0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (273)
  • R250 - R500 (876)
  • R500+ (13,595)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cyber-Physical Systems Security (Hardcover, 2018 ed.): Cetin Kaya Koc Cyber-Physical Systems Security (Hardcover, 2018 ed.)
Cetin Kaya Koc
R4,056 Discovery Miles 40 560 Ships in 18 - 22 working days

The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.

Network Management in Wired and Wireless Networks (Hardcover, 2002 ed.): Tejinder S. Randhawa, Stephen Hardy Network Management in Wired and Wireless Networks (Hardcover, 2002 ed.)
Tejinder S. Randhawa, Stephen Hardy
R4,141 Discovery Miles 41 410 Ships in 18 - 22 working days

This title addresses various open issues related to performance monitoring, performance management and performance control. It covers the performance management aspects of broadband wired and wireless cellular networks in an integrated fashion, and highlights the role of performance management in assisting network control procedures.

Software Defined Mobile Networks (SDMN) - Beyond LTE Network Architecture (Hardcover): M Liyanage Software Defined Mobile Networks (SDMN) - Beyond LTE Network Architecture (Hardcover)
M Liyanage
R2,577 Discovery Miles 25 770 Ships in 18 - 22 working days

This book describes the concept of a Software Defined Mobile Network (SDMN), which will impact the network architecture of current LTE (3GPP) networks. SDN will also open up new opportunities for traffic, resource and mobility management, as well as impose new challenges on network security. Therefore, the book addresses the main affected areas such as traffic, resource and mobility management, virtualized traffics transportation, network management, network security and techno economic concepts. Moreover, a complete introduction to SDN and SDMN concepts. Furthermore, the reader will be introduced to cutting-edge knowledge in areas such as network virtualization, as well as SDN concepts relevant to next generation mobile networks. Finally, by the end of the book the reader will be familiar with the feasibility and opportunities of SDMN concepts, and will be able to evaluate the limits of performance and scalability of these new technologies while applying them to mobile broadb and networks.

Advances in Mobile Cloud Computing and Big Data in the 5G Era (Hardcover, 1st ed. 2017): Constandinos X. Mavromoustakis, George... Advances in Mobile Cloud Computing and Big Data in the 5G Era (Hardcover, 1st ed. 2017)
Constandinos X. Mavromoustakis, George Mastorakis, Ciprian Dobre
R5,113 Discovery Miles 51 130 Ships in 10 - 15 working days

This book reports on the latest advances on the theories, practices, standards and strategies that are related to the modern technology paradigms, the Mobile Cloud computing (MCC) and Big Data, as the pillars and their association with the emerging 5G mobile networks. The book includes 15 rigorously refereed chapters written by leading international researchers, providing the readers with technical and scientific information about various aspects of Big Data and Mobile Cloud Computing, from basic concepts to advanced findings, reporting the state-of-the-art on Big Data management. It demonstrates and discusses methods and practices to improve multi-source Big Data manipulation techniques, as well as the integration of resources availability through the 3As (Anywhere, Anything, Anytime) paradigm, using the 5G access technologies.

Cognitive Wireless Networks - Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications... Cognitive Wireless Networks - Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications (Hardcover, 2007 ed.)
Frank H. P. Fitzek, Marcos D. Katz
R2,803 Discovery Miles 28 030 Ships in 18 - 22 working days

This book presents a detailed overview of a rapidly emerging topic in modern communications: cognitive wireless networks. The key aspects of cognitive and cooperative principles in wireless networks are discussed in this book. Furthermore, 'Cognitive Wireless Networks' advocates the concept of breaking up the cellular communication architecture by introducing cooperative strategies among wireless devices. Cognitive wireless networking is the key to success in handling the upcoming dynamic network configurations and exploiting this cross-over to the fullest extent.

Research Anthology on Artificial Intelligence Applications in Security, VOL 3 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 3 (Hardcover)
Information Reso Management Association
R9,819 Discovery Miles 98 190 Ships in 18 - 22 working days
Telecommunication Networks - Trends and Developments (Hardcover): Mohammad Abdul Matin Telecommunication Networks - Trends and Developments (Hardcover)
Mohammad Abdul Matin
R3,061 Discovery Miles 30 610 Ships in 18 - 22 working days
Sustainable Cloud and Energy Services - Principles and Practice (Hardcover, 1st ed. 2018): Wilson Rivera Sustainable Cloud and Energy Services - Principles and Practice (Hardcover, 1st ed. 2018)
Wilson Rivera
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This is the first book entirely devoted to providing a perspective on the state-of-the-art of cloud computing and energy services and the impact on designing sustainable systems. Cloud computing services provide an efficient approach for connecting infrastructures and can support sustainability in different ways. For example, the design of more efficient cloud services can contribute in reducing energy consumption and environmental impact. The chapters in this book address conceptual principles and illustrate the latest achievements and development updates concerning sustainable cloud and energy services. This book serves as a useful reference for advanced undergraduate students, graduate students and practitioners interested in the design, implementation and deployment of sustainable cloud based energy services. Professionals in the areas of power engineering, computer science, and environmental science and engineering will find value in the multidisciplinary approach to sustainable cloud and energy services presented in this book.

Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.): Enrico Nardelli, Sabina... Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.)
Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo
R2,812 Discovery Miles 28 120 Ships in 18 - 22 working days

This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme "An Architecture for Information Se curity Management," and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was "E-Government and Security" and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada)."

Web-Scale Data Management for the Cloud (Hardcover, 2013 ed.): Wolfgang Lehner, Kai-Uwe Sattler Web-Scale Data Management for the Cloud (Hardcover, 2013 ed.)
Wolfgang Lehner, Kai-Uwe Sattler
R3,307 Discovery Miles 33 070 Ships in 10 - 15 working days

The efficient management of a consistent and integrated database is a central task in modern IT and highly relevant for science and industry. Hardly any critical enterprise solution comes without any functionality for managing data in its different forms. Web-Scale Data Management for the Cloud addresses fundamental challenges posed by the need and desire to provide database functionality in the context of the Database as a Service (DBaaS) paradigm for database outsourcing. This book also discusses the motivation of the new paradigm of cloud computing, and its impact to data outsourcing and service-oriented computing in data-intensive applications. Techniques with respect to the support in the current cloud environments, major challenges, and future trends are covered in the last section of this book. A survey addressing the techniques and special requirements for building database services are provided in this book as well.

Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New): Atilla Elci, Josef Pieprzyk,... Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New)
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, …
R5,047 Discovery Miles 50 470 Ships in 18 - 22 working days

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Resource Allocation with Carrier Aggregation in Cellular Networks - Optimality and Spectrum Sharing using C++ and MATLAB... Resource Allocation with Carrier Aggregation in Cellular Networks - Optimality and Spectrum Sharing using C++ and MATLAB (Hardcover, 1st ed. 2018)
Haya Shajaiah, Ahmed Abdelhadi, Charles Clancy
R4,283 Discovery Miles 42 830 Ships in 10 - 15 working days

This book introduces an efficient resource management approach for future spectrum sharing systems. The book focuses on providing an optimal resource allocation framework based on carrier aggregation to allocate multiple carriers' resources efficiently among mobile users. Furthermore, it provides an optimal traffic dependent pricing mechanism that could be used by network providers to charge mobile users for the allocated resources. The book provides different resource allocation with carrier aggregation solutions, for different spectrum sharing scenarios, and compares them. The provided solutions consider the diverse quality of experience requirement of multiple applications running on the user's equipment since different applications require different application performance. In addition, the book addresses the resource allocation problem for spectrum sharing systems that require user discrimination when allocating the network resources.

Trust Management in Cloud Services (Hardcover, 2014 ed.): Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya Trust Management in Cloud Services (Hardcover, 2014 ed.)
Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
R3,025 R1,778 Discovery Miles 17 780 Save R1,247 (41%) Ships in 10 - 15 working days

This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services. The authors present the design and implementation of a novel protocol that preserves the consumers' privacy, an adaptive and robust credibility model, a scalable availability model that relies on a decentralized architecture, and a cloud service crawler engine for automatic cloud services discovery. This book also analyzes results from a performance study on a number of open research issues for trust management in cloud environments including distribution of providers, geographic location and languages. These open research issues illustrate both an overview of the current state of cloud computing and potential future directions for the field. Trust Management in Cloud Services contains both theoretical and applied computing research, making it an ideal reference or secondary text book to both academic and industry professionals interested in cloud services. Advanced-level students in computer science and electrical engineering will also find the content valuable.

Managed Grids and Cloud Systems in the Asia-Pacific Research Community (Hardcover, 2010 ed.): Simon C. Lin, Eric Yen Managed Grids and Cloud Systems in the Asia-Pacific Research Community (Hardcover, 2010 ed.)
Simon C. Lin, Eric Yen
R5,340 Discovery Miles 53 400 Ships in 18 - 22 working days

ISGC 2009, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan in April 2009 bringing together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and introduce future development in the field of Grid Computing. Managed Grids and Cloud Systems in the Asia-Pacific Research Community presents the latest achievements in grid technology including Cloud Computing. This volume also covers international projects in Grid Operation, Grid Middleware, E-Science applications, technical developments in grid operations and management, Security and Networking, Digital Library and more. The resources used to support these advances, such as volunteer grids, production managed grids, and cloud systems are discussed in detail. This book is designed for a professional audience composed of grid users, developers and researchers working in the grid computing. Advanced-level students focusing on computer science and engineering will find this book valuable as a reference or secondary text book.

Creative Urban Regions - Harnessing Urban Technologies to Support Knowledge City Initiatives (Hardcover): Tan Yigitcanlar,... Creative Urban Regions - Harnessing Urban Technologies to Support Knowledge City Initiatives (Hardcover)
Tan Yigitcanlar, Koray Velibeyoglu, Scott Baum
R4,598 Discovery Miles 45 980 Ships in 18 - 22 working days

In a knowledge economy urban form and functions are primarily shaped by global market forces rather than urban planning. As the role of knowledge in wealth creation becomes a critical issue in cities, urban administrations and planners need to discover new approaches to harness the considerable opportunities of abstract production for a global order. ""Creative Urban Regions"" explores the utilization of urban technology to support knowledge city initiatives, providing scholars and practitioners with essential fundamental techniques and processes for the successful integration of information technologies and urban production. Converging timely research on a multitude of cutting-edge urban information communication technology issues, this ""Premier Reference Source"" will make a valuable addition to every reference library.

Expert Network Time Protocol - An Experience in Time with NTP (Hardcover, 1st ed.): Peter Rybaczyk Expert Network Time Protocol - An Experience in Time with NTP (Hardcover, 1st ed.)
Peter Rybaczyk
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

Have you ever tried to figure out why your computer clock is off, or why your emails somehow have the wrong timestamp? Most likely, its due to an incorrect network time synchronization, which can be reset using the Network Time Protocol. Until now, most network administrators have been too paranoid to work with this, afraid that they would make the problem even worse. However, Expert Network Time Protocol: An Experience in Time with NTP takes the mystery out of time, and shows the network administrator how to regain the upper hand.

This book is a fascinating look into NTP, and the stories behind the science. Written by Peter Rybaczyk, one of the foremost experts on NTP, this book will show the Network Administrator how to become more comfortable working with time.-->Table of Contents-->Multiple Views of TimeNetwork Administration and IT Trends Throughout History!NTP Operational, Historical, and Futuristic OverviewNTP ArchitectureNTP Design, Configuration, and Troubleshooting

Economics of Information Security and Privacy (Hardcover, 2010 Ed.): Tyler Moore, David Pym, Christos Ioannidis Economics of Information Security and Privacy (Hardcover, 2010 Ed.)
Tyler Moore, David Pym, Christos Ioannidis
R5,322 Discovery Miles 53 220 Ships in 18 - 22 working days

The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.

MPLS Network Management - MIBs, Tools, and Techniques (Hardcover): Thomas D Nadeau MPLS Network Management - MIBs, Tools, and Techniques (Hardcover)
Thomas D Nadeau
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

MPLS-enabled networks are enjoying tremendous growth, but practical information on managing MPLS-enabled networks has remained hard to find. Until now.
MPLS Network Management: MIBs, Tools, and Techniques is the first and only book that will help you master MPLS management technologies and techniques, as they apply to classic MPLS networks, traffic-engineered networks, and VPNs. Written by the co-author of most current MPLS management standards, it provides detailed, authoritative coverage of official MIBs, examining key topics ranging from syntax to access levels to object interaction. It also offers extensive consideration of third-party management interfaces, including tools for metering traffic and predicting traffic growth and behavior. If you're a network operator, network device engineer, or MPLS application developer, you need this book to get all you can out of all of MPLS's many capabilities.
* The only book devoted entirely to the tools and techniques for controlling, monitoring, debugging, and optimizing MPLS-enabled networks.
* Authoritative information from the co-author of most IETF MIBs relating to MPLS and GMPLS, PWE3, and PPVPN.
* Covers both standards-based and proprietary management technologies.
* Includes interviews with seminal figures in the development of MPLS.
* Via a companion web site, provides information on late-breaking developments in MPLS management and links to additional resources.
* To be followed by a second volume presenting best-practice case studies dealing with how real companies approach the management of their MPLS networks.

Dictionary of Acronyms and Technical Abbreviations - For Information and Communication Technologies and Related Areas... Dictionary of Acronyms and Technical Abbreviations - For Information and Communication Technologies and Related Areas (Hardcover, 2nd ed. 2001)
Jakob Vlietstra
R2,791 Discovery Miles 27 910 Ships in 18 - 22 working days

This dictionary is a collection of technical abbreviations and acronyms used in information and communication technologies and other industrial activities. They are used in industries, institutes, organisations and universities, all too often without mentioning their meaning. Areas covered by this dictionary are Information and Communication Technology (ICT), including hardware and software; Information Networks, including the Internet and the World Wide Web; Automatic Control; and ICT-related Computer-Aided Techniques and Activities. Apart from the technical terms this dictionary also lists abbreviated names of relevant organisations, conferences, symposia and workshops. This reference book is important for all practitioners and users in the areas mentioned above and those who consult or write technical material (manuals, guides, books, articles, marketing and teaching material). These publications often omit the meaning of acronyms and confront the reader with jargon too often difficult to understand. This edition contains over 33,000 items and differs from the previous one by deleting obsolete terms and less relevant acronyms. Ten thousand new items have been added.

Implementing Computational Intelligence Techniques for Security Systems Design (Hardcover): Yousif Abdullatif Albastaki, Wasan... Implementing Computational Intelligence Techniques for Security Systems Design (Hardcover)
Yousif Abdullatif Albastaki, Wasan Awad
R5,318 Discovery Miles 53 180 Ships in 18 - 22 working days

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

High Speed LAN Technology Handbook (Hardcover, 2000 ed.): Dhiman D. Chowdhury High Speed LAN Technology Handbook (Hardcover, 2000 ed.)
Dhiman D. Chowdhury
R2,929 Discovery Miles 29 290 Ships in 18 - 22 working days

The primary objective of this book is to teach the architectures, design principles, and troubleshooting techniques of a LAN. This will be imparted through the presentation of a broad scope of data and computer communication standards, real-world inter-networking techniques, architectures, hardware, software, protocols, technologies and services as they relate to the design, implementation and troubleshooting of a LAN. The logical and physical design of hardware and software is not the only process involved in the design and implementation of a LAN. The latter also encompasses many other aspects including making the business case, compiling the requirements, choosing the technology, planning for capacity, selecting the vendor, and weighing all the issues before the actual design begins.

Amazon Elastic File System User Guide (Hardcover): Documentation Team Amazon Elastic File System User Guide (Hardcover)
Documentation Team
R1,195 Discovery Miles 11 950 Ships in 18 - 22 working days
The Locales Framework - Understanding and Designing for Wicked Problems (Hardcover, X, 219 P. 128 I): G. Fitzpatrick The Locales Framework - Understanding and Designing for Wicked Problems (Hardcover, X, 219 P. 128 I)
G. Fitzpatrick
R2,680 Discovery Miles 26 800 Ships in 18 - 22 working days

Software design is becoming increasingly complex and difficult as we move to applications that support people interacting with information and with each other over networks. Computer supported cooperative work applications are a typical example of this. The problems to be solved are no longer just technical, they are also social: how do we build systems that meet the real needs of the people who are asked to use them and that fit into their contexts of use. We can characterise these as wicked problems, where our traditional software engineering techniques for understanding requirements and driving these through into design are no longer adequate.

This book presents the Locales Framework - and its five aspects of locale foundations, civic structures, individual views, interaction trajectory and mutuality - as a way of dealing with the intertwined problem-solution space of wicked problems. A locale is based on a metaphor of place as the lived relationship between people and the spaces and resources they use in their interactions. The Locales Framework provides a coherent mediating framework for ethnographers, designers, and software engineers to facilitate both understanding requirements of complex social situations and designing solutions to support these situations in all their complexity.

Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.): Kieran McCorry,... Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.)
Kieran McCorry, Donald Livengood
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

Microsoft Exchange 2000 Infrastructure Design explains from a system designer's and administrator's perspective Microsoft's Active Directory and its interaction with Exchange 2000, details issues concerned with migration to Exchange 2000, and outlines the specific technology and design issues relating to connectivity with Exchange 2000. Readers will learn to use these technologies to seamlessly co-exist with their current environment, migrate to a native Exchange 2000 environment, and connect to the Internet as well as to other messaging systems. The book's blend of expert instruction and best practices will help any organization create optimal system designs and configurations to support different technical and business scenarios.
McCorry and Livengood are experts in Microsoft technologies from Compaq, the world's leading integrator of Exchange systems. In Microsoft Exchange 2000 Infrastructure Design, they spell out the key technologies, features, and techniques IT professionals must master to build a unified and robust Exchange 2000 messaging service. This book details the framework organizations must put in place to most effectively move to Exchange 2000.

Detailed explanations of Active Directory integration with Exchange 2000, migration to Exchange 2000 from another system and Exchange 2000 transport, connectivity, and tools
Gives readers the benefit of authors' extensive experience
Unique description of the software "plumbing" organizations must master to move to Exchange 2000

Distributed Constraint Satisfaction - Foundations of Cooperation in Multi-agent Systems (Hardcover, 2001 ed.): Makoto Yokoo Distributed Constraint Satisfaction - Foundations of Cooperation in Multi-agent Systems (Hardcover, 2001 ed.)
Makoto Yokoo
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book gives an overview of constraint satisfaction problems (CSPs), adapts related search algorithms and consistency algorithms for applications to multi-agent systems, and consolidates recent research devoted to cooperation in such systems. The techniques introduced are applied to various problems in multi-agent systems. Among the new approaches is a hybrid-type algorithm for weak-commitment search combining backtracking and iterative improvement; also, an extension of the basic CSP formalization called partial CSP is introduced in order to handle over-constrained CSPs.The book is written for advanced students and professionals interested in multi-agent systems or, more generally, in distributed artificial intelligence and constraint satisfaction. Researchers active in the area will appreciate this book as a valuable source of reference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Spinoza's Metaphysics - Substance and…
Yitzhak Y. Melamed Hardcover R2,732 Discovery Miles 27 320
Performance Management - A Contemporary…
Maryam Moosa, Marius Meyer Paperback R640 Discovery Miles 6 400
Descartes on Causation
Tad M. Schmaltz Hardcover R1,425 Discovery Miles 14 250
Focus On Operational Management - A…
Andreas de Beer, Dirk Rossouw Paperback R451 Discovery Miles 4 510
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Anaximander - A Re-assessment
Andrew Gregory Hardcover R4,641 Discovery Miles 46 410
When Souls Had Wings - Pre-Mortal…
Terryl L. Givens Hardcover R1,440 Discovery Miles 14 400
International Brand Management
Paperback R432 Discovery Miles 4 320
Attention Is Cognitive Unison - An Essay…
Christopher Mole Hardcover R2,215 Discovery Miles 22 150
Pitch To Win - How To Present, Persuade…
Justin Cohen Paperback R345 R318 Discovery Miles 3 180

 

Partners