0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (57)
  • R250 - R500 (365)
  • R500+ (14,538)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Design Solutions for Improving Website Quality and Effectiveness (Hardcover): G Sreedhar Design Solutions for Improving Website Quality and Effectiveness (Hardcover)
G Sreedhar
R5,576 Discovery Miles 55 760 Ships in 18 - 22 working days

As the Internet has evolved to become an integral part of modern society, the need for better quality assurance practices in web engineering has heightened. Adherence to and improvement of current standards ensures that overall web usability and accessibility are at optimum efficiency. Design Solutions for Improving Website Quality and Effectiveness is an authoritative reference source for the latest breakthroughs, techniques, and research-based solutions for the overall improvement of the web designing process. Featuring relevant coverage on the analytics, metrics, usage, and security aspects of web environments, this publication is ideally designed for reference use by engineers, researchers, graduate students, and web designers interested in the enhancement of various types of websites.

Kaizen - How to Apply Lean Kaizen to Your Startup Business and Management to Improve Productivity, Communication, and... Kaizen - How to Apply Lean Kaizen to Your Startup Business and Management to Improve Productivity, Communication, and Performance (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal) (Hardcover)
Greg Caldwell
R582 R526 Discovery Miles 5 260 Save R56 (10%) Ships in 18 - 22 working days
Data Cleaning (Hardcover): Ihab F. Ilyas, Xu Chu Data Cleaning (Hardcover)
Ihab F. Ilyas, Xu Chu
R2,244 Discovery Miles 22 440 Ships in 18 - 22 working days

This is an overview of the end-to-end data cleaning process. Data quality is one of the most important problems in data management, since dirty data often leads to inaccurate data analytics results and incorrect business decisions. Poor data across businesses and the U.S. government are reported to cost trillions of dollars a year. Multiple surveys show that dirty data is the most common barrier faced by data scientists. Not surprisingly, developing effective and efficient data cleaning solutions is challenging and is rife with deep theoretical and engineering problems. This book is about data cleaning, which is used to refer to all kinds of tasks and activities to detect and repair errors in the data. Rather than focus on a particular data cleaning task, this book describes various error detection and repair methods, and attempts to anchor these proposals with multiple taxonomies and views. Specifically, it covers four of the most common and important data cleaning tasks, namely, outlier detection, data transformation, error repair (including imputing missing values), and data deduplication. Furthermore, due to the increasing popularity and applicability of machine learning techniques, it includes a chapter that specifically explores how machine learning techniques are used for data cleaning, and how data cleaning is used to improve machine learning models. This book is intended to serve as a useful reference for researchers and practitioners who are interested in the area of data quality and data cleaning. It can also be used as a textbook for a graduate course. Although we aim at covering state-of-the-art algorithms and techniques, we recognize that data cleaning is still an active field of research and therefore provide future directions of research whenever appropriate.

S5000F, International specification for in-service data feedback, Issue 3.0 (Part 2/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 2/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,042 Discovery Miles 10 420 Ships in 18 - 22 working days
OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,278 Discovery Miles 12 780 Ships in 10 - 15 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

Contemporary Perspectives in Data Mining Volume 4 (Hardcover): Kenneth D. Lawrence, Ronald K. Klimberg Contemporary Perspectives in Data Mining Volume 4 (Hardcover)
Kenneth D. Lawrence, Ronald K. Klimberg
R2,544 Discovery Miles 25 440 Ships in 18 - 22 working days
Design, Performance, and Analysis of Innovative Information Retrieval (Hardcover): Joan Lu Design, Performance, and Analysis of Innovative Information Retrieval (Hardcover)
Joan Lu
R5,005 Discovery Miles 50 050 Ships in 18 - 22 working days

Daily procedures such as scientific experiments and business processes have the potential to create a huge amount of data every day, hour, or even second, and this may lead to a major problem for the future of efficient data search and retrieval as well as secure data storage for the world's scientists, engineers, doctors, librarians, and business managers.Design, Performance, and Analysis of Innovative Information Retrieval examines a number of emerging technologies that significantly contribute to modern Information Retrieval (IR), as well as fundamental IR theories and concepts that have been adopted into new tools or systems. This reference is essential to researchers, educators, professionals, and students interested in the future of IR.

Handbook of Research on Innovative Database Query Processing Techniques (Hardcover): Li Yan Handbook of Research on Innovative Database Query Processing Techniques (Hardcover)
Li Yan
R8,236 Discovery Miles 82 360 Ships in 18 - 22 working days

Research and development surrounding the use of data queries is receiving increased attention from computer scientists and data specialists alike. Through the use of query technology, large volumes of data in databases can be retrieved, and information systems built based on databases can support problem solving and decision making across industries. The Handbook of Research on Innovative Database Query Processing Techniques focuses on the growing topic of database query processing methods, technologies, and applications. Aimed at providing an all-inclusive reference source of technologies and practices in advanced database query systems, this book investigates various techniques, including database and XML queries, spatiotemporal data queries, big data queries, metadata queries, and applications of database query systems. This comprehensive handbook is a necessary resource for students, IT professionals, data analysts, and academicians interested in uncovering the latest methods for using queries as a means to extract information from databases. This all-inclusive handbook includes the latest research on topics pertaining to information retrieval, data extraction, data management, design and development of database queries, and database and XM queries.

The Best Damn Cybercrime and Digital Forensics Book Period (Paperback): Jack Wiles, Anthony Reyes The Best Damn Cybercrime and Digital Forensics Book Period (Paperback)
Jack Wiles, Anthony Reyes
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery
* Appeals to law enforcement agencies with limited budgets

Big Data Analytics for Sustainable Computing (Hardcover): Anandakumar Haldorai, Arulmurugan Ramu Big Data Analytics for Sustainable Computing (Hardcover)
Anandakumar Haldorai, Arulmurugan Ramu
R6,696 Discovery Miles 66 960 Ships in 18 - 22 working days

Big data consists of data sets that are too large and complex for traditional data processing and data management applications. Therefore, to obtain the valuable information within the data, one must use a variety of innovative analytical methods, such as web analytics, machine learning, and network analytics. As the study of big data becomes more popular, there is an urgent demand for studies on high-level computational intelligence and computing services for analyzing this significant area of information science. Big Data Analytics for Sustainable Computing is a collection of innovative research that focuses on new computing and system development issues in emerging sustainable applications. Featuring coverage on a wide range of topics such as data filtering, knowledge engineering, and cognitive analytics, this publication is ideally designed for data scientists, IT specialists, computer science practitioners, computer engineers, academicians, professionals, and students seeking current research on emerging analytical techniques and data processing software.

InfoSecurity 2008 Threat Analysis (Paperback): Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg InfoSecurity 2008 Threat Analysis (Paperback)
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg; Contributions by Paul Schooping
R1,146 Discovery Miles 11 460 Ships in 10 - 15 working days

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Data Mining Trends and Applications in Criminal Science and Investigations (Hardcover): Omowunmi E. Isafiade, Antoine B. Bagula Data Mining Trends and Applications in Criminal Science and Investigations (Hardcover)
Omowunmi E. Isafiade, Antoine B. Bagula
R5,267 Discovery Miles 52 670 Ships in 18 - 22 working days

The field of data mining is receiving significant attention in today's information-rich society, where data is available from different sources and formats, in large volumes, and no longer constitutes a bottleneck for knowledge acquisition. This rich information has paved the way for novel areas of research, particularly in the crime data analysis realm. Data Mining Trends and Applications in Criminal Science and Investigations presents scientific concepts and frameworks of data mining and analytics implementation and uses across various domains, such as public safety, criminal investigations, intrusion detection, crime scene analysis, and suspect modeling. Exploring the diverse ways that data is revolutionizing the field of criminal science, this publication meets the research needs of law enforcement professionals, data analysts, investigators, researchers, and graduate-level students.

Lean Enterprise - The Essential Step-by-Step Guide to Building a Lean Business with Six Sigma, Kanban, and 5S Methodologies... Lean Enterprise - The Essential Step-by-Step Guide to Building a Lean Business with Six Sigma, Kanban, and 5S Methodologies (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal) (Hardcover)
Greg Caldwell
R606 R545 Discovery Miles 5 450 Save R61 (10%) Ships in 18 - 22 working days
Codes and Ciphers - A History Of Cryptography (Hardcover): Alexander d'Agapeyeff Codes and Ciphers - A History Of Cryptography (Hardcover)
Alexander d'Agapeyeff
R952 Discovery Miles 9 520 Ships in 10 - 15 working days

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography

Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New): Hamid R. Nemati,... Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New)
Hamid R. Nemati, Yang Li
R4,605 Discovery Miles 46 050 Ships in 18 - 22 working days

In today s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Information Security Management-Global Challenges In The New Millennium (Paperback): Gurpreet Dhillon Information Security Management-Global Challenges In The New Millennium (Paperback)
Gurpreet Dhillon
R1,854 Discovery Miles 18 540 Ships in 18 - 22 working days

Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

Smart Cities in Application - Healthcare, Policy, and Innovation (Hardcover, 1st ed. 2020): Stan McClellan Smart Cities in Application - Healthcare, Policy, and Innovation (Hardcover, 1st ed. 2020)
Stan McClellan
R2,202 Discovery Miles 22 020 Ships in 18 - 22 working days

This book explores categories of applications and driving factors surrounding the Smart City phenomenon. The contributing authors provide perspective on the Smart Cities, covering numerous applications and classes of applications. The book uses a top-down exploration of the driving factors in Smart Cities, by including focal areas including "Smart Healthcare," "Public Safety & Policy Issues," and "Science, Technology, & Innovation." Contributors have direct and substantive experience with important aspects of Smart Cities and discuss issues with technologies & standards, roadblocks to implementation, innovations that create new opportunities, and other factors relevant to emerging Smart City infrastructures. Features an exploration of Smart City issues and solutions from a variety of stakeholders in the evolving field Presents conversational, nuanced, and forward thinking perspectives on Smart Cities, their implications, limitations, obstacles, and opportunities Includes contributions from industry insiders who have direct, relevant experience with their respective subjects as well as positioning and corporate stature

How to Cheat at Windows System Administration Using Command Line Scripts (Paperback): Pawan K. Bhardwaj How to Cheat at Windows System Administration Using Command Line Scripts (Paperback)
Pawan K. Bhardwaj
R941 Discovery Miles 9 410 Ships in 10 - 15 working days

How to Cheat at Windows Systems Administrators using Command line scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts.
With every new version of Windows, Microsoft is trying to ease the administration jobs by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these wizards are interactive and make the administrator s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks. These wizards are time consuming and, at times, may seem a bit confusing. The purpose of the book is to teach administrators how to use command-line scripts to complete everyday administration jobs, solve recurring network problems and at the same time improve their efficiency.
*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently.
*No direct competition for a core tool for Windows administrators.
*Builds on success of other books in the series including How to Cheat at Managing Windows Small Business Server 2003 and How to Cheat at Managing Microsoft Operations Manager 2005."

Online Instruments, Data Collection, and Electronic Measurements - Organizational Advancements (Hardcover): Mihai C. Bocarnea,... Online Instruments, Data Collection, and Electronic Measurements - Organizational Advancements (Hardcover)
Mihai C. Bocarnea, Rodney A. Reynolds, Jason D. Baker
R4,497 Discovery Miles 44 970 Ships in 18 - 22 working days

One of the infinite rewards to continuously advancing technology is an increased ease and precision in organizational techniques. Online data collection and online instruments are vital ways to electronically measure and assess organizational areas relevant to management, leadership, and human research development.Online Instruments, Data Collection, and Electronic Measurements: Organizational Advancements aims to assist researchers in both understanding and utilizing online data collection by providing methodological knowledge related to online research, and by presenting information about the empirical quality, the availability, and the location of specific online instruments. This book provides a strong focus on organizational leadership instruments while combining them with practical and ethical issues associated with online data collection. Such a combination makes this a unique contribution to the field.

Data Science Applications using Python and R - Text Analytics (Hardcover): Jeffrey Strickland Data Science Applications using Python and R - Text Analytics (Hardcover)
Jeffrey Strickland
R1,358 Discovery Miles 13 580 Ships in 18 - 22 working days
Enterprise Systems and Technological Convergence - Research and Practice (Hardcover): Sam Goundar Enterprise Systems and Technological Convergence - Research and Practice (Hardcover)
Sam Goundar
R2,889 Discovery Miles 28 890 Ships in 18 - 22 working days

Enterprise Systems have been used for many years to integrate technology with the management of an organization but rapid technological disruptions are now creating new challenges and opportunities that require urgent consideration. This book reappraises the implementation and management of Enterprise Systems in the digital age and investigates the vital link between business processes, information technology and the Internet for an organization's competitive advantage and success. This book primarily focuses on the implementation, operation, management and integration of Enterprise Systems with fastemerging disruptive technologies such as blockchains, big data, cryptocurrencies, artificial intelligence, cloud computing, data mining and data analytics. These disruptive technologies are now becoming mainstream and the book proposes several innovations that organizations need to adopt to remain competitive within this rapidly changing landscape. In addition, it examines Enterprise Systems, their components, architecture, and applications and enlightens readers on the benefits and shortcomings of implementing them. This book contains primary research on organizations, case studies, and benchmarks ERP implementation against international best practice.

Nouns Almanac - Every Day a new Noun is born (Hardcover): Mint Face Nouns Almanac - Every Day a new Noun is born (Hardcover)
Mint Face
R2,750 R2,201 Discovery Miles 22 010 Save R549 (20%) Ships in 18 - 22 working days
Nature-Inspired Algorithms for Big Data Frameworks (Hardcover): Hema Banati, Shikha Mehta, Parmeet Kaur Nature-Inspired Algorithms for Big Data Frameworks (Hardcover)
Hema Banati, Shikha Mehta, Parmeet Kaur
R5,642 Discovery Miles 56 420 Ships in 18 - 22 working days

As technology continues to become more sophisticated, mimicking natural processes and phenomena becomes more of a reality. Continued research in the field of natural computing enables an understanding of the world around us, in addition to opportunities for manmade computing to mirror the natural processes and systems that have existed for centuries. Nature-Inspired Algorithms for Big Data Frameworks is a collection of innovative research on the methods and applications of extracting meaningful information from data using algorithms that are capable of handling the constraints of processing time, memory usage, and the dynamic and unstructured nature of data. Highlighting a range of topics including genetic algorithms, data classification, and wireless sensor networks, this book is ideally designed for computer engineers, software developers, IT professionals, academicians, researchers, and upper-level students seeking current research on the application of nature and biologically inspired algorithms for handling challenges posed by big data in diverse environments.

Semantic Web Technologies - Trends and Research in  Ontology-based Systems (Hardcover): J. Davies Semantic Web Technologies - Trends and Research in Ontology-based Systems (Hardcover)
J. Davies
R3,035 Discovery Miles 30 350 Ships in 18 - 22 working days

The Semantic Web combines the descriptive languages RDF (Resource Description Framework) and OWL (Web Ontology Language), with the data-centric, customizable XML (eXtensible Mark-up Language) to provide descriptions of the content of Web documents. These machine-interpretable descriptions allow more intelligent software systems to be written, automating the analysis and exploitation of web-based information.

Software agents will be able to create "automatically" new services from already published services, with potentially huge implications for models of e-Business.

"Semantic Web Technologies" provides a comprehensive overview of key semantic knowledge technologies and research. The authors explain (semi-)automatic ontology generation and metadata extraction in depth, along with ontology management and mediation. Further chapters examine how Semantic Web technology is being applied in knowledge management ("Semantic Information Access") and in the next generation of Web services.

"Semantic Web Technologies: " Provides a comprehensive exposition of the state-of-the art in Semantic Web research and key technologies. Explains the use of ontologies and metadata to achieve machine-interpretability. Describes methods for ontology learning and metadata generation. Discusses ontology management and evolution, covering ontology change detection and propagation, ontology dependency and mediation. Illustrates the theoretical concepts with three case studies on industrial applications in digital libraries, the legal sector and the telecommunication industry.

Graduate and advanced undergraduate students, academic and industrial researchers in the field will all find "Semantic WebTechnologies" an essential guide to the technologies of the Semantic Web.

Contemporary Perspectives in Data Mining, Volume 3 (Hardcover): Kenneth D. Lawrence, Ronald K. Klimberg Contemporary Perspectives in Data Mining, Volume 3 (Hardcover)
Kenneth D. Lawrence, Ronald K. Klimberg
R2,524 Discovery Miles 25 240 Ships in 18 - 22 working days

The series, Contemporary Perspectives on Data Mining, is composed of blind refereed scholarly research methods and applications of data mining. This series will be targeted both at the academic community, as well as the business practitioner. Data mining seeks to discover knowledge from vast amounts of data with the use of statistical and mathematical techniques. The knowledge is extracted from this data by examining the patterns of the data, whether they be associations of groups or things, predictions, sequential relationships between time order events or natural groups. Data mining applications are in finance (banking, brokerage, and insurance), marketing (customer relationships, retailing, logistics, and travel), as well as in manufacturing, health care, fraud detection, homeland security, and law enforcement.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Aging: The Paradox of Life - Why We Age
Robin Holliday Hardcover R2,653 Discovery Miles 26 530
Behavioral Neurobiology of Aging
Marie-Christine Pardon, Mark W Bondi Hardcover R5,193 Discovery Miles 51 930
The Science of Hormesis in Health and…
Suresh I.S. Rattan, Marios Kyriazi Paperback R4,003 Discovery Miles 40 030
Aging in Israel - Research, Policy and…
Sara Carmel Hardcover R4,534 Discovery Miles 45 340
Handbook of Communication and Aging…
Jon F. Nussbaum, Justine Coupland Paperback R2,644 Discovery Miles 26 440
Preventing Dementia? - Critical…
Annette Leibing, Silke Schicktanz Paperback R529 Discovery Miles 5 290
When Puberty is Precocious - Scientific…
Ora H. Pescovitz, Emily C. Walvoord Hardcover R5,260 Discovery Miles 52 600
The United Nations Madrid International…
Marvin Formosa, Mala Kapur Shankardass Paperback R1,209 Discovery Miles 12 090
Biological Aging - Methods and Protocols
Trygve O Tollefsbol Paperback R2,916 Discovery Miles 29 160
Handbook of Communication and Aging…
Jon F. Nussbaum, Justine Coupland Hardcover R6,807 Discovery Miles 68 070

 

Partners