0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (87)
  • R500+ (147)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Comprehensive VB .NET Debugging (Paperback, Softcover reprint of the original 1st ed.): Mark Pearce Comprehensive VB .NET Debugging (Paperback, Softcover reprint of the original 1st ed.)
Mark Pearce
R1,398 R1,178 Discovery Miles 11 780 Save R220 (16%) Ships in 10 - 15 working days

Visual Studio .NET, and more specifically, Visual Basic .NET give developers more productivity and more power to develop applications, but at the cost of a complex development environment together with a whole new set of potential bugs. This text analyses the new defect types that arise with VB .NET, and investigates the debugging of every type of VB .NET application together with many common debugging scenarios. Mark Pearce also shows developers how to use the powerful new .NET debugging tools to find bugs wherever they hide, even deep inside distributed applications.

Computer Safety, Reliability and Security - 21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13,... Computer Safety, Reliability and Security - 21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13, 2002. Proceedings (Paperback, 2002 ed.)
Stuart Anderson, Sandro Bologna, Massimo Felici
R1,658 Discovery Miles 16 580 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st International Conference on Computer Safety, Reliability and Security, SAFECOMP 2002, held in Catania, Italy in September 2002.The 27 revised papers presented together with 3 keynote presentations were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections on human-computer system dependability, human factors, security, dependability assessment, application of formal methods, reliability assessment, design for dependability, and safety assessment.

Sandworm - A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Paperback): Andy Greenberg Sandworm - A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Paperback)
Andy Greenberg
R491 R418 Discovery Miles 4 180 Save R73 (15%) Ships in 10 - 15 working days

From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it.

"Much more than a true-life techno-thriller ... a tour through a realm that is both invisible and critical to the daily lives of every person alive in the 21st century." —Los Angeles Times

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.

The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.

A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.

Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996):... Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996)
Robert Slade
R2,664 Discovery Miles 26 640 Ships in 10 - 15 working days

This book gives a thorough explanation of what computer viruses are, how they work, and how much computer users should worry about them. It is written to apply to all systems: micro, network, and mainframe and for both professional managers of computing systems and users of personal computers of all types, PCs, Macintoshes, and others. Robert Slade presents details of many of the most virulent of the known viruses and of the damage that they have done, as well as providing quidelines and recommendations to protect systems from infection. In addition, the book provides the widest possible range of reviews of the major anti-virus software packages available as well as many of the books on viruses. Contact addresses, telephone numbers, and electronic mail addresses are also given. In the event of a suspected virus infection, this book is the one that users will reach for! Included with the book is a diskette containing both four antiviral pieces of software for the PC and Macintosh and the complete virus catalog as produced by the Virus Test Centre at the University of Hamburg.

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Paperback): Mohssen Mohammed, Al-Sakib Khan... Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Paperback)
Mohssen Mohammed, Al-Sakib Khan Pathan
R1,901 Discovery Miles 19 010 Ships in 12 - 19 working days

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st... Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st ed.)
Abhijit Mohanta, Anoop Saldanha
R2,314 R1,903 Discovery Miles 19 030 Save R411 (18%) Ships in 10 - 15 working days

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. What You Will Learn Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS Who This Book Is For Security professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative

Application Security Program Handbook (Paperback): Derek Fisher Application Security Program Handbook (Paperback)
Derek Fisher
R1,092 Discovery Miles 10 920 Ships in 12 - 19 working days

Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program.Application Security Program Handbook teaches you to implement a robust program of security throughout your development process. It goes well beyond the basics, detailing a flexible approach that can adapt and evolve to new and emerging threats. Follow the expert advice in this guide and you'll reliably deliver software that is free from security defects and critical vulnerabilities. As a developer, you must build security into your software throughout its development lifecycle. This book addresses all the practices, tools, technology, people, and processes you need to reduce the risk of attacks and vulnerabilities in your software. Application Security Program Handbook is full of strategies for setting up and maturing a security program for your development process. Its realistic recommendations take a service-oriented approach to application security that's perfectly suited to the fast-pace of modern development. Focused on the realities of software development, it shows you how to avoid making security a gated exercise. Inside, you'll learn to assess the current state of your app's security, identify key risks to your organization, and measure the success of any defensive programs you deploy. You'll master common methodologies and practices that help safeguard your software, along with defensive tools you can use to keep your apps safe. With this handy reference guide by your side, you'll be able to implement reliable security in a way that doesn't impact your delivery speed. RETAIL SELLING POINTS Application security tools you can use throughout the development lifecycle Creating threat models Mitigating web app vulnerabilities Creating a DevSecOps pipeline Application security as a service model Reporting structures that highlight the value of application security Creating a software security ecosystem that benefits development AUDIENCE For software developers, architects, team leaders, and project managers looking to implement security in their pipelines.

Securing the Internet of Things (Paperback): Shancang Li, Li Da Xu Securing the Internet of Things (Paperback)
Shancang Li, Li Da Xu
R1,340 Discovery Miles 13 400 Ships in 12 - 19 working days

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Malware Analyst's Cookbook and DVD - Tools and Techniques for Fighting Malicious Code (Paperback): M Ligh Malware Analyst's Cookbook and DVD - Tools and Techniques for Fighting Malicious Code (Paperback)
M Ligh
R1,491 Discovery Miles 14 910 Ships in 12 - 19 working days

A computer forensics "how-to" for fighting malicious code and analyzing incidents

With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutionsCovers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much moreIncludes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions

"Malware Analyst's Cookbook" is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

Countdown to Zero Day - Stuxnet and the Launch of the World's First Digital Weapon (Paperback): Kim Zetter Countdown to Zero Day - Stuxnet and the Launch of the World's First Digital Weapon (Paperback)
Kim Zetter
R440 R396 Discovery Miles 3 960 Save R44 (10%) Ships in 5 - 10 working days
The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback): Patrick Wardle The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback)
Patrick Wardle
R1,163 R880 Discovery Miles 8 800 Save R283 (24%) Ships in 12 - 19 working days

Written by leading macOS threat analyst Patrick Wardle, The Art of Mac Malware Analysis covers the knowledge and hands-on skills required to analyze Mac malware. Using real-world examples and references to original research, Part 1 surveys the malware's various infection methods, persistence mechanisms, and capabilities. In Part 2, you'll learn about the static and dynamic analysis tools and techniques needed to examine malware you may find in the wild. Finally, you'll put these lessons into practice by walking through a comprehensive analysis of a complex Mac malware specimen (Part 3).

A Pathology of Computer Viruses (Paperback, Edition. ed.): David Ferbrache A Pathology of Computer Viruses (Paperback, Edition. ed.)
David Ferbrache
R2,055 R1,315 Discovery Miles 13 150 Save R740 (36%) Ships in 12 - 19 working days

The 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS, Mac, UNIX and DEC operating systems. David Ferbrache considers the possible extension of the threat to the mainframe systems environment and suggests how the threat can be effectively combatted using an antiviral management plan. The author addresses the latest developments in "stealth" virus operations, specifically the trend for virus authors to adopt extensive camouflage and concealment techniques, which allow viruses to evade both existing anti-viral software and to avoid detection by direct observation of machine behaviour. A Pathology of Computer Viruses addresses a distinct need - that of the computer specialist and professional who needs a source reference work detailing all aspects of the computer virus threat.

Computer Viruses for Dummies (Paperback, New): Ph Gregory Computer Viruses for Dummies (Paperback, New)
Ph Gregory
R312 R271 Discovery Miles 2 710 Save R41 (13%) Ships in 12 - 19 working days

Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect your computer. "Computer Viruses For Dummies" helps you: Understand the risks and analyze your PC's current conditionSelect, install, and configure antivirus softwareScan your computer and e-mailRid your computer of viruses it's already caughtUpdate antivirus software and install security patchesUse firewalls and spyware blockersProtect handheld PDAs from virusesAdopt safe computing practices, especially with e-mail and when you're surfing the Net

Written by Peter H. Gregory, coauthor of "CISSP For Dummies" and "Security + For Dummies," "Computer Viruses For Dummies" goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.

Remember, if you don't protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.

Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to... Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity (Paperback)
Alan Grid
R933 R817 Discovery Miles 8 170 Save R116 (12%) Ships in 10 - 15 working days
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian,... Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian, Spain, July 7-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Juan Caballero, Urko Zurutuza, Ricardo J. Rodriguez
R2,778 Discovery Miles 27 780 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Computer Hacking - A beginners guide to computer hacking, how to hack, internet skills, hacking techniques, and more!... Computer Hacking - A beginners guide to computer hacking, how to hack, internet skills, hacking techniques, and more! (Paperback)
Joe Benton
R338 R307 Discovery Miles 3 070 Save R31 (9%) Ships in 10 - 15 working days
Bulletproofing TCP/IP-based Windows NT/2000 Networks (Paperback): G. Held Bulletproofing TCP/IP-based Windows NT/2000 Networks (Paperback)
G. Held
R3,250 Discovery Miles 32 500 Ships in 12 - 19 working days

Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure.
Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.

  • Covers how TCP/IP operates and how TCP/IP attacks occur.
  • Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000 host on such networks against different attack methods.
  • Describes a new attack method, 'script-form attack', which could cause a company financial problems, and its prevention.
  • Uses practical real-world examples of methods used to block potential attacks.
Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.

Ransomware (Paperback): Allan Liska, Timothy Gallo Ransomware (Paperback)
Allan Liska, Timothy Gallo
R1,075 R725 Discovery Miles 7 250 Save R350 (33%) Ships in 12 - 19 working days

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers

Mr. Robot and Philosophy - Beyond Good and Evil Corp (Paperback): Richard Greene, Rachel Robison-Greene Mr. Robot and Philosophy - Beyond Good and Evil Corp (Paperback)
Richard Greene, Rachel Robison-Greene
R659 R592 Discovery Miles 5 920 Save R67 (10%) Ships in 10 - 15 working days

Mr. Robot has been hailed, not only as one of the most haunting and unnerving dramas ever to appear on television, but also as the first accurate popular presentation of how computer hacking and cyberterrorism actually work. Mr. Robot and Philosophy is aimed at thoughtful fans of this addictive show who will welcome the opportunity to explore Elliot Alderson's world from a philosophical perspective. The developing story of Mr. Robot constantly raises ethical and metaphysical issues. What happens to our personal identity when it's extended into cyberspace and an array of electronic devices? Are we in control of our online lives or are we being controlled? What does our right to privacy mean in a world where millions of people can observe what we're doing and saying? Is a virtual currency true money and could it replace traditional money? Can there be healthy forms of drug addiction? Can some types of so-called mental illness be useful and beneficial? Does it make any sense to unleash destruction upon the existing corporate economic structures, and can we expect something better to emerge from the ruins of a digital meltdown?

Scam! - How to Avoid the Scams That Cost Victims Billions of Dollars Every Year (Large Print) (Large print, Paperback, Large... Scam! - How to Avoid the Scams That Cost Victims Billions of Dollars Every Year (Large Print) (Large print, Paperback, Large type / large print edition)
Hope Oje
R669 R612 Discovery Miles 6 120 Save R57 (9%) Ships in 10 - 15 working days
Malicious Mobile Code - Virus Protection for Windows (Paperback, 1st ed): Roger A. Grimes Malicious Mobile Code - Virus Protection for Windows (Paperback, 1st ed)
Roger A. Grimes
R1,096 R837 Discovery Miles 8 370 Save R259 (24%) Ships in 12 - 19 working days

"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.

Modern Cybersecurity Strategies for Enterprises - Protect and Secure Your Enterprise Networks, Digital Business Assets, and... Modern Cybersecurity Strategies for Enterprises - Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods (English Edition) (Paperback)
Ashish Mishra
R1,165 Discovery Miles 11 650 Ships in 10 - 15 working days
Deadly Odds 5.0 (Paperback): Allen Wyler Deadly Odds 5.0 (Paperback)
Allen Wyler
R533 Discovery Miles 5 330 Ships in 10 - 15 working days
7 Rules To Become Exceptional At Cyber Security - A Practical, Real-world Perspective For Cyber Security Leaders and... 7 Rules To Become Exceptional At Cyber Security - A Practical, Real-world Perspective For Cyber Security Leaders and Professionals (Paperback)
Chirag D Joshi
R499 Discovery Miles 4 990 Ships in 10 - 15 working days
Cyber-Risk Management (Paperback, 1st ed. 2015): Atle Refsdal, Bjornar Solhaug, Ketil Stolen Cyber-Risk Management (Paperback, 1st ed. 2015)
Atle Refsdal, Bjornar Solhaug, Ketil Stolen
R2,666 Discovery Miles 26 660 Ships in 10 - 15 working days

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, … Paperback  (1)
R360 R337 Discovery Miles 3 370
Introduction to Stochastic Finance with…
Nicolas Privault Hardcover R3,072 Discovery Miles 30 720
Transportation, Logistics, and Supply…
Jalel Euchi Hardcover R5,504 Discovery Miles 55 040
Multibody Dynamics - Computational…
Zdravko Terze Hardcover R2,933 Discovery Miles 29 330
Problems of Locus Solved by Mechanisms…
Iulian Popescu, Xenia Calbureanu, … Hardcover R2,905 Discovery Miles 29 050
Reference for Modern Instrumentation…
R.N. Thurston, Allan D. Pierce Hardcover R4,342 Discovery Miles 43 420
Global Nonlinear Dynamics for…
Stefano Lenci, Giuseppe Rega Hardcover R4,388 Discovery Miles 43 880
Stochastic Analysis and Applications in…
Ana Isabel Cardoso, Margarida de Faria, … Hardcover R2,726 Discovery Miles 27 260
Finite and Instantaneous Screw Theory in…
Tao Sun, Shuofei Yang, … Hardcover R2,939 Discovery Miles 29 390
Selected Works
Anatolii V Skorokhod Hardcover R2,935 Discovery Miles 29 350

 

Partners