0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (4)
  • R100 - R250 (610)
  • R250 - R500 (2,064)
  • R500+ (12,497)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

Complex Systems - Relationships between Control, Communications and Computing (Hardcover, 1st ed. 2016): Georgi M. Dimirovski Complex Systems - Relationships between Control, Communications and Computing (Hardcover, 1st ed. 2016)
Georgi M. Dimirovski
R4,216 Discovery Miles 42 160 Ships in 18 - 22 working days

This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all the superficially diverse contributions encompassed by this book is that of spotting and exploiting possible areas of mutual reinforcement between control, computing and communications. These help readers to achieve not only robust stable plant system operation but also properties such as collective adaptivity, integrity and survivability at the same time retaining desired performance quality. Applications in the individual chapters are drawn from: * the general implementation of model-based diagnosis and systems engineering in medical technology, in communication, and in power and airport networks; * the creation of biologically inspired control brains and safety-critical human-machine systems, * process-industrial uses; * biped robots; * large space structures and unmanned aerial vehicles; and * precision servomechanisms and other advanced technologies. Complex Systems provides researchers from engineering, applied mathematics and computer science backgrounds with innovative theoretical and practical insights into the state-of-the-art of complex networks and systems research. It employs physical implementations and extensive computer simulations. Graduate students specializing in complex-systems

Ontology Management - Semantic Web, Semantic Web Services, and Business Applications (Hardcover, 2008 ed.): Martin Hepp, Pieter... Ontology Management - Semantic Web, Semantic Web Services, and Business Applications (Hardcover, 2008 ed.)
Martin Hepp, Pieter De Leenheer, Aldo De Moor, York Sure
R2,687 Discovery Miles 26 870 Ships in 18 - 22 working days

Ontology Managememt provides an up-to-date, scientifically correct, concise and easy-to-read reference on this topic. The book includes relevant tasks, practical and theoretical challenges, limitations and methodologies, plus available tooling support. The editors discuss integrating the conceptual and technical dimensions with a business view on using ontologies, stressing the cost dimension of ontology engineering and offering guidance on how to derive ontologies semi-automatically from existing standards and specifications.

Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP... Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Sushil Jajodia, Pierangela Samarati, Stelvio Cimato
R4,420 Discovery Miles 44 200 Ships in 18 - 22 working days

These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion

Semantic Web Services Challenge - Results from the First Year (Hardcover, 2009 ed.): Charles J. Petrie, Tiziana Margaria,... Semantic Web Services Challenge - Results from the First Year (Hardcover, 2009 ed.)
Charles J. Petrie, Tiziana Margaria, Holger Lausen, Michal Zaremba
R4,044 Discovery Miles 40 440 Ships in 18 - 22 working days

This is an edited volume that develops a common understanding of the various technologies intended to facilitate the automation of mediation, choreography and discovery for Web Services using semantic annotations. The volume explores trade-offs among existing approaches, and reveals strengths and weaknesses of proposed approaches, as well as which aspects of the problem are not yet covered. The book is designed for a professional audience composed of practitioners and researchers in industry. Professionals can use it to evaluate SWS technology for their potential practical use. The book is also suitable for advanced-level students in computer science.

Methodologies and Application Issues of Contemporary Computing Framework (Hardcover, 1st ed. 2018): Jyotsna Kumar Mandal,... Methodologies and Application Issues of Contemporary Computing Framework (Hardcover, 1st ed. 2018)
Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
R2,656 Discovery Miles 26 560 Ships in 18 - 22 working days

This book brings together the diversified areas of contemporary computing frameworks in the field of Computer Science, Engineering and Electronic Science. It focuses on various techniques and applications pertaining to cloud overhead, cloud infrastructure, high speed VLSI circuits, virtual machines, wireless and sensor networks, clustering and extraction of information from images and analysis of e-mail texts. The state-of-the-art methodologies and techniques are addressed in chapters presenting various proposals for enhanced outcomes and performances. The techniques discussed are useful for young researchers, budding engineers and industry professionals for applications in their respective fields.

Artificial Intelligence in Theory and Practice III - Third IFIP TC 12 International Conference on Artificial Intelligence, IFIP... Artificial Intelligence in Theory and Practice III - Third IFIP TC 12 International Conference on Artificial Intelligence, IFIP AI 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, Edition.)
Max Bramer
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

The papers in this volume comprise the refereed proceedings of the conference Arti- cial Intelligence in Theory and Practice (IFIP AI 2010), which formed part of the 21st World Computer Congress of IFIP, the International Federation for Information Pr- essing (WCC-2010), in Brisbane, Australia in September 2010. The conference was organized by the IFIP Technical Committee on Artificial Int- ligence (Technical Committee 12) and its Working Group 12.5 (Artificial Intelligence Applications). All papers were reviewed by at least two members of our Program Committee. - nal decisions were made by the Executive Program Committee, which comprised John Debenham (University of Technology, Sydney, Australia), Ilias Maglogiannis (University of Central Greece, Lamia, Greece), Eunika Mercier-Laurent (KIM, France) and myself. The best papers were selected for the conference, either as long papers (maximum 10 pages) or as short papers (maximum 5 pages) and are included in this volume. The international nature of IFIP is amply reflected in the large number of countries represented here. I should like to thank the Conference Chair, Tharam Dillon, for all his efforts and the members of our Program Committee for reviewing papers under a very tight de- line.

Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 4 (Hardcover): Information R Management... Research Anthology on Social Media Advertising and Building Consumer Relationships, VOL 4 (Hardcover)
Information R Management Association
R14,527 Discovery Miles 145 270 Ships in 18 - 22 working days
Applications of Cryptography and Network Security (Hardcover): Stephen Mason Applications of Cryptography and Network Security (Hardcover)
Stephen Mason
R3,143 R2,846 Discovery Miles 28 460 Save R297 (9%) Ships in 18 - 22 working days
Black Families Online - Directory of Online Resources for Black Parents (Hardcover): Stacey Montgomery Black Families Online - Directory of Online Resources for Black Parents (Hardcover)
Stacey Montgomery
R633 R577 Discovery Miles 5 770 Save R56 (9%) Ships in 18 - 22 working days

You want to find an Afrocentric video or a Black history game for your child but no store in your area offers them. You are considering home schooling your child, but would like to first discuss it with Black families that are already home schooling. You want to take your family to see the "Black rodeo," but do not have a tour schedule. You are about to have a baby and would like to send out Afrocentric birth announcements, but cannot find any.

Help is here With the click of a mouse, products, services and information aimed at Black families are immediately accessible "Black Families Online" takes you on a journey through Cyberspace, directing you to hundreds of online resources for Black parents, kids, educators, and anyone seeking multiculturalism. "Black Families Online" shows you how easy it is to get things done without leaving the house: Research your family history Decorate your baby's room with Afrocentric bedding and accessories Learn how to braid your daughter's hair Find Afrocentric educational tools Learn Black history Find college scholarships Meet moms and dads like you: SAHMs, families with biracial children, home schooling families, and more

Card Sorting - Designing Usable Categories (Paperback): Donna Spencer Card Sorting - Designing Usable Categories (Paperback)
Donna Spencer
R1,374 Discovery Miles 13 740 Ships in 18 - 22 working days
Matching Theory for Wireless Networks (Hardcover, 1st ed. 2017): Zhu Han, Yunan Gu, Walid Saad Matching Theory for Wireless Networks (Hardcover, 1st ed. 2017)
Zhu Han, Yunan Gu, Walid Saad
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource.

Web Application Design Patterns (Paperback): Pawan Vora Web Application Design Patterns (Paperback)
Pawan Vora
R1,230 Discovery Miles 12 300 Ships in 10 - 15 working days

Ever notice that in spite of their pervasiveness designing web applications is still challenging? While their benefits motivate their creation, there are no well-established guidelines for design. This often results in inconsistent behaviors and appearances, even among web applications created by the same company.
Design patterns for web applications, similar in concept to those for web sites and software design, offer an effective solution. In Web Application Design Patterns, Pawan Vora documents design patterns for web applications by not only identifying design solutions for user interaction problems, but also by examining the rationale for their effectiveness, and by presenting how they should be applied.
Design interfaces faster, with a better rationale for the solutions you choose.
Learn from over more than 100 patterns, with extensive annotation on use and extension.
Take a short-cut into understanding the industry with more than 500 full-color screenshots and a web site for help, discussion, and a collection of additional patterns."

Fuzzy Logic and the Semantic Web, Volume 1 (Hardcover): Elie Sanchez Fuzzy Logic and the Semantic Web, Volume 1 (Hardcover)
Elie Sanchez
R4,158 Discovery Miles 41 580 Ships in 10 - 15 working days

These are exciting times in the fields of Fuzzy Logic and the Semantic Web, and this book will add to the excitement, as it is the first volume to focus on the growing connections between these two fields. This book is expected to be a valuable aid to anyone considering the application of Fuzzy Logic to the Semantic Web, because it contains a number of detailed accounts of these combined fields, written by leading authors in several countries. The Fuzzy Logic field has been maturing for forty years. These years have witnessed a tremendous growth in the number and variety of applications, with a real-world impact across a wide variety of domains with humanlike behavior and reasoning. And we believe that in the coming years, the Semantic Web will be major field of applications of Fuzzy Logic.


This book, the first in the new series Capturing Intelligence, shows the positive role Fuzzy Logic, and more generally Soft Computing, can play in the development of the Semantic Web, filling a gap and facing a new challenge. It covers concepts, tools, techniques and applications exhibiting the usefulness, and the necessity, for using Fuzzy Logic in the Semantic Web. It finally opens the road to new systems with a high Web IQ.


Most of today's Web content is suitable for human consumption. The Semantic Web is presented as an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in cooperation. For example, within the Semantic Web, computers will understand the meaning of semantic data on a web page by following links to specified ontologies. But while the Semantic Web vision and research attracts attention, as long as it will be used two-valued-based logical methods no progress will be expected in handling ill-structured, uncertain or imprecise information encountered in real world knowledge. Fuzzy Logic and associated concepts and techniques (more generally, Soft Computing), has certainly a positive role to play in the development of the Semantic Web. Fuzzy Logic will not supposed to be the basis for the Semantic Web but its related concepts and techniques will certainly reinforce the systems classically developed within W3C.


In fact, Fuzzy Logic cannot be ignored in order to bridge the gap between human-understandable soft logic and machine-readable hard logic. None of the usual logical requirements can be guaranteed: there is no centrally defined format for data, no guarantee of truth for assertions made, no guarantee of consistency. To support these arguments, this book shows how components of the Semantic Web (like XML, RDF, Description Logics, Conceptual Graphs, Ontologies) can be covered, with in each case a Fuzzy Logic focus.


Key features.


- First volume to focus on the growing connections between Fuzzy Logic and the Semantic Web.
- Keynote chapter by Lotfi Zadeh.
- The Semantic Web is presently expected to be a major field of applications of Fuzzy Logic.
- It fills a gap and faces a new challenge in the development of the Semantic Web.
- It opens the road to new systems with a high Web IQ.
- Contributed chapters by Fuzzy Logic leading experts.
- First volume to focus on the growing connections between Fuzzy Logic and the Semantic Web.
- Keynote chapter by Lotfi Zadeh.
- The Semantic Web is presently expected to be a major field of applications of Fuzzy Logic.
- It fills a gap and faces a new challenge in the development of the Semantic Web.
- It opens the road to new systems with a high Web IQ.
- Contributed chapters by Fuzzy Logic leading experts.

Information Sciences and Systems 2014 - Proceedings of the 29th International Symposium on Computer and Information Sciences... Information Sciences and Systems 2014 - Proceedings of the 29th International Symposium on Computer and Information Sciences (Hardcover)
Tadeusz Czachorski, Erol Gelenbe, Ricardo Lent
R4,110 R3,557 Discovery Miles 35 570 Save R553 (13%) Ships in 10 - 15 working days

Based on a rigorous selection of submissions to The 29th International Symposium on Computer and Information Sciences (ISCIS 2014), this books includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. It offers the reader a timely access to innovative research and advances in computing and communications from many different areas of the world. The topics covered include (but are not limited to) computer architectures and digital systems, algorithms, theory, software engineering, data engineering, computational intelligence, system security, computer systems and networks, performance modeling and analysis, distributed and parallel systems, bioinformatics, computer vision and significant applications such as medical informatics and imaging. The 29th International Symposium on Computer and Information Sciences (ISCIS 2014) took place in Krakow Old City, Poland on October, 27-8, 2014.

Cross-Layer Design in Optical Networks (Hardcover, 2013 ed.): Suresh Subramaniam, Maite Brandt-Pearce, Piet Demeester, Chava... Cross-Layer Design in Optical Networks (Hardcover, 2013 ed.)
Suresh Subramaniam, Maite Brandt-Pearce, Piet Demeester, Chava Vijaya Saradhi
R5,378 R4,787 Discovery Miles 47 870 Save R591 (11%) Ships in 10 - 15 working days

This work addresses the topic of optical networks cross-layer design with a focus on physical-layer-impairment-aware design. Contributors captures both the physical-layer-aware network design as well as the latest advances in service-layer-aware network design. Treatment of topics such as, optical transmissions which are prone to signal impairments, dense packing of wavelengths, dispersion, crosstalk, etc., as well as how to design the network to mitigate such impairments, are all covered.

Java Cryptography Extensions - Practical Guide for Programmers (Paperback): Jason R. Weiss Java Cryptography Extensions - Practical Guide for Programmers (Paperback)
Jason R. Weiss
R960 Discovery Miles 9 600 Ships in 10 - 15 working days

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM
For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it s imperative that developers know what kinds of solutions exist.
One of Java s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.
In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
* Written by a seasoned veteran of both cryptography and server-side programming
* Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates
* Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources"

Semantic Web - Implications for Technologies and Business Practices (Hardcover, 1st ed. 2016): Michael Workman Semantic Web - Implications for Technologies and Business Practices (Hardcover, 1st ed. 2016)
Michael Workman
R4,138 R3,337 Discovery Miles 33 370 Save R801 (19%) Ships in 10 - 15 working days

This book examines recent developments in semantic systems that can respond to situations and environments and events. The contributors to this book cover how to design, implement and utilize disruptive technologies. The editor discusses the two fundamental sets of disruptive technologies: the development of semantic technologies including description logics, ontologies and agent frameworks; and the development of semantic information rendering and graphical forms of displays of high-density time-sensitive data to improve situational awareness. Beyond practical illustrations of emerging technologies, the editor proposes to utilize an incremental development method called knowledge scaffolding -a proven educational psychology technique for learning a subject matter thoroughly. The goal of this book is to help readers learn about managing information resources, from the ground up and reinforcing the learning as they read on.

Human Computer Interaction Research in Web Design and Evaluation (Hardcover): Human Computer Interaction Research in Web Design and Evaluation (Hardcover)
R2,493 Discovery Miles 24 930 Ships in 18 - 22 working days

Human Computer Interaction Research in Web Design and Evaluation presents research from academics and industry experts, covering various aspects of human computer interaction (HCI) Web design from theories to evaluation. This book highlights the use of methods from the HCI area in Web design, and how these methods can be used in a practical sense. ""Human Computer Interaction Research in Web Design and Evaluation"" is a comprehensive book on HCI and Web design that focuses on various areas of research including theories, analysis, design, and evaluation. This book not only features the human aspect of Web design, but also highlights the social and cultural issues in designing for a wider audience.

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure - Emerging Research and Opportunities (Hardcover): T.... Detection and Mitigation of Insider Attacks in a Cloud Infrastructure - Emerging Research and Opportunities (Hardcover)
T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, B. Thirumala Rao
R4,070 Discovery Miles 40 700 Ships in 18 - 22 working days

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.

Software Services for e-World - 10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2010, Buenos Aires,... Software Services for e-World - 10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2010, Buenos Aires, Argentina, November 3-5, 2010, Proceedings (Hardcover, 2010 Ed.)
Wojciech Cellary, Elsa Estevez
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany). Three years later the inaugural I3E 2001 conference was held in Zurich (Switzerland). Since then I3E has made its journey through the world: 2002 Lisbon (Portugal), 2003 Sao Paulo (Brazil), 2004 Toulouse (France), 2005 Poznan (Poland), 2006 Turku (Finland), 2007 Wuhan (China), 2008 Tokyo (Japan), and 2009 Nancy (France). I3E 2010 took place in Buenos Aires (Argentina) November 3-5, 2010. Known as "The Pearl" of South America, Buenos Aires is a cosmopolitan, colorful, and vibrant city, surprising its visitors with a vast variety of cultural and artistic performances, European architecture, and the passion for tango, coffee places, and football disc- sions. A cultural reference in Latin America, the city hosts 140 museums, 300 theaters, and 27 public libraries including the National Library. It is also the main educational center in Argentina and home of renowned universities including the U- versity of Buenos Aires, created in 1821. Besides location, the timing of I3E 2010 is th also significant--it coincided with the 200 anniversary celebration of the first local government in Argentina.

IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.): Alberto Partida, Diego... IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.)
Alberto Partida, Diego Andina
R2,801 Discovery Miles 28 010 Ships in 18 - 22 working days

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry.

More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems.

IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.

Prediction and Inference from Social Networks and Social Media (Hardcover, 1st ed. 2017): Jalal Kawash, Nitin Agarwal, Tansel... Prediction and Inference from Social Networks and Social Media (Hardcover, 1st ed. 2017)
Jalal Kawash, Nitin Agarwal, Tansel Oezyer
R3,593 R3,333 Discovery Miles 33 330 Save R260 (7%) Ships in 10 - 15 working days

This book addresses the challenges of social network and social media analysis in terms of prediction and inference. The chapters collected here tackle these issues by proposing new analysis methods and by examining mining methods for the vast amount of social content produced. Social Networks (SNs) have become an integral part of our lives; they are used for leisure, business, government, medical, educational purposes and have attracted billions of users. The challenges that stem from this wide adoption of SNs are vast. These include generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, and behavior detection. This text has applications to widely used platforms such as Twitter and Facebook and appeals to students, researchers, and professionals in the field.

The Thousand Faces of Virtual Reality (Hardcover): Cecilia Sik Lanyi The Thousand Faces of Virtual Reality (Hardcover)
Cecilia Sik Lanyi
R3,094 Discovery Miles 30 940 Ships in 18 - 22 working days
Dividend Investing For Beginners - Learn The Basics Of Dividend Investing And Strategies In 5 Days And Learn It Well... Dividend Investing For Beginners - Learn The Basics Of Dividend Investing And Strategies In 5 Days And Learn It Well (Hardcover)
Michael Ezeanaka
R656 Discovery Miles 6 560 Ships in 18 - 22 working days
Beginner Forex Traders Money Making Guidebook - How to Make Unlimited Money Right Away as a Beginner (Paperback): Josef Gelp Beginner Forex Traders Money Making Guidebook - How to Make Unlimited Money Right Away as a Beginner (Paperback)
Josef Gelp
R488 Discovery Miles 4 880 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Electronic Materials for…
Aftab Aslam Parwaz Khan, Mohammed Nazim, … Paperback R5,797 Discovery Miles 57 970
Markov Random Field Modeling in Image…
Stan Z. Li Hardcover R4,052 Discovery Miles 40 520
Quantum Materials, Devices, and…
Mohamed Henini, Marcelo Oliveira Rodrigues Paperback R4,909 Discovery Miles 49 090
Problem-based Learning - A Research…
Dorothy H. Evensen, Cindy E. Hmelo, … Hardcover R4,377 Discovery Miles 43 770
Learning to Think, Thinking to Learn - A…
Katherine Pang Paperback R2,596 R2,209 Discovery Miles 22 090
The i5 Approach - Lesson Planning That…
Jane E Pollock, Susan Hensley Paperback R685 R604 Discovery Miles 6 040
How to Learn a Language in 5 Days
Frederick Dodson Hardcover R647 Discovery Miles 6 470
Introduction to Project Control
Paperback R359 Discovery Miles 3 590
Project Risk Management - Managing…
Kurt J Engemann, Rory V. O'Connor Hardcover R3,029 Discovery Miles 30 290
Everyone Is Still Alive
Cathy Rentzenbrink Paperback R401 R172 Discovery Miles 1 720

 

Partners