0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (250)
  • R250 - R500 (858)
  • R500+ (13,651)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Building Robots With Lego Mindstorms (Paperback): Mario Ferrari, Guilio Ferrari Building Robots With Lego Mindstorms (Paperback)
Mario Ferrari, Guilio Ferrari
R1,056 Discovery Miles 10 560 Ships in 10 - 15 working days

Lego robots Mindstorms are sweeping the world and fans need to learn how to programme them
Lego Mindstorms are a new generation of Lego Robots that can be manipulated using microcomputers, light and touch sensors, an infrared transmitter and CD-ROMs. Since Lego launched Lego Mindstorms in late 1998 sales have skyrocketed - with no sign of slowing down. Mindstorms have captured the imagination of adults and children alike, creating a subculture of Mindstorm enthusiasts around the world. The kits are now a staple part of engineering and computer science classes at many high profile Universities.
Building Robots with Lego Mindstorms provides readers with a fundamental understanding of the geometry, electronics, engineering, and programming required to build your own robots. Mario and Giulio Ferrari are world-renowned experts in the field of Lego Mindstorms robotics, and in this book they share their unrivaled knowledge and expertise of robotics as well as provide a series of chapters detailing how to design and build the most exotic robots. Mario and Giulio also give detailed explanations of how to integrate Lego Mindstorms kits with other Lego programmable bricks such asScout and Cybermaster, as well as with non-robotic Lego Technics models.

Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New): Atilla Elci, Josef Pieprzyk,... Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New)
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, …
R5,047 Discovery Miles 50 470 Ships in 18 - 22 working days

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.): Kieran McCorry,... Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.)
Kieran McCorry, Donald Livengood
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

Microsoft Exchange 2000 Infrastructure Design explains from a system designer's and administrator's perspective Microsoft's Active Directory and its interaction with Exchange 2000, details issues concerned with migration to Exchange 2000, and outlines the specific technology and design issues relating to connectivity with Exchange 2000. Readers will learn to use these technologies to seamlessly co-exist with their current environment, migrate to a native Exchange 2000 environment, and connect to the Internet as well as to other messaging systems. The book's blend of expert instruction and best practices will help any organization create optimal system designs and configurations to support different technical and business scenarios.
McCorry and Livengood are experts in Microsoft technologies from Compaq, the world's leading integrator of Exchange systems. In Microsoft Exchange 2000 Infrastructure Design, they spell out the key technologies, features, and techniques IT professionals must master to build a unified and robust Exchange 2000 messaging service. This book details the framework organizations must put in place to most effectively move to Exchange 2000.

Detailed explanations of Active Directory integration with Exchange 2000, migration to Exchange 2000 from another system and Exchange 2000 transport, connectivity, and tools
Gives readers the benefit of authors' extensive experience
Unique description of the software "plumbing" organizations must master to move to Exchange 2000

Distributed Constraint Satisfaction - Foundations of Cooperation in Multi-agent Systems (Hardcover, 2001 ed.): Makoto Yokoo Distributed Constraint Satisfaction - Foundations of Cooperation in Multi-agent Systems (Hardcover, 2001 ed.)
Makoto Yokoo
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book gives an overview of constraint satisfaction problems (CSPs), adapts related search algorithms and consistency algorithms for applications to multi-agent systems, and consolidates recent research devoted to cooperation in such systems. The techniques introduced are applied to various problems in multi-agent systems. Among the new approaches is a hybrid-type algorithm for weak-commitment search combining backtracking and iterative improvement; also, an extension of the basic CSP formalization called partial CSP is introduced in order to handle over-constrained CSPs.The book is written for advanced students and professionals interested in multi-agent systems or, more generally, in distributed artificial intelligence and constraint satisfaction. Researchers active in the area will appreciate this book as a valuable source of reference.

Newnes Data Communications Pocket Book (Hardcover, 4th edition): Steve Winder, Mike Tooley Newnes Data Communications Pocket Book (Hardcover, 4th edition)
Steve Winder, Mike Tooley
R998 Discovery Miles 9 980 Ships in 10 - 15 working days

Despite the complexity of the subject, this wealth of information is presented succinctly and in such a way, using tables, diagrams and brief explanatory text, as to allow the user to locate information quickly and easily. Thus the book should be invaluable to those involved with the installation, commissioning and maintenance of data communications equipment, as well as the end user.
*A practical engineer's reference that puts the key information at your fingertips
*Covers essential data, techniques and working practice
*This update covers the latest international regulations

Heuristic Approaches for Telecommunications Network Management, Planning and Expansion - A Special Issue of the Journal of... Heuristic Approaches for Telecommunications Network Management, Planning and Expansion - A Special Issue of the Journal of Heuristics (Hardcover, Reprinted from JOURNAL OF HEURISTICS, 6:1, 2000)
Robert Doverspike, Iraj Saniee
R2,746 Discovery Miles 27 460 Ships in 18 - 22 working days

The telecommunications industry is experiencing a worldwide explosion of growth as few other industries ever have. However, as recently as a decade ago, the bulk of telecommunications services were delivered by the traditional telephone network, for which design and analysis principles had been under steady development for over three-quarters of a century. This environment was characterized by moderate and steady growth, with an accompanying slower development of new network equipment and standardization processes. In such a near-static environment, attention was given to optimization techniques to squeeze out better profits from existing and limited future investments. To this end, forecasts of network services were developed on a regular planning cycle and networks were optimized accordingly, layer by layer, for cost-effective placement of capacity and efficient utilization. In particular, optimization was based on a fairly stable set of assumptions about the network architecture, equipment models, and forecast uncertainty. This special edition is devoted to heuristic approaches for telecommunications network management, planning, and expansion. We hope that this collection brings to the attention of researchers and practitioners an array of techniques and case studies that meet the stringent time to market' requirements of this industry and which deserve exposure to a wider audience. Telecommunications will face a tremendous challenge in the coming years to be able to design, build, and manage networks in such a rapidly evolving industry. Development and application of heuristic methods will be fundamental in our ability to meet this challenge.

Biometric-Based Physical and Cybersecurity Systems (Hardcover, 1st ed. 2019): Mohammad S. Obaidat, Issa Traore, Isaac Woungang Biometric-Based Physical and Cybersecurity Systems (Hardcover, 1st ed. 2019)
Mohammad S. Obaidat, Issa Traore, Isaac Woungang
R4,123 Discovery Miles 41 230 Ships in 18 - 22 working days

This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.

Telecommunication Networks - Trends and Developments (Hardcover): Mohammad Abdul Matin Telecommunication Networks - Trends and Developments (Hardcover)
Mohammad Abdul Matin
R3,061 Discovery Miles 30 610 Ships in 18 - 22 working days
Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover): Manish Gupta, Raj Sharman Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover)
Manish Gupta, Raj Sharman
R4,971 Discovery Miles 49 710 Ships in 18 - 22 working days

"More often than not, it is becoming increasingly evident that the weakest links in the information-security chain are the people. Due an increase in information security threats, it is imperative for organizations and professionals to learn more on the human nature and social interactions behind those creating the problem. Social and Human Elements of Information Security: Emerging Trends and Countermeasures provides insightful, high-quality research into the social and human aspects of information security. A comprehensive source of the latest trends, issues, and findings in the field, this book fills the missing gap in existing literature by bringing together the most recent work from researchers in the fast and evolving field of information security."

Mobile Data Communication Systems (Hardcover): Peter Wong, David Britland Mobile Data Communication Systems (Hardcover)
Peter Wong, David Britland
R2,135 Discovery Miles 21 350 Ships in 18 - 22 working days

Brings you up to speed on mobile data system design, current and emerging wireless network and systems standards, and network architectures. Describes mobile data applications and wireless LANs, and analyzes and evaluates current technologies.

Justifying the Dependability of Computer-based Systems - With Applications in Nuclear Engineering (Hardcover, 2008 ed.):... Justifying the Dependability of Computer-based Systems - With Applications in Nuclear Engineering (Hardcover, 2008 ed.)
Pierre-Jacques Courtois
R5,185 Discovery Miles 51 850 Ships in 18 - 22 working days

Safety is a paradoxical system property. It remains immaterial, intangible and invisible until a failure, an accident or a catastrophy occurs and, too late, reveals its absence. And yet, a system cannot be relied upon unless its safety can be explained, demonstrated and certified. The practical and difficult questions which motivate this study concern the evidence and the arguments needed to justify the safety of a computer based system, or more generally its dependability. Dependability is a broad concept integrating properties such as safety, reliability, availability, maintainability and other related characteristics of the behaviour of a system in operation. How can we give the users the assurance that the system enjoys the required dependability? How should evidence be presented to certification bodies or regulatory authorities? What best practices should be applied? How should we decide whether there is enough evidence to justify the release of the system? To help answer these daunting questions, a method and a framework are proposed for the justification of the dependability of a computer-based system. The approach specifically aims at dealing with the difficulties raised by the validation of software. Hence, it should be of wide applicability despite being mainly based on the experience of assessing Nuclear Power Plant instrumentation and control systems important to safety. To be viable, a method must rest on a sound theoretical background.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,442 Discovery Miles 94 420 Ships in 18 - 22 working days
High Speed LAN Technology Handbook (Hardcover, 2000 ed.): Dhiman D. Chowdhury High Speed LAN Technology Handbook (Hardcover, 2000 ed.)
Dhiman D. Chowdhury
R2,929 Discovery Miles 29 290 Ships in 18 - 22 working days

The primary objective of this book is to teach the architectures, design principles, and troubleshooting techniques of a LAN. This will be imparted through the presentation of a broad scope of data and computer communication standards, real-world inter-networking techniques, architectures, hardware, software, protocols, technologies and services as they relate to the design, implementation and troubleshooting of a LAN. The logical and physical design of hardware and software is not the only process involved in the design and implementation of a LAN. The latter also encompasses many other aspects including making the business case, compiling the requirements, choosing the technology, planning for capacity, selecting the vendor, and weighing all the issues before the actual design begins.

Trusted Computing (Hardcover, illustrated edition): Chris Mitchell Trusted Computing (Hardcover, illustrated edition)
Chris Mitchell
R2,841 Discovery Miles 28 410 Ships in 10 - 15 working days

As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules. This new text introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. It also includes application examples based on recent and ongoing research. The core of the book is based on an open workshop on Trusted Computing, held at Royal Holloway, University of London, UK.

Directory Services - Design, Implementation and Management (Paperback): Nancy Cox Directory Services - Design, Implementation and Management (Paperback)
Nancy Cox
R1,224 Discovery Miles 12 240 Ships in 10 - 15 working days

To optimally design and manage a directory service, IS architects and managers must understand current state-of-the-art products. Directory Services covers Novell's NDS eDirectory, Microsoft's Active Directory, UNIX directories and products by NEXOR, MaxWare, Siemens, Critical Path and others. Directory design fundamentals and products are woven into case studies of large enterprise deployments. Cox thoroughly explores replication, security, migration and legacy system integration and interoperability. Business issues such as how to cost justify, plan, budget and manage a directory project are also included. The book culminates in a visionary discussion of future trends and emerging directory technologies including the strategic direction of the top directory products, the impact of wireless technology on directory enabled applications and using directories to customize content delivery from the Enterprise Portal.
Directory Services is a comprehensive and practical guide that provides organizations and consultants with a roadmap used to create the directory enabled global enterprise. To provide the reader with the core knowledge required for designing directory services, the book discusses directory fundamentals including X.500, X.509 and LDAP as well as how to cost justify, plan, budget and manage a directory project
Provides critical info for design, integration, or migration for multiple messaging platforms
Covers all major directories
Provides case studies and guidelines for deployment and integration issues

Elements of Queueing Theory - Palm Martingale Calculus and Stochastic Recurrences (Hardcover, 2nd ed. 2003): Francois Baccelli,... Elements of Queueing Theory - Palm Martingale Calculus and Stochastic Recurrences (Hardcover, 2nd ed. 2003)
Francois Baccelli, Pierre Bremaud
R2,839 Discovery Miles 28 390 Ships in 18 - 22 working days

The Palm theory and the Loynes theory of stationary systems are the two pillars of the modern approach to queuing. This book, presenting the mathematical foundations of the theory of stationaryqueuing systems, contains a thorough treatment of both of these.

This approach helps to clarify the picture, in that it separates the task of obtaining the key system formulas from that of proving convergence to a stationary state and computing its law.

The theory is constantly illustrated by classical results and models: Pollaczek-Khintchin and Tacacs formulas, Jackson and Gordon-Newell networks, multiserver queues, blocking queues, loss systems etc., but it also contains recent and significant examples, where the tools developed turn out to be indispensable.

Several other mathematical tools which are useful within this approach are also presented, such as the martingale calculus for point processes, or stochastic ordering for stationary recurrences.

This thoroughly revised second edition contains substantial additions - in particular, exercises and their solutions - rendering this now classic reference suitable for use as a textbook.

Wireless World in 2050 and Beyond: A Window into the Future! (Hardcover, 1st ed. 2016): Ramjee Prasad, Sudhir Dixit Wireless World in 2050 and Beyond: A Window into the Future! (Hardcover, 1st ed. 2016)
Ramjee Prasad, Sudhir Dixit
R3,546 R3,285 Discovery Miles 32 850 Save R261 (7%) Ships in 10 - 15 working days

This book gathers visionary ideas from leading academics and scientists to predict the future of wireless communication and enabling technologies in 2050 and beyond. The content combines a wealth of illustrations, tables, business models, and novel approaches to the evolution of wireless communication. The book also provides glimpses into the future of emerging technologies, end-to-end systems, and entrepreneurial and business models, broadening readers' understanding of potential future advances in the field and their influence on society at large

Computer Networks & Communications (NetCom) - Proceedings of the Fourth International Conference on Networks & Communications... Computer Networks & Communications (NetCom) - Proceedings of the Fourth International Conference on Networks & Communications (Hardcover, 1st ed. 2013)
Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai
R8,955 Discovery Miles 89 550 Ships in 18 - 22 working days

Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.

Essentials of Blockchain Technology (Hardcover): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Hardcover)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R2,631 Discovery Miles 26 310 Ships in 10 - 15 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

Research Anthology on Artificial Intelligence Applications in Security, VOL 4 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 4 (Hardcover)
Information Reso Management Association
R9,817 Discovery Miles 98 170 Ships in 18 - 22 working days
Mission-Critical Microsoft Exchange 2000 - Building Highly-Available Messaging and Knowledge Management Systems (Paperback):... Mission-Critical Microsoft Exchange 2000 - Building Highly-Available Messaging and Knowledge Management Systems (Paperback)
Jerry Cochran
R1,460 Discovery Miles 14 600 Ships in 10 - 15 working days

Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a primary means of communication for organizations, which can afford e-mail down-time no more than they can afford to be without phones. Further, messaging systems increasingly are supporting vital applications in addition to e-mail, such as workflow and knowledge management, making the data they store both voluminous and incredibly valuable.
Mission-Critical Microsoft Exchange 2000 teaches system designers, administrators and developers the strategies, tools, and best practices they'll need to plan and implement highly-available systems on Exchange 2000 and on earlier versions of Exchange. The book explains Exchange back-up and disaster recovery techniques, Windows clustering technologies for Exchange systems, and security planning to resist messaging-based attacks. Written by Jerry Cochran, an authority on large-scale Exchange systems, Mission-Critical Microsoft Exchange 2000 helps readers create Exchange systems upon which they can build large and growing organizations.
Unique book on a crucial Exchange topic
Part of Digital Press's Exchange Server Cluster
Author is Compaq's expert on high-end Exchange systems

Implementing Software Defined Radio (Hardcover, 2012): Eugene Grayver Implementing Software Defined Radio (Hardcover, 2012)
Eugene Grayver
R3,994 Discovery Miles 39 940 Ships in 10 - 15 working days

Software Defined Radio makes wireless communications easier, more efficient, and more reliable. This book bridges the gap between academic research and practical implementation. When beginning a project, practicing engineers, technical managers, and graduate students can save countless hours by considering the concepts presented in these pages.The author covers the myriad options and trade-offs available when selecting an appropriate hardware architecture.As demonstrated here, the choice between hardware- and software-centric architecture can mean the difference between meeting an aggressive schedule and bogging down in endless design iterations.Because of the author's experience overseeing dozens of failed and successful developments, he is able to present many real-life examples.Some of the key concepts covered are: Choosing the right architecture for the market - laboratory, military, or commercial, Hardware platforms - FPGAs, GPPs, specialized and hybrid devices, Standardization efforts to ensure interoperability and portabilitym State-of-the-art components for radio frequency, mixed-signal, and baseband processing.

The text requires only minimal knowledge of wireless communications; whenever possible, qualitative arguments are used instead of equations.An appendix provides a quick overview of wireless communications and introduces most of the concepts the readers will need to take advantage of the material.An essential introduction to SDR, this book is sure to be an invaluable addition to any technical bookshelf."

Algorithms for Next Generation Networks (Hardcover, 2010 Ed.): Graham Cormode, Marina Thottan Algorithms for Next Generation Networks (Hardcover, 2010 Ed.)
Graham Cormode, Marina Thottan
R4,270 Discovery Miles 42 700 Ships in 18 - 22 working days

Data networking now plays a major role in everyday life and new applications continue to appear at a blinding pace. Yet we still do not have a sound foundation for designing, evaluating and managing these networks.

This book covers topics at the intersection of algorithms and networking. It builds a complete picture of the current state of research on Next Generation Networks and the challenges for the years ahead. Particular focus is given to evolving research initiatives and the architecture they propose and implications for networking.

Topics: Network design and provisioning, hardware issues, layer-3 algorithms and MPLS, BGP and Inter AS routing, packet processing for routing, security and network management, load balancing, oblivious routing and stochastic algorithms, network coding for multicast, overlay routing for P2P networking and content delivery.

This timely volume will be of interest to a broad readership from graduate students to researchers looking to survey recent research its open questions.

Secure Key Establishment (Hardcover, 1st Edition.
2nd Printing. 2008): Kim-Kwang Raymond Choo Secure Key Establishment (Hardcover, 1st Edition. 2nd Printing. 2008)
Kim-Kwang Raymond Choo
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare-Rogaway model and the Canetti-Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare-Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

Advanced Wired and Wireless Networks (Hardcover, 2004 ed.): Tadeusz A. Wysocki, Arek Dadej, Beata J Wysocki Advanced Wired and Wireless Networks (Hardcover, 2004 ed.)
Tadeusz A. Wysocki, Arek Dadej, Beata J Wysocki
R2,676 Discovery Miles 26 760 Ships in 18 - 22 working days

Advanced Wired and Wireless Networks brings the reader a sample of recent research efforts representative of advances in the areas of recognized importance for the future Internet, such as ad hoc networking, mobility support and performance improvements in advanced networks and protocols.

Advanced Wired and Wireless Networks is structured to meet the needs of a professional audience in industry, as well as graduate-level students in computer science and engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Results in Numerical and…
Andreas Dillmann, Gerd Heller, … Hardcover R5,368 Discovery Miles 53 680
Fluid Dynamics - Theory, Computation…
C. Pozrikidis Hardcover R4,411 Discovery Miles 44 110
Computational Fluid Dynamics - An…
John F. Wendt Hardcover R2,694 Discovery Miles 26 940
Computational Methods for…
P. Draexler, Etc Hardcover R2,459 Discovery Miles 24 590
Data-Driven Modeling & Scientific…
J. Nathan Kutz Hardcover R4,183 Discovery Miles 41 830
Algorithimic Languages and Calculi
Richard Bird, Lambert Meerkens Hardcover R5,385 Discovery Miles 53 850
Constraint Programming and Decision…
Martine Ceberio, Vladik Kreinovich Hardcover R3,182 Discovery Miles 31 820
Longwave Instabilities and Patterns in…
Sergey Shklyaev, Alexander Nepomnyashchy Hardcover R4,232 Discovery Miles 42 320
Tracer Technology - Modeling the Flow of…
Octave Levenspiel Hardcover R2,644 Discovery Miles 26 440
Advances in Nanofluid Heat Transfer
Hafiz Muhammad Ali Paperback R3,543 Discovery Miles 35 430

 

Partners