0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (216)
  • R250 - R500 (848)
  • R500+ (8,498)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

How to Cheat at Configuring VmWare ESX Server (Paperback): David Rule How to Cheat at Configuring VmWare ESX Server (Paperback)
David Rule
R1,153 R891 Discovery Miles 8 910 Save R262 (23%) Ships in 12 - 19 working days

A virtual evolution in IT shops large and small has begun. VMware s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress proven How to Cheat methodology to configure and build VMware s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz
This book will detail the default and custom installation of VMware s ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.
Reap the Benefits of Server Virtualization
Realize improved ROI, ensure efficient mergers and acquisitions, and reduce compliance risk exposure through server virtualization and consolidation.
Build a Virtual Machine
Create a Gold Master and use your VMlibrary to leverage the power and flexibility of VMware.
Manage Your Virtual Infrastructure
Use VMware tools to partition physical servers and manage virtual machines.
Set Up Scripted Installation
See how a scripted installation method can be a fast and efficient way to provision ESX hosts.
Master ESX Native Tools
Use tools like Esxtop to diagnose performance issues and vmkfstools to import and export
Install and Use VMware Scripting APIs
Develop programs to help automate and ease administration even with a limited background in scripting or programming.
Learn the Fundamentals of a VM Backup
VMware ESX ships with three scripts that work together to create a backup and restore system: vmsnap.pl, vmsnap_all.pl, and vmres.pl.
Extend a Cloned Windows VM s Root Partition
Use Microsoft s Sysprep utility to extend a newly deployed virtual machine s root partition from the original clone size to a larger size."

Evolution and Standardization of Mobile Communications Technology (Hardcover, New): DongBack Seo Evolution and Standardization of Mobile Communications Technology (Hardcover, New)
DongBack Seo
R5,301 Discovery Miles 53 010 Ships in 10 - 15 working days

Information and communication technologies (ICT) are a vital component of successful business models. As new technologies emerge, organizations must adapt quickly and strategically to these changes or risk falling behind. Evolution and Standardization of Mobile Communications Technology examines methods of developing and regulating compatibility standards in the ICT industry, assisting organizations in their application of the latest communications technologies in their business practices. Organizations maintain competitive advantage by implementing cutting-edge technologies as soon as they appear. This book serves as a compendium of the most recent research and development in this arena, providing readers with the insight necessary to take full advantage of a wide range of ICT solutions. This book is part of the Advances in IT Standards and Standardization Research series collection.

Advancing Consumer-Centric Fog Computing Architectures (Hardcover): Kashif Munir Advancing Consumer-Centric Fog Computing Architectures (Hardcover)
Kashif Munir
R5,654 Discovery Miles 56 540 Ships in 10 - 15 working days

Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.

Handbook of Network and System Administration (Hardcover, New): Jan Bergstra, Mark Burgess Handbook of Network and System Administration (Hardcover, New)
Jan Bergstra, Mark Burgess
R7,185 R4,946 Discovery Miles 49 460 Save R2,239 (31%) Ships in 12 - 19 working days

System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.
This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.
This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.
- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments

Unix / Linux FAQ - (With Tips to Face Interviews) (Hardcover, St ed.): N B Venkateswarlu Unix / Linux FAQ - (With Tips to Face Interviews) (Hardcover, St ed.)
N B Venkateswarlu
R1,873 R1,604 Discovery Miles 16 040 Save R269 (14%) Ships in 10 - 15 working days
Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R6,256 Discovery Miles 62 560 Ships in 10 - 15 working days
A Primer For Disaster Recovery Planning In An IT Environment (Paperback, illustrated edition): Charlotte J. Haitt A Primer For Disaster Recovery Planning In An IT Environment (Paperback, illustrated edition)
Charlotte J. Haitt
R1,906 Discovery Miles 19 060 Ships in 10 - 15 working days

Since its birth in the late 1970s, the business recovery industry has continued to broaden, moving from original batch application processing on mainframes to include recovery for telecommunications connectivity, distributed processing on mid-range systems, and most recently, network and work area recovery. Whenever accidents, disasters and natural events interrupt business activities, one thing is certain: businesses lose money. How much money often depends on how prepared companies are for dealing with business interruptions. A Primer for Disaster Recovery Planning in an IT Environment is intended to help businesses plan for an occurrence that could mean a business stoppage. It helps you evaluate your business in terms of vulnerability to disaster and guides you through the process of creating a disaster recovery plan.

Conceptual Spaces: Elaborations and Applications (Hardcover, 1st ed. 2019): Mauri Kaipainen, Frank Zenker, Antti Hautamaki,... Conceptual Spaces: Elaborations and Applications (Hardcover, 1st ed. 2019)
Mauri Kaipainen, Frank Zenker, Antti Hautamaki, Peter Gardenfors
R3,372 Discovery Miles 33 720 Ships in 10 - 15 working days

This edited book focuses on concepts and their applications using the theory of conceptual spaces, one of today's most central tracks of cognitive science discourse. It features 15 papers based on topics presented at the Conceptual Spaces @ Work 2016 conference. The contributors interweave both theory and applications in their papers. Among the first mentioned are studies on metatheories, logical and systemic implications of the theory, as well as relations between concepts and language. Examples of the latter include explanatory models of paradigm shifts and evolution in science as well as dilemmas and issues of health, ethics, and education. The theory of conceptual spaces overcomes many translational issues between academic theoretization and practical applications. The paradigm is mainly associated with structural explanations, such as categorization and meronomy. However, the community has also been relating it to relations, functions, and systems. The book presents work that provides a geometric model for the representation of human conceptual knowledge that bridges the symbolic and the sub-conceptual levels of representation. The model has already proven to have a broad range of applicability beyond cognitive science and even across a number of disciplines related to concepts and representation.

Biometric Technologies and Verification Systems (Paperback): John Vacca Biometric Technologies and Verification Systems (Paperback)
John Vacca
R1,682 Discovery Miles 16 820 Ships in 12 - 19 working days

" Biometric Technologies and Verification Systems" is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

Real-Life MDA - Solving Business Problems with Model Driven Architecture (Paperback): Michael Guttman, John Parodi Real-Life MDA - Solving Business Problems with Model Driven Architecture (Paperback)
Michael Guttman, John Parodi
R1,162 Discovery Miles 11 620 Ships in 12 - 19 working days

Model Driven Architecture (MDA) is a new approach to software development that helps companies manage large, complex software projects and save development costs while allowing new technologies that come along to be readily incorporated. Although it is based on many long-standing industry precepts and best practices, such as UML, it is enough of a departure from traditional IT approaches to require some "proof of the pudding." Real-Life MDA is composed of six case studies of real companies using MDA that will furnish that proof. The authors' approach MDA projects by describing all aspects of the project from the viewpoint of the end-usersfrom the reason for choosing an MDA approach to the results and benefits. The case studies are preceded by an introductory chapter and are followed by a wrap-up chapter summarizing lessons learned.
* Written for executives, analysts, architects, and engineers positioned to influence business-oriented software development at the highest levels.
* Filled with concrete examples and analyses of how MDA is relevant for organizations of various sizes.
* Considers a range of uses for MDA from business process analysis to full-scale software modeling and development.
* Presents results for each case study in terms of tangible, measured benefits, including automatically generated code, defect reduction, improved visibility, and ROI."

UC/OS-III - The Real-Time Kernel and the Freescale Kinetis ARM Cortex-M4 (Hardcover): Jean J. Labrosse, Juan P. Benavides, Jose... UC/OS-III - The Real-Time Kernel and the Freescale Kinetis ARM Cortex-M4 (Hardcover)
Jean J. Labrosse, Juan P. Benavides, Jose Ferna Ndez-Villasen or
R2,385 Discovery Miles 23 850 Ships in 10 - 15 working days
See MIPS Run (Paperback, 2nd edition): Dominic Sweetman See MIPS Run (Paperback, 2nd edition)
Dominic Sweetman
R1,782 Discovery Miles 17 820 Ships in 12 - 19 working days

This second edition is not only a thorough update of the first edition, it is also a marriage of the best-known RISC architecture--MIPS--with the best-known open-source OS--Linux. The first part of the book begins with MIPS design principles and then describes the MIPS instruction set and programmers resources. It uses the MIPS32 standard as a baseline (the 1st edition used the R3000) from which to compare all other versions of the architecture and assumes that MIPS64 is the main option. The second part is a significant change from the first edition. It provides concrete examples of operating system low level code, by using Linux as the example operating system. It describes how Linux is built on the foundations the MIPS hardware provides and summarizes the Linux application environment, describing the libraries, kernel device-drivers and CPU-specific code. It then digs deep into application code and library support, protection and memory management, interrupts in the Linux kernel and multiprocessor Linux.
Sweetman has revised his best-selling MIPS bible for MIPS programmers, embedded systems designers, developers and programmers, who need an in-depth understanding of the MIPS architecture and specific guidance for writing software for MIPS-based systems, which are increasingly Linux-based.
* Completely new material offers the best explanation available on how Linux runs on real hardware.
* Provides a complete, updated and easy-to-use guide to the MIPS instruction set using the MIPS32 standard as the baseline architecture with the MIPS64 as the main option.
* Retains the same engaging writing style that made the first edition so readable, reflecting the authors 20+ years experience in designing systems based on the MIPS architecture."

Magnetic Core Memory Decoded (Hardcover): J.S. Walker Magnetic Core Memory Decoded (Hardcover)
J.S. Walker
R1,011 R899 Discovery Miles 8 990 Save R112 (11%) Ships in 12 - 19 working days
Systems Engineering for Business Process Change - New Directions - Collected Papers from the EPSRC Research Programme... Systems Engineering for Business Process Change - New Directions - Collected Papers from the EPSRC Research Programme (Hardcover)
Peter Henderson
R2,603 Discovery Miles 26 030 Ships in 12 - 19 working days

Systems Engineering for Business Process Change: New Directions is a collection of papers resulting from an EPSRC managed research programme set up to investigate the relationships between Legacy IT Systems and Business Processes. The papers contained in this volume report the results from the projects funded by the programme, which ran between 1997 and 2001. An earlier volume, published in 2000, reported interim results.
Bringing together researchers from diverse backgrounds in Computer Science, Information Systems, Engineering and Business Schools, this book explores the problems experienced by IT-dependent businesses that have to implement changing business processes in the context of their investment in legacy systems. The book presents some of the solutions investigated through the collaborations set up within the research programme.
Whether you are a researcher interested in the ideas that were generated by the research programme, or a user trying to understand the nature of the problems and their solutions, you cannot fail to be inspired by the writings contained in this volume.

UC/OS-III - The Real-Time Kernel and the Renesas SH7216 (Hardcover): Jean J. Labrosse UC/OS-III - The Real-Time Kernel and the Renesas SH7216 (Hardcover)
Jean J. Labrosse
R1,921 Discovery Miles 19 210 Ships in 12 - 19 working days
Laptop & Tablet Basics for the Over 50s: Windows 8 Edition (Paperback): Joli Ballew Laptop & Tablet Basics for the Over 50s: Windows 8 Edition (Paperback)
Joli Ballew 1
R417 R373 Discovery Miles 3 730 Save R44 (11%) Ships in 12 - 19 working days

Use your laptop or tablet with confidence This practical book will have you achieving immediate results using: a friendly, visual approach simple language practical, task-based examples large, full-colour screenshots. Discover everything you want to know about choosing and using your laptop or tablet in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter. Practical. Simple. Fast. Get the most out of your laptop or tablet with practical tips on every page: * ALERT: Solutions to common problems * HOT TIP: Time-saving shortcuts * SEE ALSO: Related tasks and information * DID YOU KNOW? Additional features to explore * WHAT DOES THIS MEAN? Jargon explained in plain English

Automated Analysis of Virtual Prototypes at the Electronic System Level - Design Understanding and Applications (Hardcover, 1st... Automated Analysis of Virtual Prototypes at the Electronic System Level - Design Understanding and Applications (Hardcover, 1st ed. 2020)
Mehran Goli, Rolf Drechsler
R2,382 Discovery Miles 23 820 Ships in 10 - 15 working days

This book describes a set of SystemC-based virtual prototype analysis methodologies, including design understanding, verification, security validation, and design space exploration. Readers will gain an overview of the latest research results in the field of Electronic Design Automation (EDA) at the Electronic System Level (ESL). The methodologies discussed enable readers to tackle easily key tasks and applications in the design process.

Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed.... Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed. 2021)
ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
R4,922 Discovery Miles 49 220 Ships in 12 - 19 working days

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.

Securing the Information Infrastructure (Hardcover): Joseph Migga Kizza, Florence Migga Kizza Securing the Information Infrastructure (Hardcover)
Joseph Migga Kizza, Florence Migga Kizza
R2,848 Discovery Miles 28 480 Ships in 10 - 15 working days

Explores the full range of issues - moral, ethical, social, legal, and technological - involved in developing firm controls and best practices to secure the ever growing information infrastructure upon which societies and individuals depend.

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R935 R775 Discovery Miles 7 750 Save R160 (17%) Ships in 12 - 19 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

Analog Circuit Theory and Filter Design in the Digital World - With an Introduction to the Morphological Method for Creative... Analog Circuit Theory and Filter Design in the Digital World - With an Introduction to the Morphological Method for Creative Solutions and Design (Hardcover, 1st ed. 2019)
George S. Moschytz
R3,524 Discovery Miles 35 240 Ships in 10 - 15 working days

This textbook is designed for graduate-level courses, and for self-study, in analog and sampled-data, including switched-capacitor, circuit theory and design for ongoing, or active electrical engineers, needing to become proficient in analog circuit design on a system, rather than on a device, level. After decades of experience in industry and teaching this material in academic settings, the author has extracted many of the most important and useful features of analog circuit theory and design and presented them in a manner that is easy to digest and utilize. The methodology and analysis techniques presented can be applied to areas well beyond those specifically addressed in this book. This book is meant to enable readers to gain a 'general knowledge' of one aspect of analog engineering (e.g., that of network theory, filter design, system theory and sampled-data signal processing). The presentation is self-contained and should be accessible to anyone with a first degree in electrical engineering.

Excel Basics In 30 Minutes - The beginner's guide to Microsoft Excel, Excel Online, and Google Sheets (Hardcover, 3rd... Excel Basics In 30 Minutes - The beginner's guide to Microsoft Excel, Excel Online, and Google Sheets (Hardcover, 3rd Revised ed.)
Ian Lamont
R580 Discovery Miles 5 800 Ships in 10 - 15 working days
Authentication of Embedded Devices - Technologies, Protocols and Emerging Applications (Hardcover, 1st ed. 2021): Basel Halak Authentication of Embedded Devices - Technologies, Protocols and Emerging Applications (Hardcover, 1st ed. 2021)
Basel Halak
R2,632 Discovery Miles 26 320 Ships in 10 - 15 working days

This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes.

Languages, Design Methods, and Tools for Electronic System Design - Selected Contributions from FDL 2018 (Hardcover, 1st ed.... Languages, Design Methods, and Tools for Electronic System Design - Selected Contributions from FDL 2018 (Hardcover, 1st ed. 2020)
Tom J. Kazmierski, Sebastian Steinhorst, Daniel Grosse
R1,525 Discovery Miles 15 250 Ships in 10 - 15 working days

This book brings together a selection of the best papers from the twenty-first edition of the Forum on specification and Design Languages Conference (FDL), which took place on September 10-12, 2018, in Munich, Germany. FDL is a well-established international forum devoted to dissemination of research results, practical experiences and new ideas in the application of specification, design and verification languages to the design, modeling and verification of integrated circuits, complex hardware/software embedded systems, and mixed-technology systems. Covers Assertion Based Design, Verification & Debug; Includes language-based modeling and design techniques for embedded systems; Covers design, modeling and verification of mixed physical domain and mixed signal systems that include significant analog parts in electrical and non-electrical domains; Includes formal and semi-formal system level design methods for complex embedded systems based on the Unified Modelling Language (UML) and Model Driven Engineering (MDE).

Experimental Multimedia Systems for Interactivity and Strategic Innovation (Hardcover): Ioannis Deliyannis, Petros Kostagiolas,... Experimental Multimedia Systems for Interactivity and Strategic Innovation (Hardcover)
Ioannis Deliyannis, Petros Kostagiolas, Christina Banou
R5,302 Discovery Miles 53 020 Ships in 10 - 15 working days

Multimedia has evolved with the introduction of interaction, allowing and encouraging users to control and navigate through content. Experimental multimedia is a new human-computer communication method that allows for the reinvention and redevelopment of user content. Experimental Multimedia Systems for Interactivity and Strategic Innovation presents the next evolutionary step of multimedia where interactivity meets targeted creativity and experimentation. In providing the basic framework for experimental multimedia through case studies that allow the reader to appreciate the design of multimedia systems, this publication's audience extends beyond new media artists to scientists, publishers, and developers who wish to extend their system designs to offer adaptive capabilities combined with multimedia content and dynamic interaction. This publication presents a collection of carefully selected theoretical and applied research chapters with a focus on matters including, but not limited to, aesthetics in publishing, e-health systems, artificial intelligence, augmented reality, human-computer interaction, interactive multimedia, and new media curation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Clean Architecture - Tips and Tricks to…
William Vance Hardcover R621 R565 Discovery Miles 5 650
PowerShell - A Comprehensive Guide to…
Sam Griffin Hardcover R614 R558 Discovery Miles 5 580
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek Hardcover R1,550 Discovery Miles 15 500
Kubernetes - The Ultimate Beginners…
Mark Reed Hardcover R599 R543 Discovery Miles 5 430
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,421 Discovery Miles 24 210
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
Intelligent IT Outsourcing
Sara Cullen, Leslie Willcocks Paperback R1,982 Discovery Miles 19 820
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,581 Discovery Miles 15 810
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,297 Discovery Miles 12 970
Microsoft Windows 10 Tips & Tricks
Joan Lambert Fold-out book or chart R244 Discovery Miles 2 440

 

Partners