0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (255)
  • R250 - R500 (858)
  • R500+ (13,720)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Autonomous Control for a Reliable Internet of Services - Methods, Models, Approaches, Techniques, Algorithms, and Tools... Autonomous Control for a Reliable Internet of Services - Methods, Models, Approaches, Techniques, Algorithms, and Tools (Hardcover)
Ivan Ganchev, R. D. van der Mei, Hans van den Berg
R1,633 Discovery Miles 16 330 Ships in 18 - 22 working days
EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2017 (Hardcover, 1st ed.... EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2017 (Hardcover, 1st ed. 2019)
Angelica Reyes-Munoz, Ping Zheng, David Crawford, Victor Callaghan
R4,068 Discovery Miles 40 680 Ships in 18 - 22 working days

This book presents the proceedings of the 1st EAI International Conference on Technology, Innovation, Entrepreneurship and Education (TIE 2017), which took place at Canterbury Christ Church University on September 11-12, 2017. The central theme of the conference is creativity and innovation, especially in relation to technology, business, education, social and political needs that make modern society flourish. The proceedings feature papers from a cross-disciplinary audience that explore the process of creativity and innovation. The goal is that the various disciplines can learn from each other and see how they might benefit from the cross-fertilization of practices.

Grid and Cloud Computing - A Business Perspective on Technology and Applications (Hardcover, 2010 ed.): Katarina Stanoevska,... Grid and Cloud Computing - A Business Perspective on Technology and Applications (Hardcover, 2010 ed.)
Katarina Stanoevska, Thomas Wozniak, Santi Ristol
R2,802 Discovery Miles 28 020 Ships in 18 - 22 working days

In today's dynamic business environment, IT departments are under permanent pressure to meet two divergent requirements: to reduce costs and to support business agility with higher flexibility and responsiveness of the IT infrastructure. Grid and Cloud Computing enable a new approach towards IT. They enable increased scalability and more efficient use of IT based on virtualization of heterogeneous and distributed IT resources. This book provides a thorough understanding of the fundamentals of Grids and Clouds and of how companies can benefit from them. A wide array of topics is covered, e.g. business models and legal aspects. The applicability of Grids and Clouds in companies is illustrated with four cases of real business experiments. The experiments illustrate the technical solutions and the organizational and IT governance challenges that arise with the introduction of Grids and Clouds. Practical guidelines on how to successfully introduce Grids and Clouds in companies are provided.

IT Convergence and Security 2017 - Volume 1 (Hardcover, 1st ed. 2018): Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek IT Convergence and Security 2017 - Volume 1 (Hardcover, 1st ed. 2018)
Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek
R6,061 Discovery Miles 60 610 Ships in 18 - 22 working days

This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field. It explores how IT convergence and security issues are core to most current research, and industrial and commercial activities. It consists of contributions covering topics such as machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful International Conferences on IT Convergence and Security, previously held in Prague, Czech Republic(2016), Kuala Lumpur, Malaysia (2015) Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).

Implementing EDI (Hardcover): Mike Hendry Implementing EDI (Hardcover)
Mike Hendry
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

This superb introduction examines all aspects of implementation from concept to reality, and spells out the pros, cons, and effects of EDI in your organization. The cost of EDI hardware, software, training, transmission, and maintenance are broken down and clearly explained to prevent problems and maximize benefits. Checklists and procedural guidelines are also offered to ease your EDI transition -- so that you're never left with a system you can't put online quickly and efficiently.

Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to... Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity (Hardcover)
Alan Grid
R1,066 Discovery Miles 10 660 Ships in 10 - 15 working days
Science Gateways for Distributed Computing Infrastructures - Development Framework and Exploitation by Scientific User... Science Gateways for Distributed Computing Infrastructures - Development Framework and Exploitation by Scientific User Communities (Hardcover, 2014 ed.)
Peter Kacsuk
R3,688 R3,428 Discovery Miles 34 280 Save R260 (7%) Ships in 10 - 15 working days

The book describes the science gateway building technology developed in the SCI-BUS European project and its adoption and customization method, by which user communities, such as biologists, chemists, and astrophysicists, can build customized, domain-specific science gateways. Many aspects of the core technology are explained in detail, including its workflow capability, job submission mechanism to various grids and clouds, and its data transfer mechanisms among several distributed infrastructures. The book will be useful for scientific researchers and IT professionals engaged in the development of science gateways.

Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP... Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Sushil Jajodia, Pierangela Samarati, Stelvio Cimato
R4,420 Discovery Miles 44 200 Ships in 18 - 22 working days

These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion

Operating System Forensics (Paperback): Ric Messier Operating System Forensics (Paperback)
Ric Messier
R1,573 R1,490 Discovery Miles 14 900 Save R83 (5%) Ships in 10 - 15 working days

Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.

Developing Security Tools of WSN and WBAN Networks Applications (Hardcover, 2015 ed.): Mohsen A. M. El-Bendary Developing Security Tools of WSN and WBAN Networks Applications (Hardcover, 2015 ed.)
Mohsen A. M. El-Bendary
R3,619 R3,359 Discovery Miles 33 590 Save R260 (7%) Ships in 10 - 15 working days

This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.

Introduction to Hardware Security and Trust (Hardcover, 2012): Mohammad Tehranipoor, Cliff Wang Introduction to Hardware Security and Trust (Hardcover, 2012)
Mohammad Tehranipoor, Cliff Wang
R4,303 Discovery Miles 43 030 Ships in 18 - 22 working days

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society's microelectronic-supported infrastructures.

Cloud Computing Patterns - Fundamentals to Design, Build, and Manage Cloud Applications (Hardcover, 2014 ed.): Christoph... Cloud Computing Patterns - Fundamentals to Design, Build, and Manage Cloud Applications (Hardcover, 2014 ed.)
Christoph Fehling, Frank Leymann, Ralph Retter, Walter Schupeck, Peter Arbitter
R6,408 Discovery Miles 64 080 Ships in 10 - 15 working days

The current work provides CIOs, software architects, project managers, developers, and cloud strategy initiatives with a set of architectural patterns that offer nuggets of advice on how to achieve common cloud computing-related goals. The "cloud computing patterns" capture knowledge and experience in an abstract format that is independent of concrete vendor products. Readers are provided with a toolbox to structure cloud computing strategies and design cloud application architectures. By using this book cloud-native applications can be implemented and best suited cloud vendors and tooling for individual usage scenarios can be selected. The "cloud computing patterns" offer a unique blend of academic knowledge and practical experience due to the mix of authors. Academic knowledge is brought in by Christoph Fehling and Professor Dr. Frank Leymann who work on cloud research at the University of Stuttgart. Practical experience in building cloud applications, selecting cloud vendors, and designing enterprise architecture as a cloud customer is brought in by Dr. Ralph Retter who works as an IT architect at T Systems, Walter Schupeck, who works as a Technology Manager in the field of Enterprise Architecture at Daimler AG, and Peter Arbitter, the former head of T Systems cloud architecture and IT portfolio team and now working for Microsoft.

"Voices on Cloud Computing Patterns"

Cloud computing is especially beneficial for large companies such as Daimler AG. Prerequisite is a thorough analysis of its impact on the existing applications and the IT architectures. During our collaborative research with the University of Stuttgart, we identified a vendor-neutral and structured approach to describe properties of cloud offerings and requirements on cloud environments. The resulting Cloud Computing Patterns have profoundly impacted our corporate IT strategy regarding the adoption of cloud computing. They help our architects, project managers and developers in the refinement of architectural guidelines and communicate requirements to our integration partners and software suppliers.

Dr. Michael Gorriz CIO Daimler AG

Ever since 2005 T-Systems has provided a flexible and reliable cloud platform with its Dynamic Services . Today these cloud services cover a huge variety of corporate applications, especially enterprise resource planning, business intelligence, video, voice communication, collaboration, messaging and mobility services. The book was written by senior cloud pioneers sharing their technology foresight combining essential information and practical experiences. This valuable compilation helps both practitioners and clients to really understand which new types of services are readily available, how they really work and importantly how to benefit from the cloud.

Dr. Marcus Hacke Senior Vice President, T-Systems International GmbH

This book provides a conceptual framework and very timely guidance for people and organizations building applications for the cloud. Patterns are a proven approach to building robust and sustainable applications and systems. The authors adapt and extend it to cloud computing, drawing on their own experience and deep contributions to the field. Each pattern includes an extensive discussion of the state of the art, with implementation considerations and practical examples that the reader can apply to their own projects.

By capturing our collective knowledge about building good cloud applications and by providing a format to integrate new insights, this book provides an important tool not just for individual practitioners and teams, but for the cloud computing community at large.

Kristof Kloeckner General Manager, Rational Software, IBMSoftware Group

"

Tools and Algorithms for the Construction and Analysis of Systems (Hardcover): Bernhard Steffen, Fabrice Kordon, Marieke Huisman Tools and Algorithms for the Construction and Analysis of Systems (Hardcover)
Bernhard Steffen, Fabrice Kordon, Marieke Huisman
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days
Cybersecurity Investments - Decision Support Under Economic Aspects (Hardcover, 1st ed. 2016): Stefan Beissel Cybersecurity Investments - Decision Support Under Economic Aspects (Hardcover, 1st ed. 2016)
Stefan Beissel
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days

This book offers readers essential orientation on cybersecurity safeguards, and first and foremost helps them find the right balance between financial expenditures and risk mitigation. This is achieved by pursuing a multi-disciplinary approach that combines well-founded methods from economics and the computer sciences. Established decision making techniques are embedded into a walk-through for the complete lifecycle of cybersecurity investments. Insights into the economic aspect of the costs and benefits of cybersecurity are supplemented by established and innovative economic indicators. Readers will find practical tools and techniques to support reasonable decision making in cybersecurity investments. Further, they will be equipped to encourage a common understanding using economic aspects, and to provide cost transparency for the senior management.

Handbook of Computer Networks and Communications: Volume II (Hardcover): Akira Hanako Handbook of Computer Networks and Communications: Volume II (Hardcover)
Akira Hanako
R3,164 R2,866 Discovery Miles 28 660 Save R298 (9%) Ships in 18 - 22 working days
Elastic Load Balancing Classic Load Balancers (Hardcover): Documentation Team Elastic Load Balancing Classic Load Balancers (Hardcover)
Documentation Team
R1,149 Discovery Miles 11 490 Ships in 18 - 22 working days
WDMA Optical Networks (Hardcover): Andrea Borella, G. Cancellieri, F. Chiaraluce WDMA Optical Networks (Hardcover)
Andrea Borella, G. Cancellieri, F. Chiaraluce
R3,494 Discovery Miles 34 940 Ships in 18 - 22 working days

Strengthen your understanding of fast-moving WDMA optical network technology, and learn how to better select and design reliable all-optical telecom networks with this practical book. It will help expand your knowledge of LLN, Manhattan, Shuffle, De Bruijn, Gemmet, Matrix, Swift, and Starnet and will show you how to employ an effective method of network organization based on traffic demands.

Nessus Network Auditing (Paperback, 2nd edition): Russ Rogers Nessus Network Auditing (Paperback, 2nd edition)
Russ Rogers
R1,017 Discovery Miles 10 170 Ships in 10 - 15 working days

The Updated Version of the Bestselling Nessus Book.
This is the ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.
* Perform a Vulnerability Assessment
Use Nessus to find programming errors that allow intruders to gain unauthorized access.
* Obtain and Install Nessus
Install from source or binary, set up up clients and user accounts, and update your plug-ins.
* Modify the Preferences Tab
Specify the options for Nmap and other complex, configurable components of Nessus.
* Understand Scanner Logic and Determine Actual Risk
Plan your scanning strategy and learn what variables can be changed.
* Prioritize Vulnerabilities
Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors.
* Deal with False Positives
Learn the different types of false positives and the differences between intrusive and nonintrusive tests.
* Get Under the Hood of Nessus
Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).
* Scan the Entire Enterprise Network
Plan for enterprise deployment by gauging network bandwith and topology issues.
* Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times.
* The first edition is still the only book available on the product.
* Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.

Networked Sociability and Individualism - Technology for Personal and Professional Relationships (Hardcover): Francesca... Networked Sociability and Individualism - Technology for Personal and Professional Relationships (Hardcover)
Francesca Comunello
R4,467 Discovery Miles 44 670 Ships in 18 - 22 working days

The recent popularity of Social Network Sites (SNS) shows that there is a growing interest in articulating, making visible, and managing personal or professional relationships through technology-enabled environments. Networked Sociability and Individualism: Technology for Personal and Professional Relationships provides a multidisciplinary framework for analyzing the new forms of sociability enabled by digital media and networks. This book focuses on a variety of social media and computer-mediated communication environments with the aim of identifying and understanding different types of social behavior and identity expression.

Thinkwork - Working, Learning, and Managing in a Computer-Interactive Society (Hardcover, New): Fred Young Phillips Thinkwork - Working, Learning, and Managing in a Computer-Interactive Society (Hardcover, New)
Fred Young Phillips
R2,809 R2,543 Discovery Miles 25 430 Save R266 (9%) Ships in 10 - 15 working days

This volume explains how advances in computer technology will augment communication in person-to-person, organizational, and educational settings. It describes the convergence of virtual reality and group decision support, and how these will serve educational and organizational effectiveness. Contributors--experts from business and academia--examine what the computing/communications world will look like in the near future, what the specific needs of various industries will be, and how innovations will fit into organizations and society.

These three topics are addressed with attention to the following questions: What will be the size of initial and future markets for advanced computer and communications technology? What will be the future computing environment in manufacturing operations, in the executive suite, in the office, in the field and on the road, at the point of service, for the computer-integrated enterprise, at home, in the school, and in the global marketplace?

The Real MCTS/MCITP Exam 70-649 Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Prep Kit with CDROM... The Real MCTS/MCITP Exam 70-649 Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Prep Kit with CDROM (Paperback)
Brien Posey
R1,030 Discovery Miles 10 300 Ships in 10 - 15 working days

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643.
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers.
MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management.
In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
* THE independent source of exam day tips, techniques, and warnings not available from Microsoft
* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
* Interactive FastTrack e-learning modules help simplify difficult exam topics
* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives
* Free download of audio FastTracks for use with iPods or other MP3 players
* 1000 page "DRILL DOWN" reference for comprehensive topic review

Establishing the Foundation of Collaborative Networks - IFIP TC 5 Working Group 5.5 Eighth IFIP Working Conference on Virtual... Establishing the Foundation of Collaborative Networks - IFIP TC 5 Working Group 5.5 Eighth IFIP Working Conference on Virtual Enterprises September 10-12, 2007, Guimaraes, Portugal (Hardcover, 2007 ed.)
Luis Camarinha-Matos, Hamideh Afsarmanesh, Paulo Novais, Cesar Analide
R2,792 Discovery Miles 27 920 Ships in 18 - 22 working days

This book includes a number of selected papers from the PRO-VE '07 Conference, providing a comprehensive overview of recent advances in various Collaborative Networks domains. It covers trust aspects, performance and value systems, VO breeding environments, VO creation, e-contracting, collaborative architectures and frameworks, professional virtual communities, interoperability issues, business benefits, and case studies and applications in industry and services.

An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks - Critical Information Infrastructure... An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks - Critical Information Infrastructure Protection (Hardcover, 2012)
S.V. Raghavan, E. Dawson
R2,699 Discovery Miles 26 990 Ships in 18 - 22 working days

Around the globe, nations face the problem of protecting their Critical Information Infrastructure, normally referred to as Cyber Space. In this monograph, we capture FIVE different aspects of the problem; High speed packet capture, Protection through authentication, Technology Transition, Test Bed Simulation, and Policy and Legal Environment. The monograph is the outcome of over three years of cooperation between India and Australia.

Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise - A selection of common capabilities validated... Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise - A selection of common capabilities validated in real-life business trials by the BEinGRID consortium (Hardcover, 2010 ed.)
Theo Dimitrakos, Josep Martrat, Stefan Wesner
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

Service-Oriented Infrastructures including Grid and Cloud Computing are technologies in a critical transition to wider adoption by business. Their use may enable enterprises to achieve optimal IT utilization, including sharing resources and services across enterprises and on-demand utilization of those made available by business partners over the network. This book is an essential reference for researchers and practitioners in service-oriented IT. It analyses a selection of common capabilities (services capturing reusable functionality of IT solutions) that have been applied to tackle challenging business problems and were validated by the BEinGRID consortium in real-life business trials covering most European market sectors.

The Real MCTS/MCITP Exam 70-648 Prep Kit - Independent and Complete Self-Paced Solutions (Paperback): Brien Posey The Real MCTS/MCITP Exam 70-648 Prep Kit - Independent and Complete Self-Paced Solutions (Paperback)
Brien Posey
R1,017 Discovery Miles 10 170 Ships in 10 - 15 working days

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640 and 70-643.
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers.
MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management.
In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.

* THE independent source of exam day tips, techniques, and warnings not available from Microsoft
* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
* Interactive FastTrack e-learning modules help simplify difficult exam topics
* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives
* Free download of audio FastTracks for use with iPods or other MP3 players
* 1000 page "DRILL DOWN" reference for comprehensive topic review

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Research Anthology on Architectures…
Information R Management Association Hardcover R12,630 Discovery Miles 126 300
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210

 

Partners