0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (62)
  • R250 - R500 (379)
  • R500+ (14,681)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,278 Discovery Miles 12 780 Ships in 10 - 15 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

Design Solutions for Improving Website Quality and Effectiveness (Hardcover): G Sreedhar Design Solutions for Improving Website Quality and Effectiveness (Hardcover)
G Sreedhar
R5,576 Discovery Miles 55 760 Ships in 18 - 22 working days

As the Internet has evolved to become an integral part of modern society, the need for better quality assurance practices in web engineering has heightened. Adherence to and improvement of current standards ensures that overall web usability and accessibility are at optimum efficiency. Design Solutions for Improving Website Quality and Effectiveness is an authoritative reference source for the latest breakthroughs, techniques, and research-based solutions for the overall improvement of the web designing process. Featuring relevant coverage on the analytics, metrics, usage, and security aspects of web environments, this publication is ideally designed for reference use by engineers, researchers, graduate students, and web designers interested in the enhancement of various types of websites.

Agile Project Management - The Complete Guide for Beginners to Scrum, Agile Project Management, and Software Development (Lean... Agile Project Management - The Complete Guide for Beginners to Scrum, Agile Project Management, and Software Development (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal) (Hardcover)
Greg Caldwell
R737 R651 Discovery Miles 6 510 Save R86 (12%) Ships in 18 - 22 working days
Handbook of Data Science with Semantic Technologies (Hardcover): Archana Patel, Narayan C Debnath Handbook of Data Science with Semantic Technologies (Hardcover)
Archana Patel, Narayan C Debnath
R8,041 Discovery Miles 80 410 Ships in 10 - 15 working days

As the world has entered the era of big data, there is a need to give a semantic perspective to the data to find unseen patterns, derive meaningful information, and make intelligent decisions. This 2-volume handbook set is a unique, comprehensive, and complete presentation of the current progress and future potential explorations in the field of data science and related topics. Handbook of Data Science with Semantic Technologies provides a roadmap for a new trend and future development of data science with semantic technologies. The first volume serves as an important guide towards applications of data science with semantic technologies for the upcoming generation and thus becomes a unique resource for both academic researchers and industry professionals. The second volume provides a roadmap for the deployment of semantic technologies in the field of data science that enables users to create intelligence through these technologies by exploring the opportunities while eradicating the current and future challenges. The set explores the optimal use of these technologies to provide the maximum benefit to the user under one comprehensive source. This set consisting of two separate volumes can be utilized independently or together as an invaluable resource for students, scholars, researchers, professionals, and practitioners in the field.

The Political Economy and Feasibility of Bitcoin and Cryptocurrencies - Insights from the History of Economic Thought... The Political Economy and Feasibility of Bitcoin and Cryptocurrencies - Insights from the History of Economic Thought (Hardcover)
Spencer J. Pack
R3,339 Discovery Miles 33 390 Ships in 10 - 15 working days

In The Political Economy and Feasibility of Bitcoin and Cryptocurrencies Spencer J. Pack brings his authority as a scholar and advisor to this study of bitcoin and cryptocurrencies from the perspective of the history of economic thought. Major theorists analyzed in depth include Aristotle, Smith, Law, Marx, Keynes, Rothbard and Hayek, and the book draws extensively upon the ideas of Schumpeter, Galbraith and Sraffa. The book argues for reconceptualization of the basic microeconomic categories into rental, sale and financial asset prices along with a reconsideration of Keynes' general theory to his special theory and Rothbard's relationship to Rousseau. The author posits that intense theoretical and practical struggles will continue over who should control the quantity of money, the cause of the capitalist economy's instability, and who or what is more dangerous: concentrated centers of private wealth and private enterprises or the contemporary state. He concludes that in terms of the quality of money, the cryptocurrency community is probably correct, with new forms of money potentially being better than sovereign fiat currency. The book's relevance will appeal to members of the history of economic thought community, economic theorists, and political science and political theory scholars as well as to policy makers and members of the cryptocurrency community.

Handbook of Research on Innovative Database Query Processing Techniques (Hardcover): Li Yan Handbook of Research on Innovative Database Query Processing Techniques (Hardcover)
Li Yan
R8,236 Discovery Miles 82 360 Ships in 18 - 22 working days

Research and development surrounding the use of data queries is receiving increased attention from computer scientists and data specialists alike. Through the use of query technology, large volumes of data in databases can be retrieved, and information systems built based on databases can support problem solving and decision making across industries. The Handbook of Research on Innovative Database Query Processing Techniques focuses on the growing topic of database query processing methods, technologies, and applications. Aimed at providing an all-inclusive reference source of technologies and practices in advanced database query systems, this book investigates various techniques, including database and XML queries, spatiotemporal data queries, big data queries, metadata queries, and applications of database query systems. This comprehensive handbook is a necessary resource for students, IT professionals, data analysts, and academicians interested in uncovering the latest methods for using queries as a means to extract information from databases. This all-inclusive handbook includes the latest research on topics pertaining to information retrieval, data extraction, data management, design and development of database queries, and database and XM queries.

The Best Damn Cybercrime and Digital Forensics Book Period (Paperback): Jack Wiles, Anthony Reyes The Best Damn Cybercrime and Digital Forensics Book Period (Paperback)
Jack Wiles, Anthony Reyes
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery
* Appeals to law enforcement agencies with limited budgets

S5000F, International specification for in-service data feedback, Issue 3.0 (Part 2/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 2/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,042 Discovery Miles 10 420 Ships in 18 - 22 working days
New Approaches to Data Analytics and Internet of Things Through Digital Twin (Hardcover): P. Karthikeyan, Polinpapilinho F.... New Approaches to Data Analytics and Internet of Things Through Digital Twin (Hardcover)
P. Karthikeyan, Polinpapilinho F. Katina, S.P. Anandaraj
R6,685 Discovery Miles 66 850 Ships in 18 - 22 working days

Even though many data analytics tools have been developed in the past years, their usage in the field of cyber twin warrants new approaches that consider various aspects including unified data representation, zero-day attack detection, data sharing across threat detection systems, real-time analysis, sampling, dimensionality reduction, resource-constrained data processing, and time series analysis for anomaly detection. Further study is required to fully understand the opportunities, benefits, and difficulties of data analytics and the internet of things in today's modern world. New Approaches to Data Analytics and Internet of Things Through Digital Twin considers how data analytics and the internet of things can be used successfully within the field of digital twin as well as the potential future directions of these technologies. Covering key topics such as edge networks, deep learning, intelligent data analytics, and knowledge discovery, this reference work is ideal for computer scientists, industry professionals, researchers, scholars, practitioners, academicians, instructors, and students.

InfoSecurity 2008 Threat Analysis (Paperback): Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg InfoSecurity 2008 Threat Analysis (Paperback)
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg; Contributions by Paul Schooping
R1,146 Discovery Miles 11 460 Ships in 10 - 15 working days

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Design, Performance, and Analysis of Innovative Information Retrieval (Hardcover): Joan Lu Design, Performance, and Analysis of Innovative Information Retrieval (Hardcover)
Joan Lu
R5,005 Discovery Miles 50 050 Ships in 18 - 22 working days

Daily procedures such as scientific experiments and business processes have the potential to create a huge amount of data every day, hour, or even second, and this may lead to a major problem for the future of efficient data search and retrieval as well as secure data storage for the world's scientists, engineers, doctors, librarians, and business managers.Design, Performance, and Analysis of Innovative Information Retrieval examines a number of emerging technologies that significantly contribute to modern Information Retrieval (IR), as well as fundamental IR theories and concepts that have been adopted into new tools or systems. This reference is essential to researchers, educators, professionals, and students interested in the future of IR.

Codes and Ciphers - A History Of Cryptography (Hardcover): Alexander d'Agapeyeff Codes and Ciphers - A History Of Cryptography (Hardcover)
Alexander d'Agapeyeff
R952 Discovery Miles 9 520 Ships in 10 - 15 working days

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography

Lean Analytics - How to Use Data to Track, Optimize, Improve and Accelerate Your Startup Business (Lean Guides with Scrum,... Lean Analytics - How to Use Data to Track, Optimize, Improve and Accelerate Your Startup Business (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal) (Hardcover)
Greg Caldwell
R602 R541 Discovery Miles 5 410 Save R61 (10%) Ships in 18 - 22 working days
Data Mining Trends and Applications in Criminal Science and Investigations (Hardcover): Omowunmi E. Isafiade, Antoine B. Bagula Data Mining Trends and Applications in Criminal Science and Investigations (Hardcover)
Omowunmi E. Isafiade, Antoine B. Bagula
R5,267 Discovery Miles 52 670 Ships in 18 - 22 working days

The field of data mining is receiving significant attention in today's information-rich society, where data is available from different sources and formats, in large volumes, and no longer constitutes a bottleneck for knowledge acquisition. This rich information has paved the way for novel areas of research, particularly in the crime data analysis realm. Data Mining Trends and Applications in Criminal Science and Investigations presents scientific concepts and frameworks of data mining and analytics implementation and uses across various domains, such as public safety, criminal investigations, intrusion detection, crime scene analysis, and suspect modeling. Exploring the diverse ways that data is revolutionizing the field of criminal science, this publication meets the research needs of law enforcement professionals, data analysts, investigators, researchers, and graduate-level students.

Nature-Inspired Algorithms for Big Data Frameworks (Hardcover): Hema Banati, Shikha Mehta, Parmeet Kaur Nature-Inspired Algorithms for Big Data Frameworks (Hardcover)
Hema Banati, Shikha Mehta, Parmeet Kaur
R5,642 Discovery Miles 56 420 Ships in 18 - 22 working days

As technology continues to become more sophisticated, mimicking natural processes and phenomena becomes more of a reality. Continued research in the field of natural computing enables an understanding of the world around us, in addition to opportunities for manmade computing to mirror the natural processes and systems that have existed for centuries. Nature-Inspired Algorithms for Big Data Frameworks is a collection of innovative research on the methods and applications of extracting meaningful information from data using algorithms that are capable of handling the constraints of processing time, memory usage, and the dynamic and unstructured nature of data. Highlighting a range of topics including genetic algorithms, data classification, and wireless sensor networks, this book is ideally designed for computer engineers, software developers, IT professionals, academicians, researchers, and upper-level students seeking current research on the application of nature and biologically inspired algorithms for handling challenges posed by big data in diverse environments.

Lean Enterprise - The Essential Step-by-Step Guide to Building a Lean Business with Six Sigma, Kanban, and 5S Methodologies... Lean Enterprise - The Essential Step-by-Step Guide to Building a Lean Business with Six Sigma, Kanban, and 5S Methodologies (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal) (Hardcover)
Greg Caldwell
R606 R545 Discovery Miles 5 450 Save R61 (10%) Ships in 18 - 22 working days
Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New): Hamid R. Nemati,... Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New)
Hamid R. Nemati, Yang Li
R4,605 Discovery Miles 46 050 Ships in 18 - 22 working days

In today s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Information Security Management-Global Challenges In The New Millennium (Paperback): Gurpreet Dhillon Information Security Management-Global Challenges In The New Millennium (Paperback)
Gurpreet Dhillon
R1,854 Discovery Miles 18 540 Ships in 18 - 22 working days

Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

Smart Cities in Application - Healthcare, Policy, and Innovation (Hardcover, 1st ed. 2020): Stan McClellan Smart Cities in Application - Healthcare, Policy, and Innovation (Hardcover, 1st ed. 2020)
Stan McClellan
R2,202 Discovery Miles 22 020 Ships in 18 - 22 working days

This book explores categories of applications and driving factors surrounding the Smart City phenomenon. The contributing authors provide perspective on the Smart Cities, covering numerous applications and classes of applications. The book uses a top-down exploration of the driving factors in Smart Cities, by including focal areas including "Smart Healthcare," "Public Safety & Policy Issues," and "Science, Technology, & Innovation." Contributors have direct and substantive experience with important aspects of Smart Cities and discuss issues with technologies & standards, roadblocks to implementation, innovations that create new opportunities, and other factors relevant to emerging Smart City infrastructures. Features an exploration of Smart City issues and solutions from a variety of stakeholders in the evolving field Presents conversational, nuanced, and forward thinking perspectives on Smart Cities, their implications, limitations, obstacles, and opportunities Includes contributions from industry insiders who have direct, relevant experience with their respective subjects as well as positioning and corporate stature

How to Cheat at Windows System Administration Using Command Line Scripts (Paperback): Pawan K. Bhardwaj How to Cheat at Windows System Administration Using Command Line Scripts (Paperback)
Pawan K. Bhardwaj
R941 Discovery Miles 9 410 Ships in 10 - 15 working days

How to Cheat at Windows Systems Administrators using Command line scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts.
With every new version of Windows, Microsoft is trying to ease the administration jobs by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these wizards are interactive and make the administrator s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks. These wizards are time consuming and, at times, may seem a bit confusing. The purpose of the book is to teach administrators how to use command-line scripts to complete everyday administration jobs, solve recurring network problems and at the same time improve their efficiency.
*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently.
*No direct competition for a core tool for Windows administrators.
*Builds on success of other books in the series including How to Cheat at Managing Windows Small Business Server 2003 and How to Cheat at Managing Microsoft Operations Manager 2005."

Deep Learning for Beginners - A comprehensive introduction of deep learning fundamentals for beginners to understanding... Deep Learning for Beginners - A comprehensive introduction of deep learning fundamentals for beginners to understanding frameworks, neural networks, large datasets, and creative applications with ease (Hardcover)
Steven Cooper
R604 R548 Discovery Miles 5 480 Save R56 (9%) Ships in 18 - 22 working days
Building and Maintaining a Data Warehouse (Paperback): Fon Silvers Building and Maintaining a Data Warehouse (Paperback)
Fon Silvers
R1,790 Discovery Miles 17 900 Ships in 10 - 15 working days

As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data warehouse that incorporates all the right concepts, taking the steps needed to create a warehouse that is as functional and user-friendly as it is theoretically sound, is not especially easy. That's the challenge that Building and Maintaininga Data Warehouse answers. Based on a foundation of industry-accepted principles, this work provides an easy-to-follow approach that is cohesive and holistic. By offering the perspective of a successful data warehouse, as well as that of a failed one, this workdetails those factors that must be accomplished and those that are best avoided. Organized to logically progress from more general to specific information, this valuable guide: Presents areas of a data warehouse individually and in sequence, showing how each piece becomes a working part of the whole Examines the concepts and principles that are at the foundation of every successful data warehouse Explains how to recognize and attend to problematic gaps in an established data warehouse Provides the big picture perspective that planners and executives require Those considering the planning and creation of a data warehouse, as well as those who've already built one will profit greatly from the insights garnered by the author during his years of creating and gathering information on state-of-the-art data warehouses that are accessible, convenient, and reliable.

Online Instruments, Data Collection, and Electronic Measurements - Organizational Advancements (Hardcover): Mihai C. Bocarnea,... Online Instruments, Data Collection, and Electronic Measurements - Organizational Advancements (Hardcover)
Mihai C. Bocarnea, Rodney A. Reynolds, Jason D. Baker
R4,497 Discovery Miles 44 970 Ships in 18 - 22 working days

One of the infinite rewards to continuously advancing technology is an increased ease and precision in organizational techniques. Online data collection and online instruments are vital ways to electronically measure and assess organizational areas relevant to management, leadership, and human research development.Online Instruments, Data Collection, and Electronic Measurements: Organizational Advancements aims to assist researchers in both understanding and utilizing online data collection by providing methodological knowledge related to online research, and by presenting information about the empirical quality, the availability, and the location of specific online instruments. This book provides a strong focus on organizational leadership instruments while combining them with practical and ethical issues associated with online data collection. Such a combination makes this a unique contribution to the field.

Relevant Search (Paperback): Doug Turnbull Relevant Search (Paperback)
Doug Turnbull
R1,045 R957 Discovery Miles 9 570 Save R88 (8%) Ships in 9 - 17 working days

DESCRIPTION Users expect search to be simple: They enter a few terms and expect perfectly-organized, relevant results instantly. But behind this simple user experience, complex machinery is at work. Whether using Elasticsearch, Solr, or another search technology, the solution is never one size fits all. Returning the right search results requires conveying domain knowledge and business rules in the search engine's data structures, text analytics, and results ranking capabilities. Relevant Search demystifies relevance work. Using Elasticsearch, it tells how to return engaging search results to users, helping readers understand and leverage the internals of Lucene-based search engines. The book walks through several real-world problems using a cohesive philosophy that combines text analysis, query building, and score shaping to express business ranking rules to the search engine. It outlines how to guide the engineering process by monitoring search user behavior and shifting the enterprise to a search-first culture focused on humans, not computers. It also shows how the search engine provides a deeply pluggable platform for integrating search ranking with machine learning, ontologies, personalization, domain-specific expertise, and other enriching sources. KEY FEATURES Highly relevant, concrete, hands-on guide Digs deep into search engine technology Contains essential tools, tips, and strategies for building engaging search engines AUDIENCE For readers who can code moderately complex tasks. ABOUT THE TECHNOLOGY Lucene is the underlying technology that backs both Elasticsearch and Solr. Dominant search engines are based upon Lucene and since Lucene itself is based upon the strong foundation of Information Retrieval research, the book will be applicable to almost any search technology available now or in the foreseeable future.

Nouns Almanac - Every Day a new Noun is born (Hardcover): Mint Face Nouns Almanac - Every Day a new Noun is born (Hardcover)
Mint Face
R2,750 R2,201 Discovery Miles 22 010 Save R549 (20%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
JMP Essentials - An Illustrated Guide…
Curt Hinrichs, Chuck Boiler, … Hardcover R2,063 Discovery Miles 20 630
SAS Text Analytics for Business…
Teresa Jade, Biljana Belamaric-Wilsey, … Hardcover R2,569 Discovery Miles 25 690
Python for Beginners - Enter the Real…
Lucas Lawrence Hardcover R855 R744 Discovery Miles 7 440
The Practical Guide To World-Class IT…
Kevin J Smith Hardcover R1,171 Discovery Miles 11 710
Practical and Efficient SAS Programming…
Martha Messineo Hardcover R1,320 Discovery Miles 13 200
Disruptive Technology - Concepts…
Information Reso Management Association Hardcover R8,228 Discovery Miles 82 280
SAS Certification Prep Guide…
Joni N Shreve, Donna Dea Holland Hardcover R2,889 Discovery Miles 28 890
Predictive Modeling with SAS Enterprise…
Kattamuri S Sarma Hardcover R2,338 Discovery Miles 23 380
Low-Code/No-Code - Citizen Developers…
Phil Simon Hardcover R772 R681 Discovery Miles 6 810
14th International Symposium on Process…
Yoshiyuki Yamashita, Manabu Kano Hardcover R11,098 Discovery Miles 110 980

 

Partners