0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (6)
  • R100 - R250 (568)
  • R250 - R500 (1,947)
  • R500+ (18,364)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > General

I.T. Risk Management - 2011 Edition (Paperback): Andreas Sofroniou I.T. Risk Management - 2011 Edition (Paperback)
Andreas Sofroniou
R510 Discovery Miles 5 100 Ships in 10 - 15 working days

A risk is an uncertain event which may have an adverse effect on the project's objectives. This Risk Management book is based on a proven risk management methodology, which should be very effective in the quest for identifying risks throughout the project life-cycle. The I.T. Risk Management process commences by identifying the enterprises most important and risky projects, as these must be given priority. This I.T. Risk Management book/manual is essentially a method that permits the collection of knowledge and experience from those involved, in a form that facilitates the Systematic Interaction and Generic Methodology for Applications.

Cambridge Technicals Level 3 IT (Paperback): Victoria Ellis, Graham Manson, Saundra Middleton Cambridge Technicals Level 3 IT (Paperback)
Victoria Ellis, Graham Manson, Saundra Middleton; Edited by Maureen Everett
R1,174 Discovery Miles 11 740 Ships in 10 - 15 working days

Exam Board: Cambridge Level: Key Stage 4 Subject: IT First Teaching: September 2016 First Exam: June 207 Support your teaching of the new Cambridge Technicals 2016 suite with Cambridge Technical Level 3 IT, developed in partnership between OCR and Hodder Education; this textbook covers each specialist pathway and ensures your ability to deliver a flexible course that is both vocationally focused and academically thorough. Cambridge Technical Level 3 IT is matched exactly to the new specification and follows specialist pathways in IT Infrastructure Technician, Emerging Digital Technology Practitioner, Application Developer, and Data Analyst. - Ensures effective teaching of each specialist pathway offered within the qualification. - Focuses learning on the skills, knowledge and understanding demanded from employers and universities. - Provides ideas and exercises for the application of practical skills and knowledge. - Developed in partnership between Hodder Education and OCR, guaranteeing quality resources which match the specification perfectly Hodder Education have worked with OCR to make updates to our Cambridge Technicals textbooks to bring them more closely in line with the model assignment course requirements. We would like to let you know about a recent change to this textbook, updated pages which are now available free of charge as a PDF when you click on the 'Amended Pages' link on the left of this webpage.

Information and Communication Technologies in Support of the Tourism Industry (Hardcover): Wayne Pease, Michelle Rowe, Malcolm... Information and Communication Technologies in Support of the Tourism Industry (Hardcover)
Wayne Pease, Michelle Rowe, Malcolm Cooper
R2,632 Discovery Miles 26 320 Ships in 18 - 22 working days

Tourism is one of the leading industries worldwide. The magnitude of growth in tourism will bring both opportunities and problems to source and destination markets in years to come, especially in the internal and external exchange of information in the industry. ""Information and Communication Technologies in Support of the Tourism Industry"" examines the process of transformation as it relates to the tourism industry, and the changes to that industry from modern electronic communications. ""Information and Communication Technologies in Support of the Tourism Industry"" covers not only geographically supportive technologies in communication, but also in terms of culture, economics, marketing, social, and regional issues. In-depth analyses range from the use of the Internet to supply information to the emerging patterns of tourist decision making and investments.

Python for Beginners - Learn It as Easy as Pie (Hardcover): Yatin Bayya Python for Beginners - Learn It as Easy as Pie (Hardcover)
Yatin Bayya
R524 Discovery Miles 5 240 Ships in 10 - 15 working days
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover): Bryan Jeffrey Parno Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover)
Bryan Jeffrey Parno
R1,996 Discovery Miles 19 960 Ships in 18 - 22 working days

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

My Hardcover Book (Hardcover): Lasse Smith My Hardcover Book (Hardcover)
Lasse Smith
R846 Discovery Miles 8 460 Ships in 18 - 22 working days

Learn SEO - Search Engine Optimization and how to get traffic from Google and the other big search engines. Achieve high rankings - Get long term value and rank the right way!

The Multibody Systems Approach to Vehicle Dynamics (Paperback, 2nd edition): Michael Blundell, Damian Harty The Multibody Systems Approach to Vehicle Dynamics (Paperback, 2nd edition)
Michael Blundell, Damian Harty
R1,910 Discovery Miles 19 100 Ships in 10 - 15 working days

Filling the gaps between subjective vehicle assessment, classical vehicle dynamics and computer-based multibody approaches, "The Multibody Systems Approach to Vehicle Dynamics" offers unique coverage of both the virtual and practical aspects of vehicle dynamics from concept design to system analysis and handling development.

The book provides valuable foundation knowledge of vehicle dynamics as well as drawing on laboratory studies, test-track work, and finished vehicle applications to gel theory with practical examples and observations. Combined with insights into the capabilities and limitations of multibody simulation, this comprehensive mix provides the background understanding, practical reality and simulation know-how needed to make and interpret useful models.

New to this edition you will find coverage of the latest tire models, changes to the modeling of light commercial vehicles, developments in active safety systems, torque vectoring, and examples in AView, as well as updates to theory, simulation, and modeling techniques throughout.
Unique gelling of foundational theory, research findings, practical insights, and multibody systems modeling know-how, reflecting the mixed academic and industrial experience of this expert author teamDownloadable models, code, and data sets, available from the book s companion website, enable readers to explore the material in the book interactivelyCoverage of the latest models, safety developments, simulation methods, and features bring the new edition up to date with advances in this critical and evolving field"

Machine Learning for Beginners - An Introduction to Artificial Intelligence and Machine Learning (Hardcover): John Slavio Machine Learning for Beginners - An Introduction to Artificial Intelligence and Machine Learning (Hardcover)
John Slavio
R828 Discovery Miles 8 280 Ships in 18 - 22 working days
Excel 2021 / Microsoft 365 Programming By Example (Paperback): Julitta Korol Excel 2021 / Microsoft 365 Programming By Example (Paperback)
Julitta Korol
R1,437 R1,215 Discovery Miles 12 150 Save R222 (15%) Ships in 18 - 22 working days

Updated for Excel 2021 and based on the bestselling editions from previous versions, Excel 2021 / Microsoft 365 Programming by Example is a practical, how-to book on Excel programming, suitable for readers already proficient with the Excel user interface. If you are looking to automate Excel routine tasks, this book will progressively introduce you to programming concepts via numerous illustrated hands-on exercises. More advanced topics are demonstrated via custom projects. From recording and editing a macro and writing VBA code from scratch to programming the Ribbon interface and working with XML documents, this book takes you on a programming journey that will change the way you work with Excel. The book provides information on performing automatic operations on files, folders, and other Microsoft Office applications. It also covers proper use of event procedures, testing and debugging, and guides you through programming more advanced Excel features, such as working with VBA classes and raising your own events in standalone class modules. Includes companion files with source code, hands-on projects, and figures.

Solving the Riddle of Microsoft and Your Computer - 2Nd Edition (Hardcover): Mark Riddle Solving the Riddle of Microsoft and Your Computer - 2Nd Edition (Hardcover)
Mark Riddle
R574 Discovery Miles 5 740 Ships in 18 - 22 working days
Handbook of Reconfigurable Computing: Volume II (Hardcover): Akira Hanako Handbook of Reconfigurable Computing: Volume II (Hardcover)
Akira Hanako
R3,163 R2,865 Discovery Miles 28 650 Save R298 (9%) Ships in 18 - 22 working days
The Silence of Slime Mould (Hardcover): Andrew Adamatzky The Silence of Slime Mould (Hardcover)
Andrew Adamatzky
R584 Discovery Miles 5 840 Ships in 10 - 15 working days
Special Applications of ICTs in Digital Government and the Public Sector - Emerging Research and Opportunities (Hardcover):... Special Applications of ICTs in Digital Government and the Public Sector - Emerging Research and Opportunities (Hardcover)
Manuel Pedro Rodriguez-Bolivar, Maria Elicia Cortes Cediel
R5,299 Discovery Miles 52 990 Ships in 18 - 22 working days

The development of social technologies has brought about a new era of political planning and government interactions. In addition to reducing costs in city resource management, ICT and social media can be used in emergency situations as a mechanism for citizen engagement, to facilitate public administration communication, etc. In spite of all these advantages, the application of technologies by governments and the public sector has also fostered debate in terms of cyber security due to the vulnerabilities and risks that can befall different stakeholders. It is necessary to review the most recent research about the implementation of ICTs in the public sector with the aim of understanding both the strengths and the vulnerabilities that the management models can entail. Special Applications of ICTs in Digital Government and the Public Sector: Emerging Research and Opportunities is a collection of innovative research on the methods and applications of ICT implementation in the public sector that seeks to allow readers to understand how ICTs have forced public administrations to undertake reforms to both their workflow and their means of interacting with citizens. While highlighting topics including e-government, emergency communications, and urban planning, this book is ideally designed for government officials, public administrators, public managers, policy holders, policymakers, public consultants, professionals, academicians, students, and researchers seeking current research on the digital communication channels between elected officials and the citizens they represent.

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Paperback): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Paperback)
James Aweya
R5,034 Discovery Miles 50 340 Ships in 10 - 15 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover)
James Aweya
R12,552 Discovery Miles 125 520 Ships in 10 - 15 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Scheduling in Real-Time Systems (Hardcover): F. Cottet Scheduling in Real-Time Systems (Hardcover)
F. Cottet
R4,101 Discovery Miles 41 010 Ships in 18 - 22 working days

Real-time computing plays a vital role in ultra-reliable and safety-critical applications in fields as diverse as flight control, telecommunication systems, nuclear plant supervision and surgical operation monitoring. Providing a comprehensive overview, this book examines the most significant real-time scheduling policies in use today.

Scheduling in Real-Time Systems presents:

  • Rigorous discussions of the main scheduling algorithms.

  • In-depth analyses of centralised and distributed computing systems.

  • Detailed coverage of symmetric multiprocessor systems sharing a common memory.

  • A complete appraisal of packet scheduling in networks.

  • Three relevant case studies including the control system of the robot that the Pathfinder space vehicle landed on Planet Mars.
Offering end-of-chapter exercises and solutions, Scheduling in Real-time Systems will prove an invaluable textbook for university students in computer, software, electronics and control systems engineering. This book will also be an excellent reference to practising engineers and developers in the systems and communications industry.
Embracing Interference in Wireless Systems (Hardcover): Shyamnath Gollakota Embracing Interference in Wireless Systems (Hardcover)
Shyamnath Gollakota
R1,996 Discovery Miles 19 960 Ships in 18 - 22 working days

The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.

Cases on Technology Enhanced Learning Through Collaborative Opportunities (Hardcover): Cases on Technology Enhanced Learning Through Collaborative Opportunities (Hardcover)
R4,613 Discovery Miles 46 130 Ships in 18 - 22 working days

An increasing number of global institutions look to advancements in technology to enhance access to learning and development and, in doing so, seek collaborative opportunities to maximize the benefits of educational technology. Cases on Technology Enhanced Learning through Collaborative Opportunities analyzes and evaluates how organizations and institutions of learning in the developing and developed world are adapting to technology enhanced learning environments and exploring transnational collaborative opportunities, providing prospects for learning, growth and development through a blend of traditional and technological methods.

Handbook of Radio Frequency Identification (Hardcover): Kevin Merriman Handbook of Radio Frequency Identification (Hardcover)
Kevin Merriman
R2,121 Discovery Miles 21 210 Ships in 10 - 15 working days
Robots Are People Too - How Siri, Google Car, and Artificial Intelligence Will Force Us to Change Our Laws (Hardcover): John... Robots Are People Too - How Siri, Google Car, and Artificial Intelligence Will Force Us to Change Our Laws (Hardcover)
John Frank Weaver
R1,934 R1,733 Discovery Miles 17 330 Save R201 (10%) Ships in 10 - 15 working days

The only book of its kind to look at how our legal system needs to change to accommodate a world in which machines, in addition to people, make decisions. For years, robots were solely a matter of science fiction. Today, artificial intelligence technologies serve to accelerate our already fast-paced lives even further. From Apple's Siri to the Google Car to GPS, machines and technologies that make decisions and take action without direct human supervision have become commonplace in our daily lives. As a result, laws must be amended to protect companies that produce robots and the people that buy and use them. This book provides an extensive examination of how numerous legal areas-including liability, traffic, zoning, and international and constitutional law-must adapt to the widespread use of artificial intelligence in nearly every area of our society. The author scrutinizes the laws governing such fields as transportation, medicine, law enforcement, childcare, and real estate development. Describes court cases, regulations, and statutes that are affected by the technological advances of artificial intelligence Eschews overtly technical or legalistic discussions to provide clear, accessible information Discusses a number of popular, topical, and controversial technologies, providing historical background for each and their legal implications Focuses on devices that are already in use to illustrate where the law falls short in governing artificial intelligence and how legal models should be amended

Cognitive Technology, Volume 113 - In Search of a Humane Interface (Hardcover): J.L. Mey, B. Gorayska Cognitive Technology, Volume 113 - In Search of a Humane Interface (Hardcover)
J.L. Mey, B. Gorayska
R5,220 Discovery Miles 52 200 Ships in 10 - 15 working days

In this book the editors have gathered a number of contributions by persons who have been working on problems of Cognitive Technology (CT). The present collection initiates explorations of the human mind via the technologies the mind produces. These explorations take as their point of departure the question What happens when humans produce new technologies? Two interdependent perspectives from which such a production can be approached are adopted:

- How and why constructs that have their origins in human mental life are embodied in physical environments when people fabricate their habitat, even to the point of those constructs becoming that very habitat

- How and why these fabricated habitats affect, and feed back into, human mental life.

The aim of the CT research programme is to determine, in general, which technologies, and in particular, which interactive computer-based technologies, are humane with respect to the cognitive development and evolutionary adaptation of their end users. But what does it really mean to be humane in a technological world? To shed light on this central issue other pertinent questions are raised, e.g.

- Why are human minds externalised, i.e., what purpose does the process of externalisation serve?

- What can we learn about the human mind by studying how it externalises itself?

- How does the use of externalised mental constructs (the objects we call 'tools') change people fundamentally?

- To what extent does human interaction with technology serve as an amplification of human cognition, and to what extent does it lead to a atrophy of the human mind?

The book calls for a reflection on what a tool is. Strong parallels between CT andenvironmentalism are drawn: both are seen as trends having originated in our need to understand how we manipulate, by means of the tools we have created, our natural habitat consisting of, on the one hand, the cognitive environment which generates thought and determines action, and on the other hand, the physical environment in which thought and action are realised. Both trends endeavour to protect the human habitat from the unwanted or uncontrolled impact of technology, and are ultimately concerned with the ethics and aesthetics of tool design and tool use.

Among the topics selected by the contributors to the book, the following themes emerge (the list is not exhaustive): using technology to empower the cognitively impaired; the ethics versus aesthetics of technology; the externalisation of emotive and affective life and its special dialectic ('mirror') effects; creativity enhancement: cognitive space, problem tractability; externalisation of sensory life and mental imagery; the engineering and modelling aspects of externalised life; externalised communication channels and inner dialogue; externalised learning protocols; relevance analysis as a theoretical framework for cognitive technology.

Computer Science and Computing - A Guide to the Literature (Hardcover, Annotated edition): Michael Knee Computer Science and Computing - A Guide to the Literature (Hardcover, Annotated edition)
Michael Knee
R2,506 R2,208 Discovery Miles 22 080 Save R298 (12%) Ships in 10 - 15 working days

As computers have infiltrated virtually every facet of our lives, so has computer science influenced nearly every academic subject in science, engineering, medicine, social science, the arts and humanities. Michael Knee offers a selective guide to the major resources and tools central to the entire industry. A discussion of three commonly used subject classification systems precedes an annotated bibliography of over 500 items. As computers have infiltrated virtually every facet of our lives, so has computer science influenced nearly every academic subject in science, engineering, medicine, social science, the arts and humanities. Michael Knee offers a selective guide to the major resources and tools central to the computer industry: teaching institutions, research institutes and laboratories, manufacturers, standardization organizations, professional associations and societies, and publishers. He begins with a discussion of the three subject classification systems most commonly used to describe, index, and manage computer science information: the Association for Computing Machinery, Inspec, and the Library of Congress. An annotated bibliography of over 500 items follows, grouped by material type, and featuring a mix of classic works and current sources.

Advances in Physiological Computing (Hardcover, 2014 ed.): Stephen H. Fairclough, Kiel Gilleade Advances in Physiological Computing (Hardcover, 2014 ed.)
Stephen H. Fairclough, Kiel Gilleade
R3,655 R1,903 Discovery Miles 19 030 Save R1,752 (48%) Ships in 10 - 15 working days

This edited collection will provide an overview of the field of physiological computing, i.e. the use of physiological signals as input for computer control. It will cover a breadth of current research, from brain-computer interfaces to telemedicine.

Formal Verification - An Essential Toolkit for Modern VLSI Design (Paperback, 2nd edition): Erik Seligman, Tom Schubert, M. V.... Formal Verification - An Essential Toolkit for Modern VLSI Design (Paperback, 2nd edition)
Erik Seligman, Tom Schubert, M. V. Achutha Kiran Kumar
R2,301 Discovery Miles 23 010 Ships in 10 - 15 working days

Formal Verification: An Essential Toolkit for Modern VLSI Design, Second Edition presents practical approaches for design and validation, with hands-on advice to help working engineers integrate these techniques into their work. Formal Verification (FV) enables a designer to directly analyze and mathematically explore the quality or other aspects of a Register Transfer Level (RTL) design without using simulations. This can reduce time spent validating designs and more quickly reach a final design for manufacturing. Building on a basic knowledge of SystemVerilog, this book demystifies FV and presents the practical applications that are bringing it into mainstream design and validation processes. New sections cover advanced techniques, and a new chapter, The Road To Formal Signoff, emphasizes techniques used when replacing simulation work with Formal Verification. After reading this book, readers will be prepared to introduce FV in their organization to effectively deploy FV techniques that increase design and validation productivity.

Programming: Swift: Create A Fully Functioning App: Learn in A Day! (Hardcover): Os Swift Programming: Swift: Create A Fully Functioning App: Learn in A Day! (Hardcover)
Os Swift
R806 Discovery Miles 8 060 Ships in 18 - 22 working days

Learn to Create and Write Your Own Apps Do you have a great idea for an app or a game? Would you like to make your dream a reality? Do you need the tools and skills to start making your own apps? When you purchase Swift Programming Guide: Create a Fully Functioning App in a Day, you'll learn how to make your own apps and programs right away! These fun and easy tips transform the dreaded chore of learning programming code into a fun hobby. You'll be proud to show off your creations to your friends, coworkers, and family! Would you like to know more about: Playgrounds? Classes and Methods? Arrays and For Loops? Creating Your First iOS App? Storyboards and Interface Builders? This helpful book explains how to use Xcode and Apple's new coding language, Swift, to create amazing new products. It takes you step-by-step through the process of writing your first app! Download Swift Programming Guide: Create a Fully Functioning App in a Day now, and start making your own apps TODAY!

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Multinationals and the…
Antoine Lyon-Caen, Stephane Vernac, … Paperback R1,502 Discovery Miles 15 020
UK Merger Control
Jonathan Parker, Adrian Majumdar Hardcover R7,644 Discovery Miles 76 440
Constitutions in the Global Financial…
Xenophon Contiades Hardcover R4,650 Discovery Miles 46 500
Firm Dominance in EU Competition Law…
Jorge Marcos Ramos Hardcover R3,924 Discovery Miles 39 240
Ethics and Law of Intellectual Property…
Christian Lenk, Nils Hoppe Paperback R1,384 Discovery Miles 13 840
Codifying Contract Law - International…
Mary Keyes, Therese Wilson Paperback R1,383 Discovery Miles 13 830
Workplace law
John Grogan Paperback R900 R820 Discovery Miles 8 200
Legal Interpretation in International…
Joanna Jemielniak Paperback R1,389 Discovery Miles 13 890
Industrial Design Rights - An…
Brian W. Gray Hardcover R5,701 Discovery Miles 57 010
Fair Trade, Corporate Accountability and…
Kate MacDonald Hardcover R4,664 Discovery Miles 46 640

 

Partners