive systems, software engineering in the cloud, coordination technology). Each chapter includes an introduction to central concepts and principles, a guided tour of seminal papers and key contributions, and promising future research directions. The authors of the individual chapters are all acknowledged experts in their field and include many who have pioneered the techniques and technologies discussed. Readers will find an authoritative and concise review of each subject, and will also learn how software engineering technologies have evolved and are likely to develop in the years to come. This book will be especially useful for researchers who are new to software engineering, and for practitioners seeking to enhance their skills and knowledge.

Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020): Shishir K. Shandilya, Neal Wagner, Atulya... Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020)
Shishir K. Shandilya, Neal Wagner, Atulya K. Nagar
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.

Security and Privacy in Smart Sensor Networks (Hardcover): Yassine Maleh, Abdellah Ezzati, Mustapha Belaissaoui Security and Privacy in Smart Sensor Networks (Hardcover)
Yassine Maleh, Abdellah Ezzati, Mustapha Belaissaoui
R5,399 Discovery Miles 53 990 Ships in 18 - 22 working days

Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource that examines recent developments and emerging trends in smart sensor security and privacy by providing new models, practical solutions, and technological advances related to security. Featuring coverage on a broad range of topics such as cloud security, encryption, and intrusion detection systems, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on authentication and intrusion detection.

Python Passive Network Mapping - P2NMAP (Paperback): Chet Hosmer Python Passive Network Mapping - P2NMAP (Paperback)
Chet Hosmer
R1,359 Discovery Miles 13 590 Ships in 10 - 15 working days

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690

 

Partners