Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > General
The modern application server is a complex platform that is the linchpin of an enterprise environment that includes a very wide range of technologies-web document formatting, web protocols, server-side scripts, servlets, applets, programming languages, distributed object technologies, security capabilities, directory and naming services, load balancing, system management, and others. As such, it can be a daunting task to try to comprehend these systems. Application Servers for E-Business helps you understand the use of application servers in e-business. The book presents a comprehensive overview of the technologies related to application servers in their facilitation of E-business. These technologies include CORBA, Java, Enterprise Java Beans, Java 2, web servers, and legacy systems. It explores the role these servers play in the modern enterprise IT infrastructure and the environment in which they operate. The material also includes implementation considerations for application servers, including security, scalability, load balancing, and fault tolerance. Chapter one provides an overview of application servers, the evolution of computing that took us from hierarchical, mainframe-centric environments to the web model of computing, and the rationale for E-commerce and E-business. Chapters two through five cover specific technologies, from web browsers and servers to applets and servlets. Chapter three provides an overview of Java technologies, and chapter four covers CORBA. Chapter five discusses application servers in detail. Since application servers are increasingly supporting the key mission-critical processes of an enterprise, it is critical that organizations deploying them build in "enterprise-class" facilities for security, scalability, load balancing, fault tolerance, and management. Chapter six discusses these deployment design issues. The book concludes with chapter seven, a chapter that presents several examples of the advantages of application ser
This book discusses business architecture as a basis for aligning efforts with outcomes. It views BA as complementary to enterprise architecture, where the focus of technological initiatives and inventories is to understand and improve business organization, business direction, and business decision-making. This book provides a practical, long-term view on BA. Based on the authors' consulting experience and industrial research, the material in this book is a valuable addition to the thought processes around BA and EA. The lead author has direct and practical experience with large clients in applying APQC capability framework for undertaking multiple enterprise-wide capability assessments.
The book shows how to use Planning by Design (PxD) for developing working models to any type of subject area. Section 1 describes the nature of planning in general, the formula of planning, the features that make it systematic, the essence of PxD, and developing and using the working model. Section 2 demonstrates personal application of creative planning to real life cases and practical working models on different subject areas. The book provides a general planning "master guide" that shows how to develop a working model of any definable subject matter. This objective will be accomplished by introducing the concepts, the process, and the methodology of PxD.
Many enterprises are moving their applications and IT services to the cloud. Better risk management results in fewer operational surprises and failures, greater stakeholder confidence and reduced regulatory concerns; proactive risk management maximizes the likelihood that an enterprise's objectives will be achieved, thereby enabling organizational success. This work methodically considers the risks and opportunities that an enterprise taking their applications or services onto the cloud must consider to obtain the cost reductions and service velocity improvements they desire without suffering the consequences of unacceptable user service quality.
Mobile crowdsensing is a technology that allows large scale, cost-effective sensing of the physical world. In mobile crowdsensing, mobile personal devices such as smart phones or smart watches come equipped with a variety of sensors that can be leveraged to collect data related to environment, transportation, healthcare, safety and so on. This book presents the first extensive coverage of mobile crowdsensing, with examples and insights drawn from the authors' extensive research on this topic as well as from the research and development of a growing community of researchers and practitioners working in this emerging field. Throughout the text, the authors provide the reader with various examples of crowdsensing applications and the building blocks to creating the necessary infrastructure, explore the related concepts of mobile sensing and crowdsourcing, and examine security and privacy issues introduced by mobile crowdsensing platforms. Provides a comprehensive description of mobile crowdsensing, a one-stop shop for all relevant issues pertaining to mobile crowdsensing, including motivation, applications, design and implementation, incentive mechanisms, and reliability and privacy. Describes the design and implementations of mobile crowdsensing platforms of great interest for the readers working in research and industry to quickly implement and test their systems. Identifies potential issues in building such mobile crowdsensing applications to ensure their usability in real life and presents future directions in mobile crowdsensing by emphasizing the open problems that have to be addressed.
Wireless and mobile communications have grown exponentially. The average individual now possesses a minimum of two smart mobile devices. The consistent advancement of mobile devices feeds the ever-growing appetite for faster bandwidth, uninterrupted connectivity, applications to fulfill the needs of consumers and businesses, and security for all of this information. Mobile Devices: Tools and Technologies provides readers at all levels of technical expertise with an understanding of mobile device concepts, application development processes, networking and infrastructure, and security methods. This book is organized into four sections, with chapters contributed by engineers with extensive real-world experience in the mobile and wireless field. The first section discusses the current mobile device landscape, including the latest technology innovations, personal and business use trends, and mobile operating systems and applications. The second section focuses on the application development process, from strategy and process through the development phases, to production and launch. This section covers both Android and iOS application development. In the third section, the authors explore mobile access standards, network types, and infrastructure components. This section also covers proximity communications standards, including Bluetooth, NFC, and RFID. The book concludes with a look at mobile device security, including mobile encryption methods, wireless security levels, and corporate security and workforce management strategies. Throughout the book, the contributors illustrate proven best practices and methodologies using real-world case studies drawn from their extensive experiences with mobile software and infrastructures for enterprise customers.
Although interest in Spatial Decision Support Systems (SDSS) continues to grow rapidly in a wide range of disciplines, students, planners, managers, and the research community have lacked a book that covers the fundamentals of SDSS along with the advanced design concepts required for building SDSS. Filling this need, Spatial Decision Support Systems: Principles and Practices provides a comprehensive examination of the various aspects of SDSS evolution, components, architecture, and implementation. It integrates research from a variety of disciplines, including the geosciences, to supply a complete overview of SDSS technologies and their application from an interdisciplinary perspective. This groundbreaking reference provides thorough coverage of the roots of SDSS. It explains the core principles of SDSS, how to use them in various decision making contexts, and how to design and develop them using readily available enabling technologies and commercial tools. The book consists of four major parts, each addressing different topic areas in SDSS: Presents an introduction to SDSS and the evolution of SDSS Covers the essential and optional components of SDSS Focuses on the design and implementation of SDSS Reviews SDSS applications from various domains and disciplines-investigating current challenges and future directions The text includes numerous detailed case studies, example applications, and methods for tailoring SDSS to your work environment. It also integrates sample code segments throughout. Addressing the technical and organizational challenges that affect the success or failure of SDSS, the book concludes by considering future directions of this rapidly emerging field of study.
This book presents a citizen-centric perspective of the dual components of e-government and e-governance. E-government refers to the practice of online public reporting by government to citizens, and to service delivery via the Internet. E-governance represents the initiatives for citizens to participate and provide their opinion on government websites. This volume in the Public Solutions Handbook Series focuses on various e-government initiatives from the United States and abroad, and will help guide public service practitioners in their transformation to e-government. The book provides important recommendations and suggestions oriented towards practitioners, and makes a significant contribution to e-government by showcasing successful models and highlighting the lessons learned in the implementation processes. Chapter coverage includes: * Online fiscal transparency * Performance reporting * Improving citizen participation * Privacy issues in e-governance * Internet voting * E-government at the local level
Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises. It provides a clear understanding of what cloud computing really means, what it can do, and when it is practical to use. Addressing the primary management and operation concerns of cloudware, including performance, measurement, monitoring, and security, this pragmatic book: Introduces the enterprise applications integration (EAI) solutions that were a first step toward enabling an integrated enterprise Details service-oriented architecture (SOA) and related technologies that paved the road for cloudware applications Covers delivery models like IaaS, PaaS, and SaaS, and deployment models like public, private, and hybrid clouds Describes Amazon, Google, and Microsoft cloudware solutions and services, as well as those of several other players Demonstrates how cloud computing can reduce costs, achieve business flexibility, and sharpen strategic focus Unlike customary discussions of cloud computing, Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications emphasizes the key differentiator-that cloud computing is able to treat enterprise-level services not merely as discrete stand-alone services, but as Internet-locatable, composable, and repackageable building blocks for generating dynamic real-world enterprise business processes.
Software Defined Networking: Design and Deployment provides a comprehensive treatment of software defined networking (SDN) suitable for new network managers and experienced network professionals. Presenting SDN in context with more familiar network services and challenges, this accessible text: Explains the importance of virtualization, particularly the impact of virtualization on servers and networks Addresses SDN, with an emphasis on the network control plane Discusses SDN implementation and the impact on service providers, legacy networks, and network vendors Contains a case study on Google's initial implementation of SDN Investigates OpenFlow, the hand-in-glove partner of SDN Looks forward toward more programmable networks and the languages needed to manage these environments Software Defined Networking: Design and Deployment offers a unique perspective of the business case and technology motivations for considering SDN solutions. By identifying the impact of SDN on traffic management and the potential for network service growth, this book instills the knowledge needed to manage current and future demand and provisioning for SDN.
This book presents a citizen-centric perspective of the dual components of e-government and e-governance. E-government refers to the practice of online public reporting by government to citizens, and to service delivery via the Internet. E-governance represents the initiatives for citizens to participate and provide their opinion on government websites. This volume in the Public Solutions Handbook Series focuses on various e-government initiatives from the United States and abroad, and will help guide public service practitioners in their transformation to e-government. The book provides important recommendations and suggestions oriented towards practitioners, and makes a significant contribution to e-government by showcasing successful models and highlighting the lessons learned in the implementation processes. Chapter coverage includes: * Online fiscal transparency * Performance reporting * Improving citizen participation * Privacy issues in e-governance * Internet voting * E-government at the local level
The formula for the Future of Work is called SMAC - social, mobile, analytics and cloud on one integrated stack where each function enables another to maximize its effect. This is the new enterprise IT model delivering an organization that is more connective, collaborative, real time and productive. This book provides a comprehensive view of how SMAC Technologies are impacting the entire banking "eco-system" as well as the key stakeholders, namely customers, employees and partners.
This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan is required for compliance with government regulations, industry standards such as PCI DSS, and certifications such as ISO 27001. This book will help organizations meet those compliance requirements.
The advent of social media offers anthropologists exciting opportunities to extend their research to communities in fresh ways. At the same time, these technological developments open up anthropological fieldwork to different hazards. Networked Anthropology explores the increasing appropriation of diverse media platforms and social media into anthropological research and teaching. The chapters consider the possibilities and challenges of multimedia, how network ecologies work, the ethical dilemmas involved, and how to use multimedia methodologies. The book combines theoretical insights with case studies, methodological sketches and pedagogical notes. Drawing on recent ethnographic work, the authors provide practical guidance in creative ways of doing networked anthropology. They point to the future of ethnography, both inside and outside the classroom, and consider ways in which networked anthropology might develop.
Distributed controller design is generally a challenging task, especially for multi-agent systems with complex dynamics, due to the interconnected effect of the agent dynamics, the interaction graph among agents, and the cooperative control laws. Cooperative Control of Multi-Agent Systems: A Consensus Region Approach offers a systematic framework for designing distributed controllers for multi-agent systems with general linear agent dynamics, linear agent dynamics with uncertainties, and Lipschitz nonlinear agent dynamics. Beginning with an introduction to cooperative control and graph theory, this monograph: Explores the consensus control problem for continuous-time and discrete-time linear multi-agent systems Studies the H and H2 consensus problems for linear multi-agent systems subject to external disturbances Designs distributed adaptive consensus protocols for continuous-time linear multi-agent systems Considers the distributed tracking control problem for linear multi-agent systems with a leader of nonzero control input Examines the distributed containment control problem for the case with multiple leaders Covers the robust cooperative control problem for multi-agent systems with linear nominal agent dynamics subject to heterogeneous matching uncertainties Discusses the global consensus problem for Lipschitz nonlinear multi-agent systems Cooperative Control of Multi-Agent Systems: A Consensus Region Approach provides a novel approach to designing distributed cooperative protocols for multi-agent systems with complex dynamics. The proposed consensus region decouples the design of the feedback gain matrices of the cooperative protocols from the communication graph and serves as a measure for the robustness of the protocols to variations of the communication graph. By exploiting the decoupling feature, adaptive cooperative protocols are presented that can be designed and implemented in a fully distributed fashion.
NB-IoT is the Internet of Things (IoT) technology used for cellular communication. NB-IoT devices deliver much better capability and performance, such as: increased area coverage of up to one kilometer; a massive number of devices-up to 200,000-per a single base-station area; longer battery lifetime of ten years; and better indoor and outdoor coverage for areas with weak signal, such as underground garages. The cellular NB-IoT technology is a challenging technology to use and understand. With more than 30 projects presented in this book, covering many use cases and scenarios, this book provides hands-on and practical experience of how to use the cellular NB-IoT for smart applications using Arduino (TM), Amazon Cloud, Google Maps, and charts. The book starts by explaining AT commands used to configure the NB-IoT modem; data serialization and deserialization; how to set up the cloud for connecting NB-IoT devices; setting up rules, policy, security certificates, and a NoSQL database on the cloud; how to store and read data in the cloud; how to use Google Maps to visualize NB-IoT device geo-location; and how to use charts to visualize sensor datasets. Projects for Arduino are presented in four parts. The first part explains how to connect the device to the mobile operator and cellular network; perform communication using different network protocols, such as TCP, HTTP, SSL, or MQTT; how to use GPS for geo-location applications; and how to upgrade NB-IoT modem firmware over the air. The second part explains the microcontroller unit and how to build and run projects, such as a 7-segment display or a real-time clock. The third part explains how NB-IoT can be used with sensor devices, such as ultrasonic and environmental sensors. Finally, the fourth part explains how NB-IoT can be used to control actuators, such as stepper motors and relays. This book is a unique resource for understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology. The book can be used by engineers, students, researchers, system integrators, mobile operators' technical staff, and electronics enthusiasts. To download the software which can be used with the book, go to: https://github.com/5ghub/NB-IoT About the Author: Hossam Fattah is a technology expert in 4G/5G wireless systems and networking. He received his Ph.D. in Electrical and Computer Engineering from University of British Columbia, Vancouver, Canada in 2003. He received his Master of Applied Science in Electrical and Computer Engineering from University of Victoria, Victoria, Canada in 2000. He completed his B.Sc. degree in Computers and Systems Engineering from Al-Azhar University, Cairo, Egypt in 1995. Between 2003 and 2011, he was in academia and industry, including Texas A&M University. Between 2011 and 2013, he was with Spirent Communications, NJ, USA. Since 2013, he has been with Microsoft, USA. He is also an affiliate associate professor at University of Washington, Tacoma, WA, USA, teaching graduate courses on IoT and distributed systems and collaborating on 5G research and innovations. He has had many patents and technical publications in conferences and journals. He is a registered professional Engineer with the Association of Professional Engineers, British Columbia, Canada. He is the author of the recent book 5G LTE Narrowband Internet of Things (NB-IoT). His research interest is in wireless communications and radio networks and protocols, cellular quality of service, radio resource management, traffic and packet scheduling, network analytics, and mobility.
The only official body of knowledge for SSCP--(ISC)2's popular credential for hands-on security professionals--fully revised and updated 2021 SSCP Exam Outline. Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. SSCP certification--fully compliant with U.S. Department of Defense Directive 8140 and 8570 requirements--is valued throughout the IT security industry. The Official (ISC)2 SSCP CBK Reference is the only official Common Body of Knowledge (CBK) available for SSCP-level practitioners, exclusively from (ISC)2, the global leader in cybersecurity certification and training. This authoritative volume contains essential knowledge practitioners require on a regular basis. Accurate, up-to-date chapters provide in-depth coverage of the seven SSCP domains: Security Operations and Administration; Access Controls; Risk Identification, Monitoring and Analysis; Incident Response and Recovery; Cryptography; Network and Communications Security; and Systems and Application Security. Designed to serve as a reference for information security professionals throughout their careers, this indispensable (ISC)2 guide: Provides comprehensive coverage of the latest domains and objectives of the SSCP Helps better secure critical assets in their organizations Serves as a complement to the SSCP Study Guide for certification candidates The Official (ISC)2 SSCP CBK Reference is an essential resource for SSCP-level professionals, SSCP candidates and other practitioners involved in cybersecurity.
In the wake of revelations about National Security Agency activities many of which occur in the cloud this book offers both enlightenment and a critical view. Cloud computing and big data are arguably the most significant forces in information technology today. In clear prose, To the Cloud explores where the cloud originated, what it means, and how important it is for business, government, and citizens. It describes the intense competition among cloud companies like Amazon and Google, the spread of the cloud to government agencies like the controversial NSA, and the astounding growth of entire cloud cities in China. From advertising to trade shows, the cloud and big data are furiously marketed to the world, even as dark clouds loom over environmental, privacy, and employment issues that arise from the cloud. Is the cloud the long-promised information utility that will solve many of the world s economic and social problems? Or is it just marketing hype? To the Cloud provides the first thorough analysis of the potential and the problems of a technology that may very well disrupt the world.
OpenStack is today's leading technology for building and integrating public and private clouds. Common OpenStack Deployments is a complete, practical guide to deploying OpenStack and understanding its internals. Key project contributor Elizabeth Joseph, with expert implementer Matt Fischer, shares up-to-date recipes for deploying OpenStack on both virtual and physical servers, and for using OpenStack to address any real-world challenge. First, Joseph and Fischer help you master OpenStack concepts and components by guiding you through small-scale, virtualized deployments. As you deepen your understanding, they guide you through building large, horizontally scalable infrastructures that integrate multiple components in a feature-rich cloud environment. Throughout, you'll find up-to-the minute coverage of enhancements that make the OpenStack platform more mature and production ready, plus expert tips on debugging and growth. The authors conclude by introducing the broader OpenStack ecosystem, showing you how to drive value through hybrid clouds blending local and hosted solutions. Drawing on extensive personal experience, they address issues ranging from cost to data sovereignty and security. Common OpenStack Deployments is the ideal resource for all network and data center professionals who want to apply OpenStack in proof-of-concept or in production, and for every instructor or student who wants to leverage today's hottest cloud technology. Comprehensive coverage includes Customizing, deploying, and scaling OpenStack in any environment Quickly building single-server test deployments with DevStack Making the right networking decisions for any OpenStack deployment Manually installing Nova compute, Keystone identity, Glance image storage, and Neutron networking Setting up controllers and compute nodes Deploying private compute clouds with Puppet Metering clouds with Ceilometer Implementing block and object storage clouds Provisioning on bare metal with OpenStack Ironic Controlling containers with OpenStack Magnum Troubleshooting OpenStack: error messages, logs, tools, configuration problems, Puppet debugging, and more Step-by-step virtualized reference deployment using KVM/QEMU on Ubuntu
Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand experiences from one of the largest healthcare systems in the United States, it covers the key areas associated with wireless network design, security, and support. Reporting on cutting-edge developments and emerging standards in Wi-Fi technologies, the book explores security implications for each device type. It covers real-time location services and emerging trends in cloud-based wireless architecture. It also outlines several options and design consideration for employee wireless coverage, voice over wireless (including smart phones), mobile medical devices, and wireless guest services. This book presents authoritative insight into the challenges that exist in adding Wi-Fi within a healthcare setting. It explores several solutions in each space along with design considerations and pros and cons. It also supplies an in-depth look at voice over wireless, mobile medical devices, and wireless guest services. The authors provide readers with the technical knowhow required to ensure their systems provide the reliable, end-to-end communications necessary to surmount today's challenges and capitalize on new opportunities. The shared experience and lessons learned provide essential guidance for large and small healthcare organizations in the United States and around the world. This book is an ideal reference for network design engineers and high-level hospital executives that are thinking about adding or improving upon Wi-Fi in their hospitals or hospital systems.
Distributed Systems: An Algorithmic Approach, Second Edition provides a balanced and straightforward treatment of the underlying theory and practical applications of distributed computing. As in the previous version, the language is kept as unobscured as possible-clarity is given priority over mathematical formalism. This easily digestible text: Features significant updates that mirror the phenomenal growth of distributed systems Explores new topics related to peer-to-peer and social networks Includes fresh exercises, examples, and case studies Supplying a solid understanding of the key principles of distributed computing and their relationship to real-world applications, Distributed Systems: An Algorithmic Approach, Second Edition makes both an ideal textbook and a handy professional reference.
GPU Parallel Program Development using CUDA teaches GPU programming by showing the differences among different families of GPUs. This approach prepares the reader for the next generation and future generations of GPUs. The book emphasizes concepts that will remain relevant for a long time, rather than concepts that are platform-specific. At the same time, the book also provides platform-dependent explanations that are as valuable as generalized GPU concepts. The book consists of three separate parts; it starts by explaining parallelism using CPU multi-threading in Part I. A few simple programs are used to demonstrate the concept of dividing a large task into multiple parallel sub-tasks and mapping them to CPU threads. Multiple ways of parallelizing the same task are analyzed and their pros/cons are studied in terms of both core and memory operation. Part II of the book introduces GPU massive parallelism. The same programs are parallelized on multiple Nvidia GPU platforms and the same performance analysis is repeated. Because the core and memory structures of CPUs and GPUs are different, the results differ in interesting ways. The end goal is to make programmers aware of all the good ideas, as well as the bad ideas, so readers can apply the good ideas and avoid the bad ideas in their own programs. Part III of the book provides pointer for readers who want to expand their horizons. It provides a brief introduction to popular CUDA libraries (such as cuBLAS, cuFFT, NPP, and Thrust),the OpenCL programming language, an overview of GPU programming using other programming languages and API libraries (such as Python, OpenCV, OpenGL, and Apple's Swift and Metal,) and the deep learning library cuDNN.
Internet of Things: Challenges, Advances, and Applications provides a comprehensive introduction to IoT, related technologies, and common issues in the adoption of IoT on a large scale. It surveys recent technological advances and novel solutions for challenges in the IoT environment. Moreover, it provides detailed discussion of the utilization of IoT and its underlying technologies in critical application areas, such as smart grids, healthcare, insurance, and the automotive industry. The chapters of this book are authored by several international researchers and industry experts. This book is composed of 18 self-contained chapters that can be read, based on interest. Features: Introduces IoT, including its history, common definitions, underlying technologies, and challenges Discusses technological advances in IoT and implementation considerations Proposes novel solutions for common implementation issues Explores critical application domains, including large-scale electric power distribution networks, smart water and gas grids, healthcare and e-Health applications, and the insurance and automotive industries The book is an excellent reference for researchers and post-graduate students working in the area of IoT, or related areas. It also targets IT professionals interested in gaining deeper knowledge of IoT, its challenges, and application areas.
Indoor location is one of the two most important contexts (time and location), becoming a key entry for mobile Internet. This book envisions potential indoor location applications, overviews the related state of the art technologies, and presents original patented techniques and open source prototype systems. The tutorial and sample code are provided as a good reference and starting point for readers who are interested in the technique detail.
By 2020, if not before, mobile computing and wireless systems are expected to enter the fifth generation (5G), which promises evolutionary if not revolutionary services. What those advanced services will look like, sound like, and feel like is the theme of the book Advances in Mobile Computing and Communications: Perspectives and Emerging Trends in 5G Networks. The book explores futuristic and compelling ideas in latest developments of communication and networking aspects of 5G. As such, it serves as an excellent guide for advanced developers, communication network scientists, researchers, academicians, and graduate students. The authors address computing models, communication architecture, and protocols based on 3G, LTE, LTE-A, 4G, and beyond. Topics include advances in 4G, radio propagation and channel modeling aspects of 4G networks, limited feedback for 4G, and game theory application for power control and subcarrier allocation in OFDMA cellular networks. Additionally, the book covers millimeter-wave technology for 5G networks, multicellular heterogeneous networks, and energy-efficient mobile wireless network operations for 4G and beyond using HetNets. Finally, the authors delve into opportunistic multiconnect networks with P2P WiFi and cellular providers and video streaming over wireless channels for 4G and beyond. |
You may like...
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl
Paperback
Privacy and Legal Issues in Cloud…
Anne S.Y. Cheung, Rolf H. Weber
Paperback
R1,383
Discovery Miles 13 830
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, …
Hardcover
R2,949
Discovery Miles 29 490
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
Phonetics - The Science of Speech
Martin J. Ball, Joan Rahilly
Paperback
R1,181
Discovery Miles 11 810
|