0
Your cart

Your cart is empty

Price
  • R50 - R100 (1)
  • R100 - R250 (204)
  • R250 - R500 (829)
  • R500+ (8,488)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Workflow Scheduling on Computing Systems (Hardcover): Kenli Li, Xiaoyong Tang, Jing Mei, Longxin Zhang, Wangdong Yang, Keqin Li Workflow Scheduling on Computing Systems (Hardcover)
Kenli Li, Xiaoyong Tang, Jing Mei, Longxin Zhang, Wangdong Yang, …
R2,591 Discovery Miles 25 910 Ships in 12 - 19 working days

This book will serve as a guide in understanding workflow scheduling techniques on computing systems such as Cluster, Supercomputers, Grid computing, Cloud computing, Edge computing, Fog computing, and the practical realization of such methods. It offers a whole new perspective and holistic approach in understanding computing systems' workflow scheduling. Expressing and exposing approaches for various process-centric cloud-based applications give a full coverage of most systems' energy consumption, reliability, resource utilization, cost, and application stochastic computation. By combining theory with application and connecting mathematical concepts and models with their resource management targets, this book will be equally accessible to readers with both Computer Science and Engineering backgrounds. It will be of great interest to students and professionals alike in the field of computing system design, management, and application. This book will also be beneficial to the general audience and technology enthusiasts who want to expand their knowledge on computer structure.

Ultra-Dense Heterogeneous Networks (Hardcover): Wen Sun, Haibin Zhang, Nan Zhao, Chao Shen, Lawrence Wai Choong Wong Ultra-Dense Heterogeneous Networks (Hardcover)
Wen Sun, Haibin Zhang, Nan Zhao, Chao Shen, Lawrence Wai Choong Wong
R3,265 Discovery Miles 32 650 Ships in 12 - 19 working days

Unique selling point: * Systematically introduces the basic knowledge and state-of-the-art on UDHNs Core audience: * Researchers, engineers and postgraduates working on UDHNs Place in the market: * Includes the latest case studies and applications

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,720 Discovery Miles 37 200 Ships in 12 - 19 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback)
Ravi Das
R1,516 Discovery Miles 15 160 Ships in 12 - 19 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Blockchain for 6G-Enabled Network-Based Applications - A Vision, Architectural Elements, and Future Directions (Hardcover):... Blockchain for 6G-Enabled Network-Based Applications - A Vision, Architectural Elements, and Future Directions (Hardcover)
Vinay Rishiwal, Sudeep Tanwar, Rashmi Chaudhry
R3,286 Discovery Miles 32 860 Ships in 12 - 19 working days

This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,330 Discovery Miles 43 300 Ships in 12 - 19 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Paperback): Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa... Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Paperback)
Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa Liao
R2,652 Discovery Miles 26 520 Ships in 12 - 19 working days

the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project

Machine Learning for Edge Computing - Frameworks, Patterns and Best Practices (Hardcover): Amitoj Singh, Vinay Kukreja, Taghi... Machine Learning for Edge Computing - Frameworks, Patterns and Best Practices (Hardcover)
Amitoj Singh, Vinay Kukreja, Taghi Javdani Gandomani
R2,813 Discovery Miles 28 130 Ships in 12 - 19 working days

Introduces edge computing, hardware for edge computing AI, edge virtualization techniques Explores edge intelligence and deep learning applications, training and optimization Explains machine learning algorithms for edge Reviews AI on IoT Discusses future edge computing needs

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,839 Discovery Miles 58 390 Ships in 12 - 19 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback):... A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback)
Aakanksha Tewari, Brij B. Gupta
R757 Discovery Miles 7 570 Ships in 12 - 19 working days

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

Computers as Components - Principles of Embedded Computing System Design (Paperback, 5th edition): Marilyn Wolf Computers as Components - Principles of Embedded Computing System Design (Paperback, 5th edition)
Marilyn Wolf
R2,181 Discovery Miles 21 810 Ships in 12 - 19 working days
Massive Graph Analytics (Hardcover): David A. Bader Massive Graph Analytics (Hardcover)
David A. Bader
R4,234 Discovery Miles 42 340 Ships in 12 - 19 working days

Features contributions from thought leaders across academia, industry, and government Focuses on novel algorithms and practical applications

Security and Resilience of Cyber Physical Systems (Hardcover): Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia Security and Resilience of Cyber Physical Systems (Hardcover)
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia
R2,813 Discovery Miles 28 130 Ships in 12 - 19 working days

In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems

IoT Benefits and Growth Opportunities for the Telecom Industry - Key Technology Drivers for Companies (Hardcover): Vincent... IoT Benefits and Growth Opportunities for the Telecom Industry - Key Technology Drivers for Companies (Hardcover)
Vincent Sabourin, Jordan Tito Jabo
R1,771 Discovery Miles 17 710 Ships in 10 - 15 working days

This critical and forward-looking book features: An assessment of the impact of Internet of Things (IoT) on the telecom industry's revenue streams IoT-based business models in the telecom industry A PESTLE (political, economic, socio-cultural, technological, legal, and environmental) analysis of the industry in relation to IoT Key technological drivers. It also features a case study of Bell Canada Enterprises (BCE) Inc., which highlights IoT-based business models in the industry. The study reveals that telecom operators have started implementing IoT projects, however, true revenue streams are yet to materialize. Ten IoT-based business models have been identified at BCE Inc. The book points out that operators do leverage existing infrastructure in terms of broadband fiber and mobile connectivity in part and resort to partnerships and acquisitions to acquire much-needed knowledge, technology, and smart devices. Concerning the effect of IoT on the telecoms' revenue streams, it was revealed that new entrants, who are not necessarily in the telecom industry, have impacted the old players' revenue streams. OTT services like YouTube, WhatsApp, IPTV, Netflix, are the biggest culprits. Seven key technological drivers for IoT have been identified and include widespread wireless connectivity, the availability and affordability of microcontrollers, sensors and actuators, the decreasing cost of bandwidth, the recent implementation of IPv6, and the ongoing development of 5G network, as well as the use of cloud computing and analytics. Finally, the PESTLE analysis of the industry shows that the lack of a comprehensive political and regulatory framework still slows down IoT deployment. Interoperability, security, and privacy concerns are other constraints. Conversely, general economic conditions in most developed and developing economies are favorable to the advancement of IoT technology. Governments are willing to subsidize R&D and have partnered with the private sector to speed up the roll-out process.

Fine- and Coarse-Grain Reconfigurable Computing (Hardcover, 2007 ed.): Stamatis Vassiliadis Fine- and Coarse-Grain Reconfigurable Computing (Hardcover, 2007 ed.)
Stamatis Vassiliadis; Foreword by Y. Patt, J. Smith; Edited by Dimitrios Soudris; Foreword by M. Valero
R2,934 Discovery Miles 29 340 Ships in 10 - 15 working days

The basic concepts and building blocks for the design of Fine- (or FPGA) and Coarse-Grain Reconfigurable Architectures are discussed in this book. Recently-developed integrated architecture design and software-supported design flow of FPGA and coarse-grain reconfigurable architecture are also described. The book is accompanied by an interactive CD which includes case studies and lab projects for the design of FPGA and Coarse-grain architectures.

Underlying Standards that Support Population Health Improvement (Paperback): Laura Bright, Johanna Goderre Underlying Standards that Support Population Health Improvement (Paperback)
Laura Bright, Johanna Goderre
R1,109 Discovery Miles 11 090 Ships in 12 - 19 working days

This book highlights success stories and challenges to implementing health IT standards. The narrative of each chapter demonstrates how standards further interoperable health data exchange, especially in the service of advancing tools to monitor population health. These are critical stories that demonstrate to an international community of health and IT experts how to bring the right stakeholders together and bridge classic divides between software architects and clinical end users, health system decision-makers and standard authors.

Futuristic Research Trends and Applications of Internet of Things (Hardcover): Bhawana Rudra, Anshul Verma, Shekhar Verma,... Futuristic Research Trends and Applications of Internet of Things (Hardcover)
Bhawana Rudra, Anshul Verma, Shekhar Verma, Bhanu Shrestha
R3,437 Discovery Miles 34 370 Ships in 12 - 19 working days

The Internet of Things (IoT) is an interconnection of several devices, networks, technologies, and human resources to achieve a common goal. A variety of IoT-based applications are being used in different sectors and have succeeded in providing huge benefits to the users. As a revolution, IoT overtook the entire global landscape with its presence in almost every sector, including smart cities, smart grid, intelligent transportation, healthcare, education, and so on. This technological revolution also moved to the machines, converting them into intelligent computers that can make real-time decisions and communicate with each other, forming an Internet of Systems/Machines. The use of secure light-weight protocols will help us in developing environment-friendly and energy-efficient IoT systems. IoT is an emerging and recent area of research, adopted for many applications, and there is a need to investigate further challenges in all aspects of it. This book will provide information on fundamentals, architectures, communication protocols, use of AI, existing applications, and emerging research trends in IoT. It follows a theoretical approach to describe the fundamentals for beginners as well as a practical approach with the implementation of case studies for intermediate and advanced readers. The book will be beneficial for academicians, researchers, developers, and engineers who work in or are interested in fields related to IoT. This book serves as a reference for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Hardcover): Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa... Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Hardcover)
Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa Liao
R6,327 Discovery Miles 63 270 Ships in 12 - 19 working days

the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project

Social Data Analytics (Hardcover): Amin Beheshti, Samira Ghodratnama, Mehdi Elahi, Helia Farhood Social Data Analytics (Hardcover)
Amin Beheshti, Samira Ghodratnama, Mehdi Elahi, Helia Farhood
R5,919 R4,932 Discovery Miles 49 320 Save R987 (17%) Ships in 12 - 19 working days

- Curating Social Data - Summarizing Social Data - Analyzing Social Data - Social Data Analytics Applications: Trust, Recommender Systems, Cognitive Analytics

Practical Core Software Security - A Reference Framework (Paperback): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Paperback)
James F Ransome, Anmol Misra, Mark S. Merkow
R2,493 Discovery Miles 24 930 Ships in 12 - 19 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Handbook on Mobile and Ubiquitous Computing - Status and Perspective (Paperback): Laurence T. Yang, Evi Syukur, Seng W Loke Handbook on Mobile and Ubiquitous Computing - Status and Perspective (Paperback)
Laurence T. Yang, Evi Syukur, Seng W Loke
R1,587 Discovery Miles 15 870 Ships in 9 - 17 working days

Consolidating recent research in the area, the Handbook on Mobile and Ubiquitous Computing: Status and Perspective illustrates the design, implementation, and deployment of mobile and ubiquitous systems, particularly in mobile and ubiquitous environments, modeling, database components, and wireless infrastructures. Supplying an overarching perspective, the book is ideal for researchers, graduate students, and industry practitioners in computer science and engineering interested in recent developments in mobile and ubiquitous computing. It discusses new trends in intelligent systems, reviews sensory input and multimedia information, and examines embedded real-time systems. With coverage that spans security, privacy, and trust, the book is divided into six parts: Mobile and Ubiquitous Computing-illustrates the concepts, design, implementation, and deployment of mobile and ubiquitous systems Smart Environments and Agent Systems-discusses a new trend toward intelligent systems that are completely connected, proactive, intuitive, and constantly available Human-Computer Interaction and Multimedia Computing-describes guidelines for designing multisensory input and output for mobile devices Security, Privacy, and Trust Management-presents an approach to dynamically establish trust between a system and its mobile client in a flexible manner using a multi-agent negotiation mechanism Embedded Real-Time Systems-introduces novel work on how mobile, ubiquitous, and intelligence computing can be realized Networking Sensing and Communications-covers challenges, designs, and prototype solutions for establishing, managing, and maintaining current sensor networks in mobile and ubiquitous computing environments Containing the contributions of more than 70 researchers, practitioners, and academics from around the world, the book brings together the latest research on the subject to provide an understanding of the issues being addressed in the field. Filled with extensive references in each chapter, it provides you with the tools to participate in the design, implementation, and deployment of systems that are connected, proactive, intuitive, and constantly available.

Storytelling for New Technologies and Platforms - A Writer's Guide to Theme Parks, Virtual Reality, Board Games, Virtual... Storytelling for New Technologies and Platforms - A Writer's Guide to Theme Parks, Virtual Reality, Board Games, Virtual Assistants, and More (Hardcover)
Ross Berger
R3,869 Discovery Miles 38 690 Ships in 12 - 19 working days

Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.

The One Device - The Secret History of the iPhone (Paperback): Brian Merchant The One Device - The Secret History of the iPhone (Paperback)
Brian Merchant
R544 R503 Discovery Miles 5 030 Save R41 (8%) Ships in 10 - 15 working days
Energy Autonomy of Batteryless and Wireless Embedded Systems - Aeronautical Applications (Hardcover): Jean-Marie Dilhac,... Energy Autonomy of Batteryless and Wireless Embedded Systems - Aeronautical Applications (Hardcover)
Jean-Marie Dilhac, Vincent Boitier
R1,909 Discovery Miles 19 090 Ships in 12 - 19 working days

Energy Autonomy of Batteryless and Wireless Embedded Systems covers the numerous new applications of embedded systems that are envisioned in the context of aeronautics, such as sensor deployment for flight tests or for structural health monitoring. However, the increasing burden of on-board cabling requires wireless solutions. Moreover, concerns such as safety or system lifetime preclude the use of electrochemical energy storage. Ambient energy capture, storage and management are therefore key topics. This book presents these concepts and illustrates them through actual implementations in airliners. With five years of experience within this specialist field, the authors present results from actual flight tests via a partnership with Airbus. Basic concepts are summarized, together with practical implementations in airliners, enriching the book through the very specific aspects related to embedded systems deployed in aircraft. This book will appeal to both students and practising engineers in the field.

Heterogeneous Computing Architectures - Challenges and Vision (Paperback): Olivier Terzo, Karim Djemame, Alberto Scionti, Clara... Heterogeneous Computing Architectures - Challenges and Vision (Paperback)
Olivier Terzo, Karim Djemame, Alberto Scionti, Clara Pezuela
R2,431 Discovery Miles 24 310 Ships in 12 - 19 working days

Heterogeneous Computing Architectures: Challenges and Vision provides an updated vision of the state-of-the-art of heterogeneous computing systems, covering all the aspects related to their design: from the architecture and programming models to hardware/software integration and orchestration to real-time and security requirements. The transitions from multicore processors, GPU computing, and Cloud computing are not separate trends, but aspects of a single trend-mainstream; computers from desktop to smartphones are being permanently transformed into heterogeneous supercomputer clusters. The reader will get an organic perspective of modern heterogeneous systems and their future evolution.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
C++ and Object-Oriented Numeric…
Daoqi Yang Hardcover R2,703 Discovery Miles 27 030
Objects for Concurrent Constraint…
Martin Henz Hardcover R5,991 Discovery Miles 59 910
Advances in Computers, Volume 126
Suyel Namasudra Hardcover R4,986 R4,175 Discovery Miles 41 750
Web Engineering Advancements and Trends…
Hardcover R4,977 Discovery Miles 49 770
Spatial Visualization and Professional…
Andrew Paquette Hardcover R1,535 Discovery Miles 15 350
Joomla! Bible, Second Edition
R Shreves Paperback R1,192 R1,026 Discovery Miles 10 260
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel Paperback R900 R750 Discovery Miles 7 500
Design and Use of Software Architectures…
Jan Bosch Paperback R1,773 Discovery Miles 17 730
Introduction to the Art of Programming…
Mark C. Lewis Paperback R2,701 Discovery Miles 27 010
C++ Programming - Program Design…
D. Malik Paperback R1,751 R1,615 Discovery Miles 16 150

 

Partners