0
Your cart

Your cart is empty

Price
  • R0 - R50 (1)
  • R50 - R100 (6)
  • R100 - R250 (234)
  • R250 - R500 (784)
  • R500+ (8,180)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Routing Algorithms in Networks-on-Chip (Hardcover, 2014 ed.): Maurizio Palesi, Masoud Daneshtalab Routing Algorithms in Networks-on-Chip (Hardcover, 2014 ed.)
Maurizio Palesi, Masoud Daneshtalab
R4,882 Discovery Miles 48 820 Ships in 10 - 15 working days

This book provides a single-source reference to routing algorithms for Networks-on-Chip (NoCs), as well as in-depth discussions of advanced solutions applied to current and next generation, many core NoC-based Systems-on-Chip (SoCs). After a basic introduction to the NoC design paradigm and architectures, routing algorithms for NoC architectures are presented and discussed at all abstraction levels, from the algorithmic level to actual implementation. Coverage emphasizes the role played by the routing algorithm and is organized around key problems affecting current and next generation, many-core SoCs. A selection of routing algorithms is included, specifically designed to address key issues faced by designers in the ultra-deep sub-micron (UDSM) era, including performance improvement, power, energy, and thermal issues, fault tolerance and reliability.

Portable Biosensors and Point-of-Care Systems (Hardcover): Spyridon E. Kintzios Portable Biosensors and Point-of-Care Systems (Hardcover)
Spyridon E. Kintzios
R4,459 R3,998 Discovery Miles 39 980 Save R461 (10%) Ships in 18 - 22 working days

Portable Biosensors and Point-of-Care Systems describes the principles, design and applications of a new generation of analytical and diagnostic biomedical devices, characterized by their very small size, ease of use, multi-analytical capabilities and speed to provide handheld and mobile point-of-care (POC) diagnostics. The book is divided in four Parts. Part I is an in-depth analysis of the various technologies upon which portable diagnostic devices and biosensors are built. In Part II, advances in the design and optimization of special components of biosensor systems and handheld devices are presented. In Part III, a wide scope of applications of portable biosensors and handheld POC devices is described, ranging from the support of primary healthcare to food and environmental safety screening. Diverse topics are covered, including counterterrorism, travel medicine and drug development. Finally, Part IV of the book is dedicated to the presentation of commercially available products including a review of the products of point-of-care in-vitro-diagnostics companies, a review of technologies which have achieved a high Technology Readiness Level, and a special market case study of POC infusion systems combined with intelligent patient monitoring. This book is essential reading for researchers and experts in the healthcare diagnostic and analytical sector, and for electronics and material engineers working on portable sensors.

How to Cheat at Configuring VmWare ESX Server (Paperback): David Rule How to Cheat at Configuring VmWare ESX Server (Paperback)
David Rule
R1,084 R842 Discovery Miles 8 420 Save R242 (22%) Ships in 10 - 15 working days

A virtual evolution in IT shops large and small has begun. VMware s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress proven How to Cheat methodology to configure and build VMware s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz
This book will detail the default and custom installation of VMware s ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.
Reap the Benefits of Server Virtualization
Realize improved ROI, ensure efficient mergers and acquisitions, and reduce compliance risk exposure through server virtualization and consolidation.
Build a Virtual Machine
Create a Gold Master and use your VMlibrary to leverage the power and flexibility of VMware.
Manage Your Virtual Infrastructure
Use VMware tools to partition physical servers and manage virtual machines.
Set Up Scripted Installation
See how a scripted installation method can be a fast and efficient way to provision ESX hosts.
Master ESX Native Tools
Use tools like Esxtop to diagnose performance issues and vmkfstools to import and export
Install and Use VMware Scripting APIs
Develop programs to help automate and ease administration even with a limited background in scripting or programming.
Learn the Fundamentals of a VM Backup
VMware ESX ships with three scripts that work together to create a backup and restore system: vmsnap.pl, vmsnap_all.pl, and vmres.pl.
Extend a Cloned Windows VM s Root Partition
Use Microsoft s Sysprep utility to extend a newly deployed virtual machine s root partition from the original clone size to a larger size."

Conceptual Spaces: Elaborations and Applications (Hardcover, 1st ed. 2019): Mauri Kaipainen, Frank Zenker, Antti Hautamaki,... Conceptual Spaces: Elaborations and Applications (Hardcover, 1st ed. 2019)
Mauri Kaipainen, Frank Zenker, Antti Hautamaki, Peter Gardenfors
R3,112 Discovery Miles 31 120 Ships in 18 - 22 working days

This edited book focuses on concepts and their applications using the theory of conceptual spaces, one of today's most central tracks of cognitive science discourse. It features 15 papers based on topics presented at the Conceptual Spaces @ Work 2016 conference. The contributors interweave both theory and applications in their papers. Among the first mentioned are studies on metatheories, logical and systemic implications of the theory, as well as relations between concepts and language. Examples of the latter include explanatory models of paradigm shifts and evolution in science as well as dilemmas and issues of health, ethics, and education. The theory of conceptual spaces overcomes many translational issues between academic theoretization and practical applications. The paradigm is mainly associated with structural explanations, such as categorization and meronomy. However, the community has also been relating it to relations, functions, and systems. The book presents work that provides a geometric model for the representation of human conceptual knowledge that bridges the symbolic and the sub-conceptual levels of representation. The model has already proven to have a broad range of applicability beyond cognitive science and even across a number of disciplines related to concepts and representation.

Web-Based Supply Chain Management and Digital Signal Processing - Methods for Effective Information Administration and... Web-Based Supply Chain Management and Digital Signal Processing - Methods for Effective Information Administration and Transmission (Hardcover)
R. Manjunath
R4,567 Discovery Miles 45 670 Ships in 18 - 22 working days

Digital signal processing is now a growing area of study invading all walks of organizational life, from consumer products to database management. ""Web-Based Supply Chain Management and Digital Signal Processing: Methods for Effective Information Administration and Transmission"" presents trends and techniques for successful intelligent decision-making and transfer of products through digital signal processing. A defining collection of field advancements, this publication provides the latest and most complete research in supply chain management with examples and case studies useful for those involved with various levels of management.

Handbook of Network and System Administration (Hardcover, New): Jan Bergstra, Mark Burgess Handbook of Network and System Administration (Hardcover, New)
Jan Bergstra, Mark Burgess
R4,654 Discovery Miles 46 540 Ships in 10 - 15 working days

System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.
This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.
This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.
- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments

A Hobbyist's Guide to THEC64 Mini (Hardcover, Collector's ed.): Holger Wessling A Hobbyist's Guide to THEC64 Mini (Hardcover, Collector's ed.)
Holger Wessling
R796 Discovery Miles 7 960 Ships in 10 - 15 working days
Evolution and Standardization of Mobile Communications Technology (Hardcover, New): DongBack Seo Evolution and Standardization of Mobile Communications Technology (Hardcover, New)
DongBack Seo
R4,888 Discovery Miles 48 880 Ships in 18 - 22 working days

Information and communication technologies (ICT) are a vital component of successful business models. As new technologies emerge, organizations must adapt quickly and strategically to these changes or risk falling behind. Evolution and Standardization of Mobile Communications Technology examines methods of developing and regulating compatibility standards in the ICT industry, assisting organizations in their application of the latest communications technologies in their business practices. Organizations maintain competitive advantage by implementing cutting-edge technologies as soon as they appear. This book serves as a compendium of the most recent research and development in this arena, providing readers with the insight necessary to take full advantage of a wide range of ICT solutions. This book is part of the Advances in IT Standards and Standardization Research series collection.

Biometric Technologies and Verification Systems (Paperback): John Vacca Biometric Technologies and Verification Systems (Paperback)
John Vacca
R1,586 Discovery Miles 15 860 Ships in 10 - 15 working days

" Biometric Technologies and Verification Systems" is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

See MIPS Run (Paperback, 2nd edition): Dominic Sweetman See MIPS Run (Paperback, 2nd edition)
Dominic Sweetman
R1,680 Discovery Miles 16 800 Ships in 10 - 15 working days

This second edition is not only a thorough update of the first edition, it is also a marriage of the best-known RISC architecture--MIPS--with the best-known open-source OS--Linux. The first part of the book begins with MIPS design principles and then describes the MIPS instruction set and programmers resources. It uses the MIPS32 standard as a baseline (the 1st edition used the R3000) from which to compare all other versions of the architecture and assumes that MIPS64 is the main option. The second part is a significant change from the first edition. It provides concrete examples of operating system low level code, by using Linux as the example operating system. It describes how Linux is built on the foundations the MIPS hardware provides and summarizes the Linux application environment, describing the libraries, kernel device-drivers and CPU-specific code. It then digs deep into application code and library support, protection and memory management, interrupts in the Linux kernel and multiprocessor Linux.
Sweetman has revised his best-selling MIPS bible for MIPS programmers, embedded systems designers, developers and programmers, who need an in-depth understanding of the MIPS architecture and specific guidance for writing software for MIPS-based systems, which are increasingly Linux-based.
* Completely new material offers the best explanation available on how Linux runs on real hardware.
* Provides a complete, updated and easy-to-use guide to the MIPS instruction set using the MIPS32 standard as the baseline architecture with the MIPS64 as the main option.
* Retains the same engaging writing style that made the first edition so readable, reflecting the authors 20+ years experience in designing systems based on the MIPS architecture."

Real-Life MDA - Solving Business Problems with Model Driven Architecture (Paperback): Michael Guttman, John Parodi Real-Life MDA - Solving Business Problems with Model Driven Architecture (Paperback)
Michael Guttman, John Parodi
R1,097 Discovery Miles 10 970 Ships in 10 - 15 working days

Model Driven Architecture (MDA) is a new approach to software development that helps companies manage large, complex software projects and save development costs while allowing new technologies that come along to be readily incorporated. Although it is based on many long-standing industry precepts and best practices, such as UML, it is enough of a departure from traditional IT approaches to require some "proof of the pudding." Real-Life MDA is composed of six case studies of real companies using MDA that will furnish that proof. The authors' approach MDA projects by describing all aspects of the project from the viewpoint of the end-usersfrom the reason for choosing an MDA approach to the results and benefits. The case studies are preceded by an introductory chapter and are followed by a wrap-up chapter summarizing lessons learned.
* Written for executives, analysts, architects, and engineers positioned to influence business-oriented software development at the highest levels.
* Filled with concrete examples and analyses of how MDA is relevant for organizations of various sizes.
* Considers a range of uses for MDA from business process analysis to full-scale software modeling and development.
* Presents results for each case study in terms of tangible, measured benefits, including automatically generated code, defect reduction, improved visibility, and ROI."

Securing the Information Infrastructure (Hardcover): Joseph Migga Kizza, Florence Migga Kizza Securing the Information Infrastructure (Hardcover)
Joseph Migga Kizza, Florence Migga Kizza
R2,630 Discovery Miles 26 300 Ships in 18 - 22 working days

Explores the full range of issues - moral, ethical, social, legal, and technological - involved in developing firm controls and best practices to secure the ever growing information infrastructure upon which societies and individuals depend.

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R879 R734 Discovery Miles 7 340 Save R145 (16%) Ships in 10 - 15 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R5,768 Discovery Miles 57 680 Ships in 18 - 22 working days
Linux - A Comprehensive Guide to Linux Operating System and Command Line (Hardcover): Sam Griffin Linux - A Comprehensive Guide to Linux Operating System and Command Line (Hardcover)
Sam Griffin
R558 R513 Discovery Miles 5 130 Save R45 (8%) Ships in 18 - 22 working days
Advancing Consumer-Centric Fog Computing Architectures (Hardcover): Kashif Munir Advancing Consumer-Centric Fog Computing Architectures (Hardcover)
Kashif Munir
R5,214 Discovery Miles 52 140 Ships in 18 - 22 working days

Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.

Analog Circuit Theory and Filter Design in the Digital World - With an Introduction to the Morphological Method for Creative... Analog Circuit Theory and Filter Design in the Digital World - With an Introduction to the Morphological Method for Creative Solutions and Design (Hardcover, 1st ed. 2019)
George S. Moschytz
R3,252 Discovery Miles 32 520 Ships in 18 - 22 working days

This textbook is designed for graduate-level courses, and for self-study, in analog and sampled-data, including switched-capacitor, circuit theory and design for ongoing, or active electrical engineers, needing to become proficient in analog circuit design on a system, rather than on a device, level. After decades of experience in industry and teaching this material in academic settings, the author has extracted many of the most important and useful features of analog circuit theory and design and presented them in a manner that is easy to digest and utilize. The methodology and analysis techniques presented can be applied to areas well beyond those specifically addressed in this book. This book is meant to enable readers to gain a 'general knowledge' of one aspect of analog engineering (e.g., that of network theory, filter design, system theory and sampled-data signal processing). The presentation is self-contained and should be accessible to anyone with a first degree in electrical engineering.

100 ADS Design Examples - Based on the Textbook: RF and Microwave Circuit Design (Hardcover): Ali A Behagi 100 ADS Design Examples - Based on the Textbook: RF and Microwave Circuit Design (Hardcover)
Ali A Behagi
R1,142 R970 Discovery Miles 9 700 Save R172 (15%) Ships in 18 - 22 working days
XML in Data Management - Understanding and Applying Them Together (Paperback): Peter Aiken, M. David Allen XML in Data Management - Understanding and Applying Them Together (Paperback)
Peter Aiken, M. David Allen
R1,150 Discovery Miles 11 500 Ships in 10 - 15 working days

XML in Data Management is for IT managers and technical staff involved in the creation, administration, or maintenance of a data management infrastructure that includes XML. For most IT staff, XML is either just a buzzword that is ignored or a silver bullet to be used in every nook and cranny of their organization. The truth is in between the two. This book provides the guidance necessary for data managers to make measured decisions about XML within their organizations. Readers will understand the uses of XML, its component architecture, its strategic implications, and how these apply to data management.
To view a sample chapter and read the Foreword by Thomas C. Redman, visit http: //books.elsevier.com/mk/?isbn=0120455994
* Takes a data-centric view of XML.
* Explains how, when, and why to apply XML to data management systems.
* Covers XML component architecture, data engineering, frameworks, metadata, legacy systems, and more.
* Discusses the various strengths and weaknesses of XML technologies in the context of organizational data management and integration.

Enterprise Architecture and Integration - Methods, Implementation and Technologies (Hardcover, New): Enterprise Architecture and Integration - Methods, Implementation and Technologies (Hardcover, New)
R4,229 Discovery Miles 42 290 Ships in 18 - 22 working days

Enterprise integration is a broad activity that involves solving a range of issues relating to business process definition, common data standards, architectural compatibility, technical interoperability, and organizational alignment. Enterprise Architecture and Integration: Methods, Implementation, and Technologies provides a detailed analysis of the important strategies for integrating IT systems into fields such as e-business and customer-relationship management. This Premier Reference Source supplies readers with a comprehensive survey of existing enterprise architecture and integration approaches, and presents case studies that illustrate best practices. It takes a holistic view of enterprise integration, describing innovative methods, tools, and architectures with which organizations can systematically achieve enterprise integration.

Logic Functions and Equations - Fundamentals and Applications using the XBOOLE-Monitor (Hardcover, 3rd ed. 2022): Bernd... Logic Functions and Equations - Fundamentals and Applications using the XBOOLE-Monitor (Hardcover, 3rd ed. 2022)
Bernd Steinbach, Christian Posthoff
R2,885 Discovery Miles 28 850 Ships in 18 - 22 working days

The greatly expanded and updated 3rd edition of this textbook offers the reader a comprehensive introduction to the concepts of logic functions and equations and their applications across computer science and engineering. The authors' approach emphasizes a thorough understanding of the fundamental principles as well as numerical and computer-based solution methods. The book provides insight into applications across propositional logic, binary arithmetic, coding, cryptography, complexity, logic design, and artificial intelligence. Updated throughout, some major additions for the 3rd edition include: a new chapter about the concepts contributing to the power of XBOOLE; a new chapter that introduces into the application of the XBOOLE-Monitor XBM 2; many tasks that support the readers in amplifying the learned content at the end of the chapters; solutions of a large subset of these tasks to confirm learning success; challenging tasks that need the power of the XBOOLE software for their solution. The XBOOLE-monitor XBM 2 software is used to solve the exercises; in this way the time-consuming and error-prone manipulation on the bit level is moved to an ordinary PC, more realistic tasks can be solved, and the challenges of thinking about algorithms leads to a higher level of education.

VIC 20 Exposed (Hardcover, Collector's ed.): John Vander Reyden VIC 20 Exposed (Hardcover, Collector's ed.)
John Vander Reyden
R592 Discovery Miles 5 920 Ships in 18 - 22 working days
Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover)
Information R Management Association
R5,773 Discovery Miles 57 730 Ships in 18 - 22 working days
Multimodality in Mobile Computing and Mobile Devices - Methods for Adaptable Usability (Hardcover, New): Stan Kurkovsky Multimodality in Mobile Computing and Mobile Devices - Methods for Adaptable Usability (Hardcover, New)
Stan Kurkovsky
R4,605 Discovery Miles 46 050 Ships in 18 - 22 working days

Originally designed for interpersonal communication, today mobile devices are capable of connecting their users to a wide variety of Internet-enabled services and applications. Multimodality in Mobile Computing and Mobile Devices: Methods for Adaptable Usability explores a variety of perspectives on multimodal user interface design, describes a variety of novel multimodal applications, and provides real-life experience reports. Containing research from leading international experts, this innovative publication presents core concepts that define multi-modal, multi-channel, and multi-device interactions and their role in mobile, pervasive, and ubiquitous computing.

Modeling and Simulation of Invasive Applications and Architectures (Hardcover, 1st ed. 2019): Sascha Roloff, Frank Hannig,... Modeling and Simulation of Invasive Applications and Architectures (Hardcover, 1st ed. 2019)
Sascha Roloff, Frank Hannig, Jurgen Teich
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book covers two main topics: First, novel fast and flexible simulation techniques for modern heterogeneous NoC-based multi-core architectures. These are implemented in the full-system simulator called InvadeSIM and designed to study the dynamic behavior of hundreds of parallel application programs running on such architectures while competing for resources. Second, a novel actor-oriented programming library called ActorX10, which allows to formally model parallel streaming applications by actor graphs and to analyze predictable execution behavior as part of so-called hybrid mapping approaches, which are used to guarantee real-time requirements of such applications at design time independent from dynamic workloads by a combination of static analysis and dynamic embedding.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Media Ownership and Concentration in…
Eli M. Noam Hardcover R3,786 Discovery Miles 37 860
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,491 Discovery Miles 14 910
Digital Video Editing with Final Cut…
Charles Roberts Paperback R819 Discovery Miles 8 190
A Primer For Disaster Recovery Planning…
Charlotte J. Haitt Paperback R1,409 Discovery Miles 14 090
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010
TI-83 Plus Calculator
BarCharts Inc Fold-out book or chart R229 Discovery Miles 2 290
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, … Paperback R2,763 Discovery Miles 27 630
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald Hardcover R5,315 Discovery Miles 53 150

 

Partners