0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (88)
  • R500+ (1,342)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Algorithmic Cryptanalysis (Hardcover): Antoine Joux Algorithmic Cryptanalysis (Hardcover)
Antoine Joux
R4,200 Discovery Miles 42 000 Ships in 12 - 19 working days

Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program. Divided into three parts, the book begins with a short introduction to cryptography and a background chapter on elementary number theory and algebra. It then moves on to algorithms, with each chapter in this section dedicated to a single topic and often illustrated with simple cryptographic applications. The final part addresses more sophisticated cryptographic applications, including LFSR-based stream ciphers and index calculus methods. Accounting for the impact of current computer architectures, this book explores the algorithmic and implementation aspects of cryptanalysis methods. It can serve as a handbook of algorithmic methods for cryptographers as well as a textbook for undergraduate and graduate courses on cryptanalysis and cryptography.

Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback,... Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback, 2007 ed.)
Juan Garay, Arjen K. Lenstra, Masahiro Mambo, Rene Peralta
R1,569 Discovery Miles 15 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007.

The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases.

Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.)
Alessandro Aldini, Roberto Gorrieri
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

overviewofthebestindustrialpracticesinITsecurityanalysis.Inparticular, the paperpresentsrecentresearchresultsinthe areaofformalfoundations andpow- erfultoolsforsecurityanalysis.ThecontributionbyUlfarErlingssonoutlinesthe general issues of low-level software security. Concrete details of low-level attacks anddefensesaregiveninthe caseof CandC++softwarecompiledinto machine code. Fabio Martinelli and Paolo Mori describe a solution to improve the Java native security support. Two examples of the application of the proposed so- tion, with history-based monitoring of the application behavior, are given in the case of grid computing and mobile devices. The purpose of the chapter by Javier Lopez, Cristina Alcaraz, and Rodrigo Roman is to review and discuss critical information infrastructures, and show how to protect their functionalities and performance against attacks. As an example, the chapter also discusses the role of wireless sensor networks technology in the protection of these infrastructures. The paper by Liqun Chen is a survey in the area of asymmetric key cryp- graphic methodologies for identity-based cryptography. Audun Josang gives an overviewofthebackground, currentstatus, andfuturetrendoftrustandrepu- tionsystems.Inthefollowingchapter, MarcinCzenko, SandroEtalle, DongyiLi, and William H. Winsborough present the trust management approach to access controlindistributed systems.Inparticular, they focus onthe RT family ofro- based trust management languages. Chris Mitchell and Eimear Gallery report on the trusted computing technology for the next-generation mobile device

Fast Software Encryption - 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected... Fast Software Encryption - 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Alex Biryukov
R1,577 Discovery Miles 15 770 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Fast Software Encryption, FSE 2007, held in Luxembourg, Luxembourg in March 2007.

The 28 revised full papers presented were carefully reviewed and selected from 104 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on hash function cryptanalysis and design, stream ciphers cryptanalysis, theory, block cipher cryptanalysis, block cipher design, theory of stream ciphers, side channel attacks, as well as macs and small block ciphers.

Recent Advances in Intrusion Detection - 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007,... Recent Advances in Intrusion Detection - 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings (Paperback, 2007 ed.)
Christopher Kruegel, Richard Lippmann, Andrew Clark
R1,538 Discovery Miles 15 380 Ships in 10 - 15 working days

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. The 17 full papers were carefully reviewed. Each one represents an important contribution to the study of intrusion detection. Papers cover anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.

Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected... Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Eli Biham, Amr M. Youssef
R1,682 Discovery Miles 16 820 Ships in 10 - 15 working days

This volume constitutes the refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography. Twenty-five full papers are presented along with two important invited talks. The papers are organized into topical sections covering block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.

Beginning Information Cards and CardSpace - From Novice to Professional (Paperback, 1st ed.): Marc Mercuri Beginning Information Cards and CardSpace - From Novice to Professional (Paperback, 1st ed.)
Marc Mercuri
R1,043 R904 Discovery Miles 9 040 Save R139 (13%) Ships in 10 - 15 working days

If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identitya platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find "Beginning Information Cards and CardSpace: From Novice to Professional" essential to understanding and successfully implementing CardSpace solutions.

Topics range from fundamental discussion of identityincluding identity concepts, laws of identity, and the identity metasystemto comprehensive coverage of Windows CardSpace. You'll learn what CardSpace is all about, where you can and should use it, and how you would implement it. Additionally, multiple case studies showcase different scenarios where the technology is employed.Youll learn the technology from someone who's done real implementations with major customersAuthor Marc Mercurri works directly with the Windows CardSpace product groupHigh-quality demos with universal themes are applicable to your own work

Computer Security - ESORICS 2007 - 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 -... Computer Security - ESORICS 2007 - 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 - 26, 2007, Proceedings (Paperback, 2007 ed.)
Joachim Biskup
R2,976 Discovery Miles 29 760 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th European Symposium on Research in Computer Security, ESORICS 2007, held in Dresden, Germany in September 2007.

The 39 revised full papers presented were carefully reviewed and selected from 164 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.

Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Vienna, Austria, September 10-13, 2007,... Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings (Paperback, 2007 ed.)
Pascal Paillier, Ingrid Verbauwhede
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2007. The 31 revised full papers cover side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, efficient hardware, trusted computing.

Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings (Paperback, 2007 ed.)
Alfred Menezes
R2,977 Discovery Miles 29 770 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 27th Annual International Cryptology Conference, CRYPTO 2007, held in Santa Barbara, CA, USA in August 2007.

The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 186 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Detection of Intrusions and Malware, and Vulnerability Assessment - 4th International Conference, DIMVA 2007 Lucerne,... Detection of Intrusions and Malware, and Vulnerability Assessment - 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings (Paperback, 2007 ed.)
Bernhard Hammerli, Robin Sommer
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

OnbehalfoftheProgramCommittee, itisourpleasuretopresenttoyouthep- ceedings of the 4th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Each year DIMVA brings - gether internationalexperts from academia, industry andgovernmentto present and discuss novel security research. DIMVA is organized by the special interest group Security-Intrusion Detection and Response of the German Informatics Society (GI). The DIMVA 2007 Program Committee received 57 submissions from 20 d- ferentcountries. Allsubmissions werecarefullyreviewedbyProgramCommittee members and external experts according to the criteria of scienti?c novelty, - portance to the ?eld and technical quality. The ?nal selection took place at a Program Committee meeting held on March 31, 2007, at Universit a Campus Bio-Medico di Roma, Italy. Twelve full papers and two extended abstracts were selectedforpresentationatthe conferenceandpublicationin theconferencep- ceedings. The conference took place during July 12-13, 2007, at the University of Applied Sciences and Arts Lucerne (HTA Lucerne) in Switzerland. The p- gram featured both theoretical and practical research results grouped into ?ve sessions. ThekeynotespeechwasgivenbyVern Paxson, InternationalComputer Science Institute and Lawrence Berkeley National Laboratory. Another invited talk was presented by Marcelo Masera, InstitutefortheProtection and Security of the Citizen. Peter Trachsel, Deputy Head of the Federal Strategic Unit for IT in Switzerland, gave a speech during the conference dinner. The conference programfurther included a rump sessionorganizedby Sven Dietrich of Carnegie Mellon University; and it was complemented by the third instance of the Eu- pean capture-the-?ag contest CIPHER, organized by Lexi Pimenidis of RWTH Aache

Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30,... Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings (Paperback, 2007 ed.)
Pierangela Samarati, Josep L. Ferrer
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2007, held in Palma de Mallorca, Spain in June 2007.

The 21 revised full papers and 8 short papers presented were carefully reviewed and selected from 77 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.

Data and Applications Security XXI - 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo... Data and Applications Security XXI - 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings (Paperback, 2007 ed.)
Steve Barker, Gail-Joon Ahn
R1,524 Discovery Miles 15 240 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st Annual Working Conference on Data and Applications Security held in Redondo Beach, CA, USA in July 2007.

The 18 revised full papers and 2 revised short papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based security, temporal access control and usage control, as well as system security issues.

Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings (Paperback, 2007 ed.)
Moni Naor
R1,798 Discovery Miles 17 980 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007.

The 33 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Information Security Applications - 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised... Information Security Applications - 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Jae-Kwang Lee, Okyeon Yi, Moti Yung
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical sections on public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, mobile security, DRM, information hiding, ubiquitous computing security, P2P security, pre-authentication for fast handoff in wireless mesh networks including mobile APs.

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG... Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 (Paperback, 2007 ed.)
Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems, WISTP 2007, held in Heraklion, Crete, Greece in May 2007.

The 20 revised full papers are organized in topical sections on mobility, hardware and cryptography, privacy, cryptography schemes, smart cards, and small devices.

Information Security Applications - 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised... Information Security Applications - 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Kim Sehun, Moti Yung, Hyung-Woo Lee
R1,553 Discovery Miles 15 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, Wireless and Mobile Security, Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security.

Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007,... Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings (Paperback, 2007 ed.)
Salil P. Vadhan
R3,152 Discovery Miles 31 520 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers cover encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment.

Progress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Chennai, India, December 9-13,... Progress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings (Paperback, 2007 ed.)
K. Srinathan, C. Pandu Rangan, Moti Yung
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007.

The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers.

Topics in Cryptology - CT-RSA 2007 - The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February... Topics in Cryptology - CT-RSA 2007 - The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings (Paperback, 2006 ed.)
Masayuki Abe
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held in San Francisco, CA, USA in February 2007.

The 25 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on symmetric-key encryption, signatures and authentication, hash functions, digital signatures, cryptographic protocols, side-channel attacks, and efficient implementation.

Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21,... Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers (Paperback, 2006 ed.)
Levente Buttyan, Virgil Gligor, Dirk Westhoff
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2006, held in Hamburg, Germany in September 2006 in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). The papers present original research on all aspects of security and privacy in wireless ad hoc and sensor networks.

Cryptology and Network Security - 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings... Cryptology and Network Security - 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings (Paperback)
David Pointcheval, Yi Mu, Kefei Chen
R1,552 Discovery Miles 15 520 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006.

The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability.

Advances in Cryptology -- ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings (Paperback, 2006 ed.)
Xuejia Lai, Kefei Chen
R1,727 Discovery Miles 17 270 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.

Progress in Cryptology - VIETCRYPT 2006 - First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September... Progress in Cryptology - VIETCRYPT 2006 - First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers (Paperback, 2006 ed.)
Phong Q. Nguyen
R1,552 Discovery Miles 15 520 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, in September 2006.

The 24 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections on signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption.

Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006,... Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings (Paperback, 2006 ed.)
Helger Lipmaa, Moti Yung, Donghai Lin
R1,631 Discovery Miles 16 310 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Securing the Internet of Things…
Information Reso Management Association Hardcover R11,237 Discovery Miles 112 370
Coding for Kids Ages 10 and Up - Coding…
Bob Mather Hardcover R933 Discovery Miles 9 330
Visualizing Information Using SVG and…
Vladimir Geroimenko, Chaomei Chen Hardcover R4,396 Discovery Miles 43 960
Securing the Internet of Things…
Information Reso Management Association Hardcover R11,203 Discovery Miles 112 030
PHP and MySQL Manual - Simple, yet…
Simon Stobart, Mike Vassileiou Hardcover R3,372 Discovery Miles 33 720
Web Services Research for Emerging…
Hardcover R5,132 Discovery Miles 51 320
CSS For Beginners - The Best CSS Guide…
Ethan Hall Hardcover R971 R833 Discovery Miles 8 330
The API-First Transformation
Kin Lane Hardcover R1,401 Discovery Miles 14 010
Web-Based Services - Concepts…
Information Reso Management Association Hardcover R18,334 Discovery Miles 183 340
The Definitive Guide to Stellent Content…
Brian Huff Hardcover R1,643 Discovery Miles 16 430

 

Partners