0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (831)
  • R500+ (14,090)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Privacy Solutions and Security Frameworks in Information Protection (Hardcover): Hamid R. Nemati Privacy Solutions and Security Frameworks in Information Protection (Hardcover)
Hamid R. Nemati
R5,337 Discovery Miles 53 370 Ships in 10 - 15 working days

While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.

Smart Buildings Digitalization, Two Volume Set (Hardcover): O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban Smart Buildings Digitalization, Two Volume Set (Hardcover)
O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban
R7,117 Discovery Miles 71 170 Ships in 12 - 19 working days

A smart building is the state-of-art in building with features that facilitates informed decision making based on the available data through smart metering and IoT sensors. This set provides useful information for developing smart buildings including significant improvement of energy efficiency, implementation of operational improvements and targeting sustainable environment to create an effective customer experience. It includes case studies from industrial results which provide cost effective solutions and integrates the digital SCADE solution. Describes complete implication of smart buildings via industrial, commercial and community platforms Systematically defines energy-efficient buildings, employing power consumption optimization techniques with inclusion of renewable energy sources Covers data centre and cyber security with excellent data storage features for smart buildings Includes systematic and detailed strategies for building air conditioning and lighting Details smart building security propulsion. This set is aimed at graduate students, researchers and professionals in building systems, architectural, and electrical engineering.

Matrix and Analytical Methods for Performance Analysis of Telecommunication Systems (Hardcover, 1st ed. 2021): Valeriy Naumov,... Matrix and Analytical Methods for Performance Analysis of Telecommunication Systems (Hardcover, 1st ed. 2021)
Valeriy Naumov, Yuliya Gaidamaka, Natalia Yarkina, Konstantin Samouylov
R1,563 Discovery Miles 15 630 Ships in 10 - 15 working days

This introductory textbook is designed for a one-semester course on the use of the matrix and analytical methods for the performance analysis of telecommunication systems. It provides an introduction to the modelling and analysis of telecommunication systems for a broad interdisciplinary audience of students in mathematics and applied disciplines such as computer science, electronics engineering, and operations research.

Corporate Networks - Strategic Use of Telecommunications (Hardcover): Thomas Valovic Corporate Networks - Strategic Use of Telecommunications (Hardcover)
Thomas Valovic
R2,649 Discovery Miles 26 490 Ships in 10 - 15 working days

An in-depth analysis of how the Fortune 1000 companies have dealt with the strategic use of computers and communications, what applications have been successful and which have faltered, and how upcoming technologies will provide the foundation for a new generation of strategic applications.

Innovations in Cybersecurity Education (Hardcover, 1st ed. 2020): Kevin Daimi, Guillermo Francia III Innovations in Cybersecurity Education (Hardcover, 1st ed. 2020)
Kevin Daimi, Guillermo Francia III
R4,165 Discovery Miles 41 650 Ships in 10 - 15 working days

This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists.

String Analysis for Software Verification and Security (Hardcover, 1st ed. 2017): Tevfik Bultan, Muath Alkhalaf, Fang Yu,... String Analysis for Software Verification and Security (Hardcover, 1st ed. 2017)
Tevfik Bultan, Muath Alkhalaf, Fang Yu, Abdulbaki Aydin
R2,628 Discovery Miles 26 280 Ships in 10 - 15 working days

This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.

Cloud Computing: Security and Management (Hardcover): Conor Suarez Cloud Computing: Security and Management (Hardcover)
Conor Suarez
R3,438 R3,109 Discovery Miles 31 090 Save R329 (10%) Ships in 10 - 15 working days
AWS CloudTrail User Guide (Hardcover): Documentation Team AWS CloudTrail User Guide (Hardcover)
Documentation Team
R1,283 Discovery Miles 12 830 Ships in 10 - 15 working days
Network Science for Military Coalition Operations - Information Exchange and Interaction (Hardcover): Network Science for Military Coalition Operations - Information Exchange and Interaction (Hardcover)
R4,962 Discovery Miles 49 620 Ships in 10 - 15 working days

Modern military coalition operations rely on the ability of multiple independently developed networks to function cohesively, allowing information collected by different sources to be transmitted, analyzed, processed, and provided to troops involved in tactical operations. Network Science for Military Coalition Operations: Information Exchange and Interaction presents an advanced view of this delicate and vital operation. However, an understanding of the science behind coalition operations can benefit not just military operations, but any context in the modern world where two independent organizations need to collaborate together for a shared goal. In this age of globalization, the research in this book becomes of unprecedented importance, not only for the military, where most stable and advance techniques are required, but also for society at large, which also demands constant improvement in network science.

Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R540 Discovery Miles 5 400 Ships in 10 - 15 working days
Cloud Computing for Geospatial Big Data Analytics - Intelligent Edge, Fog and Mist Computing (Hardcover, 1st ed. 2019): Himansu... Cloud Computing for Geospatial Big Data Analytics - Intelligent Edge, Fog and Mist Computing (Hardcover, 1st ed. 2019)
Himansu Das, Rabindra K. Barik, Harishchandra Dubey, Diptendu Sinha Roy
R5,119 Discovery Miles 51 190 Ships in 10 - 15 working days

This book introduces the latest research findings in cloud, edge, fog, and mist computing and their applications in various fields using geospatial data. It solves a number of problems of cloud computing and big data, such as scheduling, security issues using different techniques, which researchers from industry and academia have been attempting to solve in virtual environments. Some of these problems are of an intractable nature and so efficient technologies like fog, edge and mist computing play an important role in addressing these issues. By exploring emerging advances in cloud computing and big data analytics and their engineering applications, the book enables researchers to understand the mechanisms needed to implement cloud, edge, fog, and mist computing in their own endeavours, and motivates them to examine their own research findings and developments.

Charging Communication Networks - From Theory to Practice (Hardcover): D.J. Songhurst Charging Communication Networks - From Theory to Practice (Hardcover)
D.J. Songhurst
R3,478 Discovery Miles 34 780 Ships in 10 - 15 working days

This book proposes that usage-based charging schemes are essential to generate the incentives necessary for efficient operation of multiservice networks. The rapid development of network technology is enabling sophisticated new services and applications which demand new charging models. The same technology provides the means to operate the right charging schemes.Some of the work done in the European collaborative project CA$hMAN (Charging and Accounting Schemes in Multiservice ATM Networks). This project combined performance and economic models of network resource usage and cutomer utility to construct simple but effective charging schemes which were implemented and trialled in an advanced management platform.

Kali Linux Penetration Testing Bible (Paperback): G Khawaja Kali Linux Penetration Testing Bible (Paperback)
G Khawaja
R859 R790 Discovery Miles 7 900 Save R69 (8%) Ships in 12 - 19 working days

Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali's varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You'll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you're new to the field or an established pentester, you'll find what you need in this comprehensive guide. Build a modern dockerized environment Discover the fundamentals of the bash language in Linux Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Apply practical and efficient pentesting workflows Learn about Modern Web Application Security Secure SDLC Automate your penetration testing with Python

Information Centric Networks (ICN) - Architecture & Current Trends (Hardcover, 1st ed. 2021): Nitul Dutta, Hiren Kumar Deva... Information Centric Networks (ICN) - Architecture & Current Trends (Hardcover, 1st ed. 2021)
Nitul Dutta, Hiren Kumar Deva Sarma, Rajendrasinh Jadeja, Krishna Delvadia, Gheorghita Ghinea
R5,090 Discovery Miles 50 900 Ships in 10 - 15 working days

This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.

A Guide to the TCP/IP Protocol Suite (Hardcover, 2nd Revised edition): Floyd Wilder A Guide to the TCP/IP Protocol Suite (Hardcover, 2nd Revised edition)
Floyd Wilder
R2,859 Discovery Miles 28 590 Ships in 10 - 15 working days

This guide to all the major protocols of a TCP/IP-based network includes an introduction to binary and hexadecimal arithmetic and coverage of L2TP, LAN analysis screens and engineering-level detail on IPv6 routing. The second edition also features: an enhanced description of IP, including IPv6, plus examples of dynamic routing such as RIPv2, OSPF, BGP, NAT and CIDR; enhanced descriptions of ARP, RARP and BOOTP, with added descriptions of IARP, DHCP and RADIUS; a revised description of FTP; and an added description of HTTP.

SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R968 R873 Discovery Miles 8 730 Save R95 (10%) Ships in 10 - 15 working days
How to Attack and Defend Your Website (Paperback): Henry Dalziel How to Attack and Defend Your Website (Paperback)
Henry Dalziel; Edited by Alejandro Caceres
R873 Discovery Miles 8 730 Ships in 12 - 19 working days

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools - most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,435 Discovery Miles 34 350 Ships in 12 - 19 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

HCISPP Study Guide (Paperback): Timothy Virtue, Justin Rainey HCISPP Study Guide (Paperback)
Timothy Virtue, Justin Rainey
R1,276 Discovery Miles 12 760 Ships in 12 - 19 working days

The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC(2). The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted to the special demands of health care information security. Tim Virtue and Justin Rainey have created the HCISPP Study Guide to walk you through all the material covered in the exam's Common Body of Knowledge. The six domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the six domains has its own chapter that includes material to aid the test-taker in passing the exam, as well as a chapter devoted entirely to test-taking skills, sample exam questions, and everything you need to schedule a test and get certified. Put yourself on the forefront of health care information privacy and security with the HCISPP Study Guide and this valuable certification.

Data Deduplication for Data Optimization for Storage and Network Systems (Hardcover, 1st ed. 2017): Daehee Kim, Sejun Song,... Data Deduplication for Data Optimization for Storage and Network Systems (Hardcover, 1st ed. 2017)
Daehee Kim, Sejun Song, Baek-Young Choi
R4,184 R3,591 Discovery Miles 35 910 Save R593 (14%) Ships in 12 - 19 working days

This book introduces fundamentals and trade-offs of data de-duplication techniques. It describes novel emerging de-duplication techniques that remove duplicate data both in storage and network in an efficient and effective manner. It explains places where duplicate data are originated, and provides solutions that remove the duplicate data. It classifies existing de-duplication techniques depending on size of unit data to be compared, the place of de-duplication, and the time of de-duplication. Chapter 3 considers redundancies in email servers and a de-duplication technique to increase reduction performance with low overhead by switching chunk-based de-duplication and file-based de-duplication. Chapter 4 develops a de-duplication technique applied for cloud-storage service where unit data to be compared are not physical-format but logical structured-format, reducing processing time efficiently. Chapter 5 displays a network de-duplication where redundant data packets sent by clients are encoded (shrunk to small-sized payload) and decoded (restored to original size payload) in routers or switches on the way to remote servers through network. Chapter 6 introduces a mobile de-duplication technique with image (JPEG) or video (MPEG) considering performance and overhead of encryption algorithm for security on mobile device.

IT Issues in Higher Education - Emerging Research and Opportunities (Hardcover): Lazarus Ndiku Makewa, Baraka Manjale Ngussa IT Issues in Higher Education - Emerging Research and Opportunities (Hardcover)
Lazarus Ndiku Makewa, Baraka Manjale Ngussa
R4,971 Discovery Miles 49 710 Ships in 10 - 15 working days

Effective use of technology in areas that include admissions, record keeping, billing, compliance, athletic administration, and more hold untold potential to transform higher education by introducing significant efficiencies and dramatic cost reductions in serving students. How the institution organizes itself will to a large extent depend on how the IT systems are established and maintained. The design, development, management, utilization, and evaluation of these IT systems will be necessary for the university to operate successfully. IT Issues in Higher Education: Emerging Research and Opportunities is a pivotal reference source that provides vital research on the integration and management of information technology in higher education with a focus on issues of security, data management, student access to information, and staff competency. This publication explores present-day educational environments as well as educators' methods of applying technology to student success and highlights topics that include personal devices and institutional culture. It is ideally designed for academic professionals, lecturers, students, professors, IT experts, instructional designers, curriculum developers, administrators, higher education faculty, researchers, and policymakers.

China's e-Science Blue Book 2020 (Hardcover, 1st ed. 2021): Chinese Academy of Sciences, Cyberspace Administration Of... China's e-Science Blue Book 2020 (Hardcover, 1st ed. 2021)
Chinese Academy of Sciences, Cyberspace Administration Of China, Ministry of Education, Ministry Of Science And Technology, China Asso. for Science and Technology, …
R4,447 Discovery Miles 44 470 Ships in 10 - 15 working days

"China's e-Science Blue Book 2020" has been jointly compiled by the Chinese Academy of Sciences, Cyberspace Administration of China, Ministry of Education of the PRC, Ministry of Science and Technology of the PRC, China Association for Science and Technology, Chinese Academy of Social Sciences, National Natural Science Foundation of China and the Chinese Academy of Agricultural Sciences. It was focusing on the new situation, new progress and new achievements of China's e-Scientific in the past two years. During the "13th Five-Year Plan" period, Chinese scholars make full use of advanced information technology to carry out scientific research work, and have achieved a series of major scientific and technological achievements. This book has collected 28 research reports about China's e-Science application in the past two years to introduce the application in the frontier research of science and technology, the progress of e-Science in major projects and the achievements of informatization in interdisciplinary. As such it provides a valuable reference resource for researchers and students in this area and promotes further e-Science research.

Frontier and Innovation in Future Computing and Communications (Hardcover, 2014): James J (Jong Hyuk) Park, Albert Zomaya, Hwa... Frontier and Innovation in Future Computing and Communications (Hardcover, 2014)
James J (Jong Hyuk) Park, Albert Zomaya, Hwa Young Jeong, Mohammad Obaidat
R8,535 Discovery Miles 85 350 Ships in 10 - 15 working days

IT technology engineering changes everyday life, especially in Computing and Communications. The goal of this book is to further explore the theoretical and practical issues of Future Computing and Communications. It also aims to foster new ideas and collaboration between researchers and practitioners.

Smart Systems for E-Health - WBAN Technologies, Security and Applications (Hardcover, 1st ed. 2021): Hanen Idoudi, Thierry Val Smart Systems for E-Health - WBAN Technologies, Security and Applications (Hardcover, 1st ed. 2021)
Hanen Idoudi, Thierry Val
R4,926 Discovery Miles 49 260 Ships in 12 - 19 working days

The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies for E-health. In a second part, novel security and privacy solutions for IoT-based E-health applications are presented. The last part of the book is focused on applications, data mining and data analytics for E-health using artificial intelligence and cloud infrastructure. E-health has been an evolving concept since its inception, due to the numerous technologies that can be adapted to offer new innovative and efficient E-health applications. Recently, with the tremendous advancement of wireless technologies, sensors and wearable devices and software technologies, new opportunities have arisen and transformed the E-health field. Moreover, with the expansion of the Internet of Things, and the huge amount of data that connected E-health devices and applications are generating, it is also mandatory to address new challenges related to the data management, applications management and their security. Through this book, readers will be introduced to all these concepts. This book is intended for all practitioners (industrial and academic) interested in widening their knowledge in wireless communications and embedded technologies applied to E-health, cloud computing, artificial intelligence and big data for E-health applications and security issues in E-health.

Advances in Delay-tolerant Networks (DTNs) - Architecture and Enhanced Performance (Hardcover): Joel J. P. C. Rodrigues Advances in Delay-tolerant Networks (DTNs) - Architecture and Enhanced Performance (Hardcover)
Joel J. P. C. Rodrigues
R6,535 Discovery Miles 65 350 Ships in 12 - 19 working days

Part one looks at delay-tolerant network architectures and platforms including DTN for satellite communications and deep-space communications, underwater networks, networks in developing countries, vehicular networks and emergency communications. Part two covers delay-tolerant network routing, including issues such as congestion control, naming, addressing and interoperability. Part three explores services and applications in delay-tolerant networks, such as web browsing, social networking and data streaming. Part four discusses enhancing the performance, reliability, privacy and security of delay-tolerant networks. Chapters cover resource sharing, simulation and modeling and testbeds.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
Two-Factor Authentication
Mark Stanislav Paperback R534 Discovery Miles 5 340
Amazon Kinesis Firehose Developer Guide
Development Team Hardcover R955 Discovery Miles 9 550
PCI Dss: A Pocket Guide
IT Governance Paperback R417 Discovery Miles 4 170
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
Digital Signal Processing and…
Dag Stranneby Paperback R1,454 Discovery Miles 14 540

 

Partners