0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (878)
  • R500+ (13,588)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, VOL 1 (Hardcover): Information Reso... Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, VOL 1 (Hardcover)
Information Reso Management Association
R9,763 Discovery Miles 97 630 Ships in 18 - 22 working days
XSS Attacks - Cross Site Scripting Exploits and Defense (Paperback): Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager,... XSS Attacks - Cross Site Scripting Exploits and Defense (Paperback)
Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D Petkov
R1,912 Discovery Miles 19 120 Ships in 18 - 22 working days

A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers.
* XSS Vulnerabilities exist in 8 out of 10 Web sites
* The authors of this book are the undisputed industry leading authorities
* Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else

Universal Semantic Communication (Hardcover, 2011): Brendan Juba Universal Semantic Communication (Hardcover, 2011)
Brendan Juba
R2,714 Discovery Miles 27 140 Ships in 18 - 22 working days

Is meaningful communication possible between two intelligent parties who share no common language or background? In this work, a theoretical framework is proposed in which it is possible to address when and to what extent such semantic communication is possible: such problems can be rigorously addressed by explicitly focusing on the goals of the communication. Under this framework, it is possible to show that for many goals, communication without any common language or background is possible using universal protocols. This work should be accessible to anyone with an undergraduate-level knowledge of the theory of computation. The theoretical framework presented here is of interest to anyone wishing to design systems with flexible interfaces, either among computers or between computers and their users.

Developing and Evaluating a Cloud Service Relationship Theory (Hardcover, 2015 ed.): Jan Huntgeburth Developing and Evaluating a Cloud Service Relationship Theory (Hardcover, 2015 ed.)
Jan Huntgeburth
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book develops, evaluates and refines a cloud service relationship theory that explains how cloud users' uncertainties arise in these relationships and how they can be mitigated. To that end, the book employs principal-agent theory and the concepts of bounded rationality and social embeddedness. Beyond advancing IS research, the findings presented can greatly benefit governments, IT departments and IT providers, helping them to better understand cloud service relationships and to adjust their cloud service strategies accordingly.

New Updates in E-Learning (Hardcover): Eduard Babulak New Updates in E-Learning (Hardcover)
Eduard Babulak
R3,081 Discovery Miles 30 810 Ships in 18 - 22 working days
Cellular Communications Systems in Congested Environments - Resource Allocation and End-to-End Quality of Service Solutions... Cellular Communications Systems in Congested Environments - Resource Allocation and End-to-End Quality of Service Solutions with MATLAB (Hardcover, 1st ed. 2017)
Mo Ghorbanzadeh, Ahmed Abdelhadi, Charles Clancy
R3,367 Discovery Miles 33 670 Ships in 10 - 15 working days

This book presents a mathematical treatment of the radio resource allocation of modern cellular communications systems in contested environments. It focuses on fulfilling the quality of service requirements of the living applications on the user devices, which leverage the cellular system, and with attention to elevating the users' quality of experience. The authors also address the congestion of the spectrum by allowing sharing with the band incumbents while providing with a quality-of-service-minded resource allocation in the network. The content is of particular interest to telecommunications scheduler experts in industry, communications applications academia, and graduate students whose paramount research deals with resource allocation and quality of service.

Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition): Edward Amoroso Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition)
Edward Amoroso
R1,461 Discovery Miles 14 610 Ships in 10 - 15 working days

This textbook offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure and includes practical and empirically-based guidance for students wishing to become security engineers, network operators, software designers, technology managers, application developers, Chief Security Officers, etc.. This approach includes controversial themes such as the deliberate use of deception to trap intruders. In short, it serves as an attractive framework for a new national strategy for cyber security. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows students to understand how any organization, such as a government agency, integrates the principles into their local environment. The STUDENT EDITION features several case studies illustrating actual implementation scenarios of the principals and requirements discussed in the text. It also includes helpful pedagogical elements such as chapter outlines, chapter summaries, learning checklists, and a 2-color interior. And it boasts a new and complete instructor ancillary package including test bank, IM, Ppt slides, case study questions, and more.

Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges

Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues

Includes instructor slides for each chapter as well as an instructor s manual with sample syllabi and test bank"

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R1,966 Discovery Miles 19 660 Ships in 10 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

The Internet of Things: Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association The Internet of Things: Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R8,504 Discovery Miles 85 040 Ships in 18 - 22 working days

The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. The Internet of Things: Breakthroughs in Research and Practice is an authoritative reference source for the latest academic material on the interconnectivity of networks and devices in the digital era and examines best practices for integrating this advanced connectivity across multiple fields. Featuring extensive coverage on innovative perspectives, such as secure computing, regulatory standards, and trust management, this book is ideally designed for engineers, researchers, professionals, graduate students, and practitioners seeking scholarly insights on the Internet of Things.

Information Communication Technologies and Globalization of Retailing Applications (Hardcover): Rajagopal Information Communication Technologies and Globalization of Retailing Applications (Hardcover)
Rajagopal
R4,205 Discovery Miles 42 050 Ships in 18 - 22 working days

Globalization has pushed the use of technology in business with advancing information and communication technology becoming a key factor in the future development of the retailing industry. Technology applications have significantly contributed to the exponential growth and profits of retailing institutions worldwide. ""Information Communication Technologies and Globalization of Retailing Applications"" critically examines the synergy of technology use and conventional wisdom in retailing and explores contemporary changes determining higher customer value. Discussions in this book encompass strategy implications for managers to optimize their advantage in retailing through the application of ICT, bridging the customer-technology gap.

Advances in Parallel and Distributed Computing and Ubiquitous Services - UCAWSN & PDCAT 2015 (Hardcover, 1st ed. 2016): James J... Advances in Parallel and Distributed Computing and Ubiquitous Services - UCAWSN & PDCAT 2015 (Hardcover, 1st ed. 2016)
James J (Jong Hyuk) Park, Gangman Yi, Young-Sik Jeong, Hong Shen
R3,615 R3,354 Discovery Miles 33 540 Save R261 (7%) Ships in 10 - 15 working days

This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.

Security in Wireless LANs and MANs (Hardcover): Thomas Hardjono, Lakshminath R. Dondeti Security in Wireless LANs and MANs (Hardcover)
Thomas Hardjono, Lakshminath R. Dondeti
R2,511 Discovery Miles 25 110 Ships in 18 - 22 working days

With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers professionals practical insight into identifying and overcoming these security issues. Including detailed descriptions of possible solutions to a number of specific security problems, the book gives practitioners the hands-on techniques that they need to secure wireless networks in the enterprise and the home.

Coding for Penetration Testers - Building Better Tools (Paperback): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback)
Jason Andress, Ryan Linn
R804 R647 Discovery Miles 6 470 Save R157 (20%) Ships in 10 - 15 working days

Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. "Coding for Penetration Testers" provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the reader through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the reader is guided through real-world scenarios and tool development that can be incorporated into a tester's toolkit.
Discusses the use of various scripting languages in penetration testingPresents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languagesProvides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting

The Smartest Person in the Room - The Root Cause and New Solution for Cybersecurity (Hardcover): Christian Espinosa The Smartest Person in the Room - The Root Cause and New Solution for Cybersecurity (Hardcover)
Christian Espinosa
R668 Discovery Miles 6 680 Ships in 10 - 15 working days
Amazon Elasticsearch Service Developer Guide (Hardcover): Documentation Team Amazon Elasticsearch Service Developer Guide (Hardcover)
Documentation Team
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days
Augmented Reality and Virtual Reality - The Power of AR and VR for Business (Hardcover, 1st ed. 2019): M. Claudia Tom Dieck,... Augmented Reality and Virtual Reality - The Power of AR and VR for Business (Hardcover, 1st ed. 2019)
M. Claudia Tom Dieck, Timothy Jung
R4,646 Discovery Miles 46 460 Ships in 10 - 15 working days

This book presents a collection of the latest research in the area of immersive technologies, presented at the International Augmented and Virtual Reality Conference 2018 in Manchester, UK, and showcases how augmented reality (AR) and virtual reality (VR) are transforming the business landscape. Innovations in this field are seen as providing opportunities for businesses to offer their customers unique services and experiences. The papers gathered here advance the state of the art in AR/VR technologies and their applications in various industries such as healthcare, tourism, hospitality, events, fashion, entertainment, retail, education and gaming. The volume collects contributions by prominent computer and social sciences experts from around the globe. Addressing the most significant topics in the field of augmented and virtual reality and sharing the latest findings, it will be of interest to academics and practitioners alike.

AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback): Santana AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback)
Santana
R1,371 R1,149 Discovery Miles 11 490 Save R222 (16%) Ships in 18 - 22 working days

Get prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It's also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers. Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications. The study guide serves as a primary source for those who are ready to apply their skills and seek certification. It addresses how cybersecurity can be improved using the AWS cloud and its native security services. Readers will benefit from detailed coverage of AWS Certified Security Specialty Exam topics. Covers all AWS Certified Security Specialty exam topics Explains AWS cybersecurity techniques and incident response Covers logging and monitoring using the Amazon cloud Examines infrastructure security Describes access management and data protection With a single study resource, you can learn how to enhance security through the automation, troubleshooting, and development integration capabilities available with cloud computing. You will also discover services and tools to develop security plans that work in sync with cloud adoption.

Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.): Robinson E. Pino, Alexander Kott, Michael... Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.)
Robinson E. Pino, Alexander Kott, Michael Shevenell
R3,877 R3,324 Discovery Miles 33 240 Save R553 (14%) Ships in 10 - 15 working days

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

Handbook on Securing Cyber-Physical Critical Infrastructure (Hardcover, New): Sajal K. Das, Krishna Kant, Nan Zhang Handbook on Securing Cyber-Physical Critical Infrastructure (Hardcover, New)
Sajal K. Das, Krishna Kant, Nan Zhang
R1,916 Discovery Miles 19 160 Ships in 10 - 15 working days

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios

*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on.

*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover)
Scott N Schober, Craig W Schober
R699 R628 Discovery Miles 6 280 Save R71 (10%) Ships in 18 - 22 working days
Data Security in Cloud Computing (Hardcover): Vimal Kumar, Ryan Ko, Sivadon Chaisiri Data Security in Cloud Computing (Hardcover)
Vimal Kumar, Ryan Ko, Sivadon Chaisiri
R3,639 R3,279 Discovery Miles 32 790 Save R360 (10%) Ships in 18 - 22 working days

Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management. Data Security in Cloud Computing covers major aspects of securing data in Cloud Computing. Topics covered include NOMAD: a framework for ensuring data confidentiality in mission-critical cloud based applications; 3DCrypt: privacy-preserving pre-classification volume ray-casting of 3D images in the cloud; multiprocessor system-on-chip for processing data in Cloud Computing; distributing encoded data for private processing in the cloud; data protection and mobility management for cloud; understanding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.

Cyberspace and International Relations - Theory, Prospects and Challenges (Hardcover, 2014 ed.): Jan-Frederik Kremer, Benedikt... Cyberspace and International Relations - Theory, Prospects and Challenges (Hardcover, 2014 ed.)
Jan-Frederik Kremer, Benedikt Muller
R4,056 Discovery Miles 40 560 Ships in 10 - 15 working days

Cyberspace is everywhere in today s world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the cyberization of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice.

In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches.

Contributions in the second part focus on specific empirical fields of activity (security, economy, diplomacy, cultural activity, transnational communication, critical infrastructure, cyber espionage, social media, and more) and address emerging challenges and prospects for international politics and relations."

Breakthrough Perspectives in Network and Data Communications Security, Design, and Applications (Hardcover): Indranil Bose Breakthrough Perspectives in Network and Data Communications Security, Design, and Applications (Hardcover)
Indranil Bose
R4,942 Discovery Miles 49 420 Ships in 18 - 22 working days

Modern organizations are critically dependent on data communications and network systems utilized in managing information and communications, vital to continuity and success of operations. ""Breakthrough Perspectives in Network and Data Communications Security, Design and Applications"" addresses key issues and offers expert viewpoints into the field of network and data communications, providing the academic, information technology, and managerial communities with the understanding necessary to implement robust, secure, and effective solutions. This much-needed addition to library and professional collections offers a matchless set of high quality research articles and premier technologies to address the most salient issues in network and data communications.

Big Data Processing Using Spark in Cloud (Hardcover, 1st ed. 2019): Mamta Mittal, Valentina E. Balas, Lalit Mohan Goyal,... Big Data Processing Using Spark in Cloud (Hardcover, 1st ed. 2019)
Mamta Mittal, Valentina E. Balas, Lalit Mohan Goyal, Raghvendra Kumar
R2,677 Discovery Miles 26 770 Ships in 18 - 22 working days

The book describes the emergence of big data technologies and the role of Spark in the entire big data stack. It compares Spark and Hadoop and identifies the shortcomings of Hadoop that have been overcome by Spark. The book mainly focuses on the in-depth architecture of Spark and our understanding of Spark RDDs and how RDD complements big data's immutable nature, and solves it with lazy evaluation, cacheable and type inference. It also addresses advanced topics in Spark, starting with the basics of Scala and the core Spark framework, and exploring Spark data frames, machine learning using Mllib, graph analytics using Graph X and real-time processing with Apache Kafka, AWS Kenisis, and Azure Event Hub. It then goes on to investigate Spark using PySpark and R. Focusing on the current big data stack, the book examines the interaction with current big data tools, with Spark being the core processing layer for all types of data. The book is intended for data engineers and scientists working on massive datasets and big data technologies in the cloud. In addition to industry professionals, it is helpful for aspiring data processing professionals and students working in big data processing and cloud computing environments.

Streaming Analytics - Concepts, architectures, platforms, use cases and applications (Hardcover): Pethuru Raj, Chellammal... Streaming Analytics - Concepts, architectures, platforms, use cases and applications (Hardcover)
Pethuru Raj, Chellammal Surianarayanan, Koteeswaran Seerangan, George Ghinea
R3,444 R3,108 Discovery Miles 31 080 Save R336 (10%) Ships in 18 - 22 working days

When digitized entities, connected devices and microservices interact purposefully, we end up with a massive amount of multi-structured streaming (real-time) data that is continuously generated by different sources at high speed. Streaming analytics allows the management, monitoring, and real-time analytics of live streaming data. The topic has grown in importance due to the emergence of online analytics and edge and IoT platforms. A real digital transformation is being achieved across industry verticals through meticulous data collection, cleansing and crunching in real time. Capturing and subjecting those value-adding events is considered to be the prime task for achieving trustworthy and timely insights. The authors articulate and accentuate the challenges widely associated with streaming data and analytics, describe data analytics algorithms and approaches, present edge and fog computing concepts and technologies and show how streaming analytics can be accomplished in edge device clouds. They also delineate several industry use cases across cloud system operations in transportation and cyber security and other business domains. The book will be of interest to ICTs industry and academic researchers, scientists and engineers as well as lecturers and advanced students in the fields of data science, cloud/fog/edge architecture, internet of things and artificial intelligence and related fields of applications. It will also be useful to cloud/edge/fog and IoT architects, analytics professionals, IT operations teams and site reliability engineers (SREs).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Cybersecurity for Connected Medical…
Arnab Ray Paperback R2,061 Discovery Miles 20 610
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd Paperback R2,283 Discovery Miles 22 830
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710

 

Partners