0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (15)
  • R100 - R250 (543)
  • R250 - R500 (4,913)
  • R500+ (30,894)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming

Formalizing Data-Centric Web Services (Hardcover, 1st ed. 2015): Iman Saleh Formalizing Data-Centric Web Services (Hardcover, 1st ed. 2015)
Iman Saleh
R2,688 R1,787 Discovery Miles 17 870 Save R901 (34%) Ships in 10 - 15 working days

This book presents a methodology to model and specify the data aspect of Web services, as it is overlooked by current standards for specifying Web services. The formal specification enables verification of service behavior, and the proposed methodology is based on formal methods and design-by-contract techniques. The Web has evolved from an information sharing medium to a wide-scale environment for sharing capabilities or services. Currently, URLs not only point to documents and images, but are also used to invoke services that potentially change the state of the Web. Major online organizations today, such as Amazon, PayPal and FedEx, provide services for users and consumers. They also allow third-party vendors to resell their services. In both cases, this requires precise and complete specification of service offerings. Several online discussions demonstrate the challenges faced by these organizations and others while describing their data-centric Web services. These challenges surrounding data specification can lead consumers to use a service erroneously. Case studies demonstrate how formal methods, and specifically design-by-contract techniques, can be leveraged to address the lack of formal specification of data when it comes to developing Web applications such as Amazon and PayPal.

Statistical Applications from Clinical Trials and Personalized Medicine to Finance and Business Analytics - Selected Papers... Statistical Applications from Clinical Trials and Personalized Medicine to Finance and Business Analytics - Selected Papers from the 2015 ICSA/Graybill Applied Statistics Symposium, Colorado State University, Fort Collins (Hardcover, 1st ed. 2016)
Jianchang Lin, Bushi Wang, Xiaowen Hu, Kun Chen, Ray Liu
R5,901 Discovery Miles 59 010 Ships in 18 - 22 working days

The papers in this volume represent a broad, applied swath of advanced contributions to the 2015 ICSA/Graybill Applied Statistics Symposium of the International Chinese Statistical Association, held at Colorado State University in Fort Collins. The contributions cover topics that range from statistical applications in business and finance to applications in clinical trials and biomarker analysis. Each papers was peer-reviewed by at least two referees and also by an editor. The conference was attended by over 400 participants from academia, industry, and government agencies around the world, including from North America, Asia, and Europe.

New Data Structures and Algorithms for Logic Synthesis and Verification (Hardcover, 1st ed. 2017): Luca Gaetano Amaru New Data Structures and Algorithms for Logic Synthesis and Verification (Hardcover, 1st ed. 2017)
Luca Gaetano Amaru
R3,565 R1,812 Discovery Miles 18 120 Save R1,753 (49%) Ships in 10 - 15 working days

This book introduces new logic primitives for electronic design automation tools. The author approaches fundamental EDA problems from a different, unconventional perspective, in order to demonstrate the key role of rethinking EDA solutions in overcoming technological limitations of present and future technologies. The author discusses techniques that improve the efficiency of logic representation, manipulation and optimization tasks by taking advantage of majority and biconditional logic primitives. Readers will be enabled to accelerate formal methods by studying core properties of logic circuits and developing new frameworks for logic reasoning engines.

Reduced Order Methods for Modeling and Computational Reduction (Hardcover, 2014 ed.): Alfio Quarteroni, Gianluigi Rozza Reduced Order Methods for Modeling and Computational Reduction (Hardcover, 2014 ed.)
Alfio Quarteroni, Gianluigi Rozza
R3,453 Discovery Miles 34 530 Ships in 10 - 15 working days

This monograph addresses the state of the art of reduced order methods for modeling and computational reduction of complex parametrized systems, governed by ordinary and/or partial differential equations, with a special emphasis on real time computing techniques and applications in computational mechanics, bioengineering and computer graphics.

Several topics are covered, including: design, optimization, and control theory in real-time with applications in engineering; data assimilation, geometry registration, and parameter estimation with special attention to real-time computing in biomedical engineering and computational physics; real-time visualization of physics-based simulations in computer science; the treatment of high-dimensional problems in state space, physical space, or parameter space; the interactions between different model reduction and dimensionality reduction approaches; the development of general error estimation frameworks which take into account both model and discretization effects.

This book is primarily addressed to computational scientists interested in computational reduction techniques for large scale differential problems.

What's Where in the APPLE - Enhanced Edition - Volume 2 - The Atlas & Gazetteer (Hardcover): Bill Martens, Brian Wiser,... What's Where in the APPLE - Enhanced Edition - Volume 2 - The Atlas & Gazetteer (Hardcover)
Bill Martens, Brian Wiser, William F Luebbert
R1,099 Discovery Miles 10 990 Ships in 10 - 15 working days
Call Admission Control in Mobile Cellular Networks (Hardcover, 2013 ed.): Sanchita Ghosh, Amit Konar Call Admission Control in Mobile Cellular Networks (Hardcover, 2013 ed.)
Sanchita Ghosh, Amit Konar
R2,669 Discovery Miles 26 690 Ships in 18 - 22 working days

Call Admission Control (CAC) and Dynamic Channel Assignments (DCA) are important decision-making problems in mobile cellular communication systems. Current research in mobile communication considers them as two independent problems, although the former greatly depends on the resulting free channels obtained as the outcome of the latter. This book provides a solution to the CAC problem, considering DCA as an integral part of decision-making for call admission. Further, current technical resources ignore movement issues of mobile stations and fluctuation in network load (incoming calls) in the control strategy used for call admission. In addition, the present techniques on call admission offers solution globally for the entire network, instead of considering the cells independently. CAC here has been formulated by two alternative approaches. The first approach aimed at handling the uncertainty in the CAC problem by employing fuzzy comparators. The second approach is concerned with formulation of CAC as an optimization problem to minimize call drop, satisfying a set of constraints on feasibility and availability of channels, hotness of cells, and velocity and angular displacement of mobile stations. Evolutionary techniques, including Genetic Algorithm and Biogeography Based Optimization, have been employed to solve the optimization problems. The proposed approaches outperform traditional methods with respect to grade and quality of services.

Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover): Gulshan Shrivastava, Deepak... Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover)
Gulshan Shrivastava, Deepak Gupta, Kavita Sharma
R4,522 Discovery Miles 45 220 Ships in 10 - 15 working days

This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.

A Survey on Coordinated Power Management in Multi-Tenant Data Centers (Hardcover, 1st ed. 2018): Thant Zin Oo, Nguyen H. Tran,... A Survey on Coordinated Power Management in Multi-Tenant Data Centers (Hardcover, 1st ed. 2018)
Thant Zin Oo, Nguyen H. Tran, Shaolei Ren, Choong Seon Hong
R3,281 Discovery Miles 32 810 Ships in 10 - 15 working days

This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution.

Web Services Security Development and Architecture - Theoretical and Practical Issues (Hardcover, New): Web Services Security Development and Architecture - Theoretical and Practical Issues (Hardcover, New)
R4,592 Discovery Miles 45 920 Ships in 18 - 22 working days

Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.

C++ Programming - A Step-By-Step Beginner's Guide to Learn the Fundamentals of a Multi-Paradigm Programming Language and... C++ Programming - A Step-By-Step Beginner's Guide to Learn the Fundamentals of a Multi-Paradigm Programming Language and Begin to Manage Data Including How to Work on Your First Program (Hardcover)
Alan Grid
R823 R715 Discovery Miles 7 150 Save R108 (13%) Ships in 18 - 22 working days
Embedded and Real Time System Development: A Software Engineering Perspective - Concepts, Methods and Principles (Hardcover,... Embedded and Real Time System Development: A Software Engineering Perspective - Concepts, Methods and Principles (Hardcover, 2014 ed.)
Mohammad Ayoub Khan, Saqib Saeed, Ashraf Darwish, Ajith Abraham
R3,445 Discovery Miles 34 450 Ships in 10 - 15 working days

Nowadays embedded and real-time systems contain complex software. The complexity of embedded systems is increasing, and the amount and variety of software in the embedded products are growing. This creates a big challenge for embedded and real-time software development processes and there is a need to develop separate metrics and benchmarks. "Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles" presents practical as well as conceptual knowledge of the latest tools, techniques and methodologies of embedded software engineering and real-time systems. Each chapter includes an in-depth investigation regarding the actual or potential role of software engineering tools in the context of the embedded system and real-time system. The book presents state-of-the art and future perspectives with industry experts, researchers, and academicians sharing ideas and experiences including surrounding frontier technologies, breakthroughs, innovative solutions and applications. The book is organized into four parts "Embedded Software Development Process", "Design Patterns and Development Methodology", "Modelling Framework" and "Performance Analysis, Power Management and Deployment" with altogether 12 chapters. The book is aiming at (i) undergraduate students and postgraduate students conducting research in the areas of embedded software engineering and real-time systems; (ii) researchers at universities and other institutions working in these fields; and (iii) practitioners in the R&D departments of embedded system. It can be used as an advanced reference for a course taught at the postgraduate level in embedded software engineering and real-time systems.

Virtual Worlds as Philosophical Tools - How to Philosophize with a Digital Hammer (Hardcover, 1st ed. 2015): Stefano Gualeni Virtual Worlds as Philosophical Tools - How to Philosophize with a Digital Hammer (Hardcover, 1st ed. 2015)
Stefano Gualeni
R2,934 Discovery Miles 29 340 Ships in 10 - 15 working days

Who are we in simulated worlds? Will experiencing worlds that are not 'actual' change our ways of structuring thought? Can virtual worlds open up new possibilities to philosophize? Virtual Worlds as Philosophical Tools tries to answer these questions from a perspective that combines philosophy of technology with videogame design.

Embedded Software Verification and Debugging (Hardcover, 1st ed. 2017): Djones Lettnin, Markus Winterholer Embedded Software Verification and Debugging (Hardcover, 1st ed. 2017)
Djones Lettnin, Markus Winterholer
R3,965 Discovery Miles 39 650 Ships in 10 - 15 working days

This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches.

SQL Programming The Ultimate Step-By-Step Guide to Learning SQL for Beginners (Hardcover): Bryan Johnson SQL Programming The Ultimate Step-By-Step Guide to Learning SQL for Beginners (Hardcover)
Bryan Johnson
R550 R514 Discovery Miles 5 140 Save R36 (7%) Ships in 18 - 22 working days
Concepts of Programming Languages (Hardcover): Gracie McKenzie Concepts of Programming Languages (Hardcover)
Gracie McKenzie
R3,283 R2,970 Discovery Miles 29 700 Save R313 (10%) Ships in 18 - 22 working days
Continuous Software Engineering (Hardcover, 2014 ed.): Jan Bosch Continuous Software Engineering (Hardcover, 2014 ed.)
Jan Bosch
R2,651 R1,886 Discovery Miles 18 860 Save R765 (29%) Ships in 10 - 15 working days

This book provides essential insights on the adoption of modern software engineering practices at large companies producing software-intensive systems, where hundreds or even thousands of engineers collaborate to deliver on new systems and new versions of already deployed ones. It is based on the findings collected and lessons learned at the Software Center (SC), a unique collaboration between research and industry, with Chalmers University of Technology, Gothenburg University and Malmoe University as academic partners and Ericsson, AB Volvo, Volvo Car Corporation, Saab Electronic Defense Systems, Grundfos, Axis Communications, Jeppesen (Boeing) and Sony Mobile as industrial partners. The 17 chapters present the "Stairway to Heaven" model, which represents the typical evolution path companies move through as they develop and mature their software engineering capabilities. The chapters describe theoretical frameworks, conceptual models and, most importantly, the industrial experiences gained by the partner companies in applying novel software engineering techniques. The book's structure consists of six parts. Part I describes the model in detail and presents an overview of lessons learned in the collaboration between industry and academia. Part II deals with the first step of the Stairway to Heaven, in which R&D adopts agile work practices. Part III of the book combines the next two phases, i.e., continuous integration (CI) and continuous delivery (CD), as they are closely intertwined. Part IV is concerned with the highest level, referred to as "R&D as an innovation system," while Part V addresses a topic that is separate from the Stairway to Heaven and yet critically important in large organizations: organizational performance metrics that capture data, and visualizations of the status of software assets, defects and teams. Lastly, Part VI presents the perspectives of two of the SC partner companies. The book is intended for practitioners and professionals in the software-intensive systems industry, providing concrete models, frameworks and case studies that show the specific challenges that the partner companies encountered, their approaches to overcoming them, and the results. Researchers will gain valuable insights on the problems faced by large software companies, and on how to effectively tackle them in the context of successful cooperation projects.

Blue Pelican Java (Hardcover): Charles E. Cook Blue Pelican Java (Hardcover)
Charles E. Cook
R1,139 Discovery Miles 11 390 Ships in 18 - 22 working days

"Blue Pelican Java" is a somewhat unusual high school computer science textbook. Most computer science texts will begin with a section on the history of computers followed with a flurry of definitions that are just "so many words" to the average student. The approach here is to first give the student some experience upon which to hang the definitions that come later. The usual practice of introducing classes and objects is deferred until the student has a firm grasp of the fundamentals (loops, decision structures, etc). Thus, the beginning student is not overwhelmed by the simultaneous introduction of OOPs and the fundamentals. The book includes plenty of exercises (many in "contest" form), programming projects, and a huge appendix.

Computer and Computing Technologies in Agriculture X - 10th IFIP WG 5.14 International Conference, CCTA 2016, Dongying, China,... Computer and Computing Technologies in Agriculture X - 10th IFIP WG 5.14 International Conference, CCTA 2016, Dongying, China, October 19-21, 2016, Proceedings (Hardcover, 1st ed. 2019)
Daoliang Li
R2,750 Discovery Miles 27 500 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 10th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2016, held in Dongying, China, in October 2016. The 55 revised papers presented were carefully reviewed and selected from 128 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including intelligent sensing, cloud computing, key technologies of the Internet of Things, precision agriculture, animal husbandry information technology, including Internet + modern animal husbandry, livestock big data platform and cloud computing applications, intelligent breeding equipment, precision production models, water product networking and big data , including fishery IoT, intelligent aquaculture facilities, and big data applications.

Interactive 3D Multimedia Content - Models for Creation, Management, Search and Presentation (Hardcover, 2012): Wojciech... Interactive 3D Multimedia Content - Models for Creation, Management, Search and Presentation (Hardcover, 2012)
Wojciech Cellary, Krzysztof Walczak
R2,683 Discovery Miles 26 830 Ships in 18 - 22 working days

The book describes recent research results in the areas of modelling, creation, management and presentation of interactive 3D multimedia content. The book describes the current state of the art in the field and identifies the most important research and design issues. Consecutive chapters address these issues. These are: database modelling of 3D content, security in 3D environments, describing interactivity of content, searching content, visualization of search results, modelling mixed reality content, and efficient creation of interactive 3D content. Each chapter is illustrated with example applications based on the proposed approach. The final chapter discusses some important ethical issues related to the widespread use of virtual environments in everyday life. The book provides ready to use solutions for many important problems related to the creation of interactive 3D multimedia applications and will be a primary reading for researchers and developers working in this domain.

UC/TCP-IP and the STMicroelectronics STM32F107 (Hardcover): Legare Christian UC/TCP-IP and the STMicroelectronics STM32F107 (Hardcover)
Legare Christian
R1,809 Discovery Miles 18 090 Ships in 10 - 15 working days
Analyzing the Role of Risk Mitigation and Monitoring in Software Development (Hardcover): Rohit Kumar, Anjali Tayal, Sargam... Analyzing the Role of Risk Mitigation and Monitoring in Software Development (Hardcover)
Rohit Kumar, Anjali Tayal, Sargam Kapil
R5,566 Discovery Miles 55 660 Ships in 18 - 22 working days

The biggest challenges faced by the software industry are cost control and schedule control. As such, effective strategies for process improvement must be researched and implemented. Analyzing the Role of Risk Mitigation and Monitoring in Software Development is a critical scholarly resource that explores software risk and development as organizations continue to implement more applications across multiple technologies and a multi-tiered environment. Featuring coverage on a broad range of topics such as quantitative risk assessment, threat analysis, and software vulnerability management, this book is a vital resource for engineers, academicians, professionals, and researchers seeking current research on the importance of risk management in software development.

From Research to Practice in the Design of Cooperative Systems: Results and Open Challenges - Proceedings of the 10th... From Research to Practice in the Design of Cooperative Systems: Results and Open Challenges - Proceedings of the 10th International Conference on the Design of Cooperative Systems, May 30 - 1 June, 2012 (Hardcover, 2012 ed.)
Julie Dugdale, Cedric Masclet, Maria Antonietta Grasso, Jean-Francois Boujut, Parina Hassanaly
R5,178 Discovery Miles 51 780 Ships in 18 - 22 working days

COOP 2012 is the tenth COOP conference, marking twenty years from the first conference in 1992. In this special anniversary edition we asked researchers and practitioners to reflect on what have been the successes and the failures in designing cooperative systems, and what challenges still need to be addressed. We have come a long way in understanding the intricacies of cooperation and in designing systems that support work practices and collective activities. These advances would not have been possible without the concerted effort of contributions from a plethora of domains including CSCW, HCI, Information Systems, Knowledge Engineering, Multi-agent systems, organizational and management sciences, sociology, psychology, anthropology, ergonomics, linguistics, etc. The COOP community is going from strength to strength in developing new technologies, advancing and proposing new methodological approaches, and forging theories.

Proceedings of ELM-2015 Volume 2 - Theory, Algorithms and Applications (II) (Hardcover, 1st ed. 2016): Jiuwen Cao, Kezhi Mao,... Proceedings of ELM-2015 Volume 2 - Theory, Algorithms and Applications (II) (Hardcover, 1st ed. 2016)
Jiuwen Cao, Kezhi Mao, Jonathan Wu, Amaury Lendasse
R6,550 Discovery Miles 65 500 Ships in 10 - 15 working days

This book contains some selected papers from the International Conference on Extreme Learning Machine 2015, which was held in Hangzhou, China, December 15-17, 2015. This conference brought together researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the Extreme Learning Machine (ELM) technique and brain learning. This book covers theories, algorithms ad applications of ELM. It gives readers a glance of the most recent advances of ELM.

Foundations of Multi-Paradigm Modelling for Cyber-Physical Systems (Hardcover): Paulo Carreira, Vasco Amaral, Hans Vangheluwe Foundations of Multi-Paradigm Modelling for Cyber-Physical Systems (Hardcover)
Paulo Carreira, Vasco Amaral, Hans Vangheluwe
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days
Social Networks and Surveillance for Society (Hardcover, 1st ed. 2019): Tansel Oezyer, Sambit Bakshi, Reda Alhajj Social Networks and Surveillance for Society (Hardcover, 1st ed. 2019)
Tansel Oezyer, Sambit Bakshi, Reda Alhajj
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book focuses on recent technical advancements and state-of-the art technologies for analyzing characteristic features and probabilistic modelling of complex social networks and decentralized online network architectures. Such research results in applications related to surveillance and privacy, fraud analysis, cyber forensics, propaganda campaigns, as well as for online social networks such as Facebook. The text illustrates the benefits of using advanced social network analysis methods through application case studies based on practical test results from synthetic and real-world data. This book will appeal to researchers and students working in these areas.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad Hardcover R3,940 Discovery Miles 39 400
Introduction to Computational Economics…
Hans Fehr, Fabian Kindermann Hardcover R4,258 Discovery Miles 42 580
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,173 Discovery Miles 11 730
Introducing Delphi Programming - Theory…
John Barrow, Linda Miller, … Paperback  (1)
R751 Discovery Miles 7 510
Oxford Coding and Robotics Novice Level…
Paperback R83 Discovery Miles 830
Java Programming
Joyce Farrell Paperback R1,326 R1,236 Discovery Miles 12 360
Advanced Visual Basic 6 - Power…
Matthew Curland, Gary Clarke Paperback R1,273 Discovery Miles 12 730
Clean Architecture - A Craftsman's Guide…
Robert Martin Paperback  (1)
R860 R549 Discovery Miles 5 490
Programming Logic & Design
Joyce Farrell Paperback R757 Discovery Miles 7 570
Data-Driven Modeling & Scientific…
J. Nathan Kutz Hardcover R4,183 Discovery Miles 41 830

 

Partners