0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R50 - R100 (9)
  • R100 - R250 (506)
  • R250 - R500 (4,421)
  • R500+ (31,671)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming

Emotion in Video Game Soundtracking (Hardcover, 1st ed. 2018): Duncan Williams, Newton Lee Emotion in Video Game Soundtracking (Hardcover, 1st ed. 2018)
Duncan Williams, Newton Lee
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

This book presents an overview of the emerging field of emotion in videogame soundtracking. The emotional impact of music has been well-documented, particularly when used to enhance the impact of a multimodal experience, such as combining images with audio as found in the videogames industry. Soundtracking videogames presents a unique challenge compared to traditional composition (for example film music) in that the narrative of gameplay is non-linear - Player dependent actions can change the narrative and thus the emotional characteristics required in the soundtrack. Historical approaches to emotion measurement, and the musical feature mapping and music selection that might be used in video game soundtracking are outlined, before a series of cutting edge examples are given. These examples include algorithmic composition techniques, automated emotion matching from biosensors, motion capture techniques, emotionally-targeted speech synthesis and signal processing, and automated repurposing of existing music (for example from a players own library). The book concludes with some possibilities for the future.

Hybrid Metaheuristics - Powerful Tools for Optimization (Hardcover, 1st ed. 2016): Christian Blum, Gunther R. Raidl Hybrid Metaheuristics - Powerful Tools for Optimization (Hardcover, 1st ed. 2016)
Christian Blum, Gunther R. Raidl
R3,913 Discovery Miles 39 130 Ships in 10 - 15 working days

This book explains the most prominent and some promising new, general techniques that combine metaheuristics with other optimization methods. A first introductory chapter reviews the basic principles of local search, prominent metaheuristics, and tree search, dynamic programming, mixed integer linear programming, and constraint programming for combinatorial optimization purposes. The chapters that follow present five generally applicable hybridization strategies, with exemplary case studies on selected problems: incomplete solution representations and decoders; problem instance reduction; large neighborhood search; parallel non-independent construction of solutions within metaheuristics; and hybridization based on complete solution archives. The authors are among the leading researchers in the hybridization of metaheuristics with other techniques for optimization, and their work reflects the broad shift to problem-oriented rather than algorithm-oriented approaches, enabling faster and more effective implementation in real-life applications. This hybridization is not restricted to different variants of metaheuristics but includes, for example, the combination of mathematical programming, dynamic programming, or constraint programming with metaheuristics, reflecting cross-fertilization in fields such as optimization, algorithmics, mathematical modeling, operations research, statistics, and simulation. The book is a valuable introduction and reference for researchers and graduate students in these domains.

Conceptual Modeling Perspectives (Hardcover, 1st ed. 2017): Jordi Cabot, Cristina Gomez, Oscar Pastor, Maria Ribera Sancho,... Conceptual Modeling Perspectives (Hardcover, 1st ed. 2017)
Jordi Cabot, Cristina Gomez, Oscar Pastor, Maria Ribera Sancho, Ernest Teniente
R3,645 R3,384 Discovery Miles 33 840 Save R261 (7%) Ships in 10 - 15 working days

Conceptual modeling has always been one of the main issues in information systems engineering as it aims to describe the general knowledge of the system at an abstract level that facilitates user understanding and software development. This collection of selected papers provides a comprehensive and extremely readable overview of what conceptual modeling is and perspectives on making it more and more relevant in our society. It covers topics like modeling the human genome, blockchain technology, model-driven software development, data integration, and wiki-like repositories and demonstrates the general applicability of conceptual modeling to various problems in diverse domains. Overall, this book is a source of inspiration for everybody in academia working on the vision of creating a strong, fruitful and creative community of conceptual modelers. With this book the editors and authors want to honor Prof. Antoni Olive for his enormous and ongoing contributions to the conceptual modeling discipline. It was presented to him on the occasion of his keynote at ER 2017 in Valencia, a conference that he has contributed to and supported for over 20 years. Thank you very much to Antoni for so many years of cooperation and friendship.

Applied Structural Equation Modelling for Researchers and Practitioners - Using R and Stata for Behavioural Research... Applied Structural Equation Modelling for Researchers and Practitioners - Using R and Stata for Behavioural Research (Hardcover)
Indranarain Ramlall
R3,226 Discovery Miles 32 260 Ships in 10 - 15 working days

During the last two decades, structural equation modelling (SEM) has emerged as a powerful multivariate data analysis tool in social science research settings, especially in the fields of sociology, psychology, and education. Social science researchers and students benefit greatly from acquiring knowledge and skills in SEM, since the methods can provide a bridge between the theoretical and empirical aspects of behavioural research. Ramlall explains in a rigorous, concise, and practical manner all the vital components embedded in structural equation modelling (SEM). Focusing on R and Stata to implement and perform various structural equation models, Ramlall examines the types, benefits, and drawbacks of SEM, delving into model specifications and identifications, fit evaluations, and path diagrams.

Transaction Processing - Management of the Logical Database and its Underlying Physical Structure (Hardcover, 2014 ed.): Seppo... Transaction Processing - Management of the Logical Database and its Underlying Physical Structure (Hardcover, 2014 ed.)
Seppo Sippu, Eljas Soisalon-Soininen
R2,550 Discovery Miles 25 500 Ships in 10 - 15 working days

Transactions are a concept related to the logical database as seen from the perspective of database application programmers: a transaction is a sequence of database actions that is to be executed as an atomic unit of work. The processing of transactions on databases is a well- established area with many of its foundations having already been laid in the late 1970s and early 1980s. The unique feature of this textbook is that it bridges the gap between the theory of transactions on the logical database and the implementation of the related actions on the underlying physical database. The authors relate the logical database, which is composed of a dynamically changing set of data items with unique keys, and the underlying physical database with a set of fixed-size data and index pages on disk. Their treatment of transaction processing builds on the "do-redo-undo" recovery paradigm, and all methods and algorithms presented are carefully designed to be compatible with this paradigm as well as with write-ahead logging, steal-and-no-force buffering, and fine-grained concurrency control. Chapters 1 to 6 address the basics needed to fully appreciate transaction processing on a centralized database system within the context of our transaction model, covering topics like ACID properties, database integrity, buffering, rollbacks, isolation, and the interplay of logical locks and physical latches. Chapters 7 and 8 present advanced features including deadlock-free algorithms for reading, inserting and deleting tuples, while the remaining chapters cover additional advanced topics extending on the preceding foundational chapters, including multi-granular locking, bulk actions, versioning, distributed updates, and write-intensive transactions. This book is primarily intended as a text for advanced undergraduate or graduate courses on database management in general or transaction processing in particular.

Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,193 Discovery Miles 31 930 Ships in 18 - 22 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

High Efficiency Video Coding (HEVC) - Algorithms and Architectures (Hardcover, 2014 ed.): Vivienne Sze, Madhukar Budagavi, Gary... High Efficiency Video Coding (HEVC) - Algorithms and Architectures (Hardcover, 2014 ed.)
Vivienne Sze, Madhukar Budagavi, Gary J. Sullivan
R4,331 Discovery Miles 43 310 Ships in 10 - 15 working days

This book provides developers, engineers, researchers and students with detailed knowledge about the High Efficiency Video Coding (HEVC) standard. HEVC is the successor to the widely successful H.264/AVC video compression standard, and it provides around twice as much compression as H.264/AVC for the same level of quality. The applications for HEVC will not only cover the space of the well-known current uses and capabilities of digital video they will also include the deployment of new services and the delivery of enhanced video quality, such as ultra-high-definition television (UHDTV) and video with higher dynamic range, wider range of representable color, and greater representation precision than what is typically found today. HEVC is the next major generation of video coding design a flexible, reliable and robust solution that will support the next decade of video applications and ease the burden of video on world-wide network traffic. This book provides a detailed explanation of the various parts of the standard, insight into how it was developed, and in-depth discussion of algorithms and architectures for its implementation."

Python Programming - The Easiest Python Crash Course to go Deep Through the Main Application as Web Development, Data Analysis... Python Programming - The Easiest Python Crash Course to go Deep Through the Main Application as Web Development, Data Analysis and Data Science Including Machine Learning (Hardcover)
Alan Grid
R707 Discovery Miles 7 070 Ships in 10 - 15 working days
Handbook of Software Engineering: Volume I (Hardcover): Tom Halt Handbook of Software Engineering: Volume I (Hardcover)
Tom Halt
R3,164 R2,867 Discovery Miles 28 670 Save R297 (9%) Ships in 18 - 22 working days
The Art of Software Thermal Management for Embedded Systems (Hardcover, 2014 ed.): Mark Benson The Art of Software Thermal Management for Embedded Systems (Hardcover, 2014 ed.)
Mark Benson
R3,182 Discovery Miles 31 820 Ships in 18 - 22 working days

This book introduces Software Thermal Management (STM) as a means of reducing power consumption in a computing system in order to manage heat, improve component reliability and increase system safety. Readers will benefit from this pragmatic guide to the field of STM for embedded systems and its catalog of software power management techniques. Since thermal management is a key bottleneck in embedded systems design, this book focuses on root cause of heat in embedded systems: power. Since software has an enormous impact on power consumption in an embedded system, this book urges software engineers to manage heat effectively by understanding, categorizing and developing new ways to reduce static and dynamic power consumption. Whereas most books on thermal management describe mechanisms to remove heat, this book focuses on ways for software engineers to avoid generating heat in the first place.

The Requirements Engineering Handbook (Hardcover, Illustrated Ed): Ralph R. Young The Requirements Engineering Handbook (Hardcover, Illustrated Ed)
Ralph R. Young
R2,111 Discovery Miles 21 110 Ships in 18 - 22 working days

A concise and thorough handbook on requirements analysis, this book is a desk guide for your systems or software development work. It enables you to identify the real customer requirements for your projects and control changes and additions to these requirements. The book helps you understand the importance of requirements, leverage effective requirements practices, and better utilize resources. You also learn how to strengthen interpersonal relationships and communications, which are major contributors to project effectiveness. Moreover, this reference identifies and describes the roles, desired skills and characteristics of the effective requirements analyst, and includes examples and checklists to help you implement best practices. It goes on to describe what comprises an integrated quality approach on a project or in an organization and explains how to achieve it. The book concludes with a vision for the field of requirements engineering and provides case studies that draw on actual experience.

Evolution of Cyber Technologies and Operations to 2035 (Hardcover, 1st ed. 2015): Misty Blowers Evolution of Cyber Technologies and Operations to 2035 (Hardcover, 1st ed. 2015)
Misty Blowers
R2,738 R2,212 Discovery Miles 22 120 Save R526 (19%) Ships in 10 - 15 working days

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare. Written by leading experts in the field, chapters explore how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure. The future of social media, autonomy, stateless finance, quantum information systems, the internet of things, the dark web, space satellite operations, and global network connectivity is explored along with the transformation of the legal and ethical considerations which surround them. The international challenges of cyber alliances, capabilities, and interoperability is challenged with the growing need for new laws, international oversight, and regulation which informs cybersecurity studies. The authors have a multi-disciplinary scope arranged in a big-picture framework, allowing both deep exploration of important topics and high level understanding of the topic. Evolution of Cyber Technologies and Operations to 2035 is as an excellent reference for professionals and researchers working in the security field, or as government and military workers, economics, law and more. Students will also find this book useful as a reference guide or secondary text book.

Python for Beginners - Learn It as Easy as Pie (Hardcover): Yatin Bayya Python for Beginners - Learn It as Easy as Pie (Hardcover)
Yatin Bayya
R524 Discovery Miles 5 240 Ships in 10 - 15 working days
Real-Time Visual Effects for Game Programming (Hardcover, 2015 ed.): Chang-Hun Kim, Sun-Jeong Kim, SooKyun Kim, Shin-Jin Kang Real-Time Visual Effects for Game Programming (Hardcover, 2015 ed.)
Chang-Hun Kim, Sun-Jeong Kim, SooKyun Kim, Shin-Jin Kang
R4,138 R3,337 Discovery Miles 33 370 Save R801 (19%) Ships in 10 - 15 working days

This book introduces the latest visual effects (VFX) techniques that can be applied to game programming. The usefulness of the physicality-based VFX techniques, such as water, fire, smoke, and wind, has been proven through active involvement and utilization in movies and images. However, they have yet to be extensively applied in the game industry, due to the high technical barriers. Readers of this book can learn not only the theories about the latest VFX techniques, but also the methodology of game programming, step by step. The practical VFX processing techniques introduced in this book will provide very helpful information to game programmers. Due to the lack of instructional books about VFX-related game programming, the demand for knowledge regarding these high-tech VFXs might be very high.

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018): Muhammad... Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018)
Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

Unit Testing In Java - How Tests Drive The Code (Paperback): Johannes Link Unit Testing In Java - How Tests Drive The Code (Paperback)
Johannes Link; Contributions by Peter Froehlich
R1,813 Discovery Miles 18 130 Ships in 18 - 22 working days

Software testing is indispensable and is one of the most discussed topics in software development today. Many companies address this issue by assigning a dedicated software testing phase towards the end of their development cycle. However, quality cannot be tested into a buggy application. Early and continuous unit testing has been shown to be crucial for high quality software and low defect rates. Yet current books on testing ignore the developer's point of view and give little guidance on how to bring the overwhelming amount of testing theory into practice. Unit Testing in Java represents a practical introduction to unit testing for software developers. It introduces the basic test-first approach and then discusses a large number of special issues and problem cases. The book instructs developers through each step and motivates them to explore further.
*Shows how the discovery and avoidance of software errors is a demanding and creative activity in its own right and can build confidence early in a project.
*Demonstrates how automated tests can detect the unwanted effects of small changes in code within the entire system.
*Discusses how testing works with persistency, concurrency, distribution, and web applications.
*Includes a discussion of testing with C++ and Smalltalk.

An Introduction to XML and Web Technologies (Paperback): Anders Moller, Michael Schwartzbach An Introduction to XML and Web Technologies (Paperback)
Anders Moller, Michael Schwartzbach
R2,562 Discovery Miles 25 620 Ships in 10 - 15 working days

This thoroughly class tested text and online tutorial gives a complete introduction to the essentials of the XML standard. It will teach students how to apply web technologies to develop XML based web applications. Through the book, the student will build applications that work together to construct interesting and workable web applications.

A Practical Introduction to Fuzzy Logic using LISP (Hardcover, 1st ed. 2015): Luis Arguelles Mendez A Practical Introduction to Fuzzy Logic using LISP (Hardcover, 1st ed. 2015)
Luis Arguelles Mendez
R4,297 R3,496 Discovery Miles 34 960 Save R801 (19%) Ships in 10 - 15 working days

This book makes use of the LISP programming language to provide readers with the necessary background to understand and use fuzzy logic to solve simple to medium-complexity real-world problems. It introduces the basics of LISP required to use a Fuzzy LISP programming toolbox, which was specifically implemented by the author to "teach" the theory behind fuzzy logic and at the same time equip readers to use their newly-acquired knowledge to build fuzzy models of increasing complexity. The book fills an important gap in the literature, providing readers with a practice-oriented reference guide to fuzzy logic that offers more complexity than popular books yet is more accessible than other mathematical treatises on the topic. As such, students in first-year university courses with a basic tertiary mathematical background and no previous experience with programming should be able to easily follow the content. The book is intended for students and professionals in the fields of computer science and engineering, as well as disciplines including astronomy, biology, medicine and earth sciences. Software developers may also benefit from this book, which is intended as both an introductory textbook and self-study reference guide to fuzzy logic and its applications. The complete set of functions that make up the Fuzzy LISP programming toolbox can be downloaded from a companion book's website.

Evolving Software Systems (Hardcover, 2014 ed.): Tom Mens, Alexander Serebrenik, Anthony Cleve Evolving Software Systems (Hardcover, 2014 ed.)
Tom Mens, Alexander Serebrenik, Anthony Cleve
R3,539 Discovery Miles 35 390 Ships in 10 - 15 working days

During the last few years, software evolution research has explored new domains such as the study of socio-technical aspects and collaboration between different individuals contributing to a software system, the use of search-based techniques and meta-heuristics, the mining of unstructured software repositories, the evolution of software requirements, and the dynamic adaptation of software systems at runtime. Also more and more attention is being paid to the evolution of collections of inter-related and inter-dependent software projects, be it in the form of web systems, software product families, software ecosystems or systems of systems.

With this book, the editors present insightful contributions on these and other domains currently being intensively explored, written by renowned researchers in the respective fields of software evolution. Each chapter presents the state of the art in a particular topic, as well as the current research, available tool support and remaining challenges. The book is complemented by a glossary of important terms used in the community, a reference list of nearly 1,000 papers and books and tips on additional resources that may be useful to the reader (reference books, journals, standards and major scientific events in the domain of software evolution and datasets).This book is intended for all those interested in software engineering, and more particularly, software maintenance and evolution. Researchers and software practitioners alike will find in the contributed chapters an overview of the most recent findings, covering a broad spectrum of software evolution topics. In addition, it can also serve as the basis of graduate or postgraduate courses on e.g., software evolution, requirements engineering, model-driven software development or social informatics.

Data Privacy Games (Hardcover, 1st ed. 2018): Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren Data Privacy Games (Hardcover, 1st ed. 2018)
Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.

101 Ready To Use Microsoft Excel Macros (Hardcover): John Michaloudis, Bryan Hong 101 Ready To Use Microsoft Excel Macros (Hardcover)
John Michaloudis, Bryan Hong
R936 Discovery Miles 9 360 Ships in 10 - 15 working days
Applications of Sliding Mode Control (Hardcover, 1st ed. 2017): Nabil Derbel, Jawhar Ghommam, Quanmin Zhu Applications of Sliding Mode Control (Hardcover, 1st ed. 2017)
Nabil Derbel, Jawhar Ghommam, Quanmin Zhu
R4,769 Discovery Miles 47 690 Ships in 10 - 15 working days

This book presents essential studies and applications in the context of sliding mode control, highlighting the latest findings from interdisciplinary theoretical studies, ranging from computational algorithm development to representative applications. Readers will learn how to easily tailor the techniques to accommodate their ad hoc applications. To make the content as accessible as possible, the book employs a clear route in each paper, moving from background to motivation, to quantitative development (equations), and lastly to case studies/illustrations/tutorials (simulations, experiences, curves, tables, etc.). Though primarily intended for graduate students, professors and researchers from related fields, the book will also benefit engineers and scientists from industry.

UC/OS-III - The Real-Time Kernel and the Renesas SH7216 (Hardcover): Jean J. Labrosse UC/OS-III - The Real-Time Kernel and the Renesas SH7216 (Hardcover)
Jean J. Labrosse
R1,810 Discovery Miles 18 100 Ships in 10 - 15 working days
Code Happy (Paperback): Dayle Rees Code Happy (Paperback)
Dayle Rees
R817 Discovery Miles 8 170 Ships in 10 - 15 working days

Application development with the Laravel PHP Framework for beginners. http://laravel.com This is a self published title written by one of the Laravel Core Team developers. The original ebook sold over 700 copies within four months. The title is a guide to many of the core features of the Laravel framework, along with a tutorial explaining how to create a simple blog from the ground up. The book is printed in A4 with nicely sized type and clear code samples, along with a perfect bound full colour cover.

UC/OS-III - The Real-Time Kernel and the Freescale Kinetis ARM Cortex-M4 (Hardcover): Jean J. Labrosse, Juan P. Benavides, Jose... UC/OS-III - The Real-Time Kernel and the Freescale Kinetis ARM Cortex-M4 (Hardcover)
Jean J. Labrosse, Juan P. Benavides, Jose Ferna Ndez-Villasen or
R2,203 Discovery Miles 22 030 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Emerging Technologies of Augmented…
Michael Haller, Mark Billinghurst, … Hardcover R2,648 Discovery Miles 26 480
The History of .Net Web Development and…
Iris Classon Hardcover R485 Discovery Miles 4 850
DelphiMVCFramework - the official guide…
Daniele Teti Hardcover R1,363 Discovery Miles 13 630
Handbook of Research on Architectural…
Ramanathan Hardcover R7,726 Discovery Miles 77 260
The Definitive Guide to Stellent Content…
Brian Huff Hardcover R1,520 Discovery Miles 15 200
Java - Java Programming for beginners…
Adam Dodson Hardcover R549 R503 Discovery Miles 5 030
Ruby Programming For Beginners - The…
Tim Warren Hardcover R557 R511 Discovery Miles 5 110
Web Services - Concepts, Methodologies…
Information Reso Management Association Hardcover R8,957 Discovery Miles 89 570
Kanban - How to Visualize Work and…
Greg Caldwell Hardcover R607 R546 Discovery Miles 5 460
Test-Driving JavaScript Applications
Venkat Subramaniam Paperback R873 R780 Discovery Miles 7 800

 

Partners