0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (710)
  • R250 - R500 (2,323)
  • R500+ (12,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

E-Commerce Security and Privacy (Hardcover, 2001 ed.): Anup K. Ghosh E-Commerce Security and Privacy (Hardcover, 2001 ed.)
Anup K. Ghosh
R3,133 Discovery Miles 31 330 Ships in 10 - 15 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.

Securing Web Services - Practical Usage of Standards and Specifications (Hardcover): Panos Periorellis Securing Web Services - Practical Usage of Standards and Specifications (Hardcover)
Panos Periorellis
R5,220 Discovery Miles 52 200 Ships in 12 - 17 working days

'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.

Breakthrough - Shatter the 25 Little Lies Holding You Back From Firing your Boss and Launching the Online Business You've... Breakthrough - Shatter the 25 Little Lies Holding You Back From Firing your Boss and Launching the Online Business You've Always Dreamed Of (Hardcover)
Jonathan Green; Edited by Alice Fogliata
R780 Discovery Miles 7 800 Ships in 10 - 15 working days
The DSSSL Book - An XML/SGML Programming Language (Hardcover, 2004 ed.): Javier Farreres The DSSSL Book - An XML/SGML Programming Language (Hardcover, 2004 ed.)
Javier Farreres
R4,747 Discovery Miles 47 470 Ships in 12 - 17 working days

DSSSL (Document Style Semantics and Specification Language) is an ISO standard (ISO/IEC 10179: 1996) published in the year 1996. DSSSL is a standard of the SGML family (Standard Generalized Markup Language, ISO 8879:1986), whose aim is to establish a processing model for SGML documents. For a good understanding of the SGML standard, many books exist including Author's guide[BryanI988] and The SGML handbook[GoldfarbI990]. A DSSSL document is an SGML document, written with the same rules that guide any SGML document. The structure of a DSSSL document is explained in Chapter 2. DSSSL is based, in part, on scheme, a standard functional programming language. The DSSSL subset of scheme along with the procedures supported by DSSSL are explained in Chapter 3. The DSSSL standard starts with the supposition of a pre-existing SGML document, and offers a series of processes that can be performed on it: * Groves The first process that is performed on an SGML document in DSSSL is always the analysis of the document and the creation of a grove. The DSSSL standard shares many common characteristics with another standard of the SGML family, HyTime (ISO/IEC 10744). These standards were developed in parallel, and their developers designed a common data model, the grove, that would support the processing needs of each standard.

Regulating Cyberspace - The Policies and Technologies of Control (Hardcover): Richard A Spinello Regulating Cyberspace - The Policies and Technologies of Control (Hardcover)
Richard A Spinello
R2,924 Discovery Miles 29 240 Ships in 10 - 15 working days

This visionary book presents an interdisciplinary and cogent approach to the issue of Internet governance and control. By examining five critical areas in which the tension between freedom and control is most palpable--fair competition and open access, free expression, intellectual property, privacy rights, and security--Spinello guides the reader on a tour of the emerging body of law and public policy that has attempted to control the anarchy of cyberspace. In so doing, he defends the credo of Internet self-regulation, asserting that the same powerful and flexible architectures that created the Internet as we know it today can be relied upon to aid the private sector in arriving at a workable, decentralized regulatory regime. Except in certain circumstances that require government involvement, self-regulation is not only viable but is a highly preferred alternative to the forced uniformity that centralized structures tend to impose.

Beginning with an exploration of the Internet's most important values, including universality, free expression, and open access, as well as its promise as a democratizing force, Spinello considers how we can most effectively preserve those values and fulfill that promise while curtailing the social harms that vex Internet users. How do we arrive at the right mixture of technology and policy so that the Internet does not lose its promise as a liberating technology? In examining this question, Spinello evaluates such architectures of control as filters and rights management protocols, which attempt to keep out unwanted information and protect intellectual property, respectively. He explores how these and other technologies can be designed and used responsibly so that online social order can be sustained with a minimal amount of government intervention.

The Social Semantic Web (Hardcover, 2010 ed.): John G. Breslin, Alexandre Passant, Stefan Decker The Social Semantic Web (Hardcover, 2010 ed.)
John G. Breslin, Alexandre Passant, Stefan Decker
R3,040 R1,763 Discovery Miles 17 630 Save R1,277 (42%) Ships in 12 - 17 working days

The Social Web (including services such as MySpace, Flickr, last.fm, and WordPress) has captured the attention of millions of users as well as billions of dollars in investment and acquisition. Social websites, evolving around the connections between people and their objects of interest, are encountering boundaries in the areas of information integration, dissemination, reuse, portability, searchability, automation and demanding tasks like querying. The Semantic Web is an ideal platform for interlinking and performing operations on diverse person- and object-related data available from the Social Web, and has produced a variety of approaches to overcome the boundaries being experienced in Social Web application areas.

After a short overview of both the Social Web and the Semantic Web, Breslin et al. describe some popular social media and social networking applications, list their strengths and limitations, and describe some applications of Semantic Web technology to address their current shortcomings by enhancing them with semantics. Across these social websites, they demonstrate a twofold approach for interconnecting the islands that are social websites with semantic technologies, and for powering semantic applications with rich community-created content. They conclude with observations on how the application of Semantic Web technologies to the Social Web is leading towards the "Social Semantic Web" (sometimes also called "Web 3.0"), forming a network of interlinked and semantically-rich content and knowledge.

The book is intended for computer science professionals, researchers, and graduates interested in understanding the technologies and research issues involved in applying Semantic Web technologies to social software. Practitioners and developers interested in applications such as blogs, social networks or wikis will also learn about methods for increasing the levels of automation in these forms of Web communication.

Annotation for the Semantic Web (Hardcover): S. Handschuh, S. Staab Annotation for the Semantic Web (Hardcover)
S. Handschuh, S. Staab
R2,431 Discovery Miles 24 310 Ships in 12 - 17 working days

The Semantic Web aims at machine agents that thrive on explicitly specified semantics of content in order to search, filter, condense, or negotiate knowledge for their human users. A core technology for making the Semantic Web happen, but also to leverage application areas like Knowledge Management and E-Business, is the field of Semantic Annotation, which turns human-understandable content into a machine understandable form. This book reports on the broad range of technologies that are used to achieve this translation and nourish 3rd millennium applications. The book starts with a survey of the oldest semantic annotations, viz. indexing of publications in libraries. It continues with several techniques for the explicit construction of semantic annotations, including approaches for collaboration and Semantic Web metadata. One of the major means for improving the semantic annotation task is information extraction and much can be learned from the semantic tagging of linguistic corpora. In particular, information extraction is gaining prominence for automating the formerly purely manual annotation task - at least to some extent.An important subclass of information extraction tasks is the goal-oriented extraction of content from HTML and / or XML resources.

The Digital Currency Challenge: Shaping Online Payment Systems through US Financial Regulations (Hardcover): P. Mullan The Digital Currency Challenge: Shaping Online Payment Systems through US Financial Regulations (Hardcover)
P. Mullan
R1,909 Discovery Miles 19 090 Ships in 12 - 17 working days

Private online digital currency systems offer people accessible, convenient, and inexpensive everyday financial tools outside of traditional bank-owned and operated platforms. Digital currency systems facilitate local and international fund transfers, online and offline payments, and simple cash-to-digital everyday financial products without the need for a conventional bank account of any retail bank product. Over the past several years, Bitcoin has grown into an efficient person-to-person and person-to-business payment system without the backing of any bank or financial institution. This phenomenon is producing a new level of an on- and offline commerce and a society much more attuned to digital currency systems. The Digital Currency Challenge details how new 2007-2008 U.S. legal issues surrounding digital currency products forced companies from the U.S. market and caused the Treasury Department to enact stricter regulations. Mullan profiles new and innovative present day digital currency systems, such as Bitcoin, and illustrates how software designers and monetary theorists use new technology to circumvent current U.S. regulations. This work also explains how new digital currency systems are not just software products, but tools providing financial freedom to people in countries all around the world.

Semantic Web: Concepts, Technologies and Applications (Hardcover, 2007 ed.): Karin Breitman, Marco Antonio Casanova, Walt... Semantic Web: Concepts, Technologies and Applications (Hardcover, 2007 ed.)
Karin Breitman, Marco Antonio Casanova, Walt Truszkowski
R1,771 Discovery Miles 17 710 Ships in 12 - 17 working days

The Web is growing at an astounding pace surpassing the 8 billion page mark. However, most pages are still designed for human consumption and cannot be processed by machines. This book provides a well-paced introduction to the Semantic Web. It covers a wide range of topics, from new trends (ontologies, rules) to existing technologies (Web Services and software agents) to more formal aspects (logic and inference). It includes: real-world (and complete) examples of the application of Semantic Web concepts; how the technology presented and discussed throughout the book can be extended to other application areas.

How to Trade Stocks for a Living - 4 Books in 1 - How to Start Day Trading, Dominate the Forex Market, Reduce Risk with... How to Trade Stocks for a Living - 4 Books in 1 - How to Start Day Trading, Dominate the Forex Market, Reduce Risk with Options, and Increase Profit (Hardcover)
Mark Lowe
R1,062 Discovery Miles 10 620 Ships in 12 - 17 working days
Wireless Networking and Mobile Data Management (Hardcover, 1st ed. 2017): R.K. Ghosh Wireless Networking and Mobile Data Management (Hardcover, 1st ed. 2017)
R.K. Ghosh
R4,695 Discovery Miles 46 950 Ships in 10 - 15 working days

This book examines two main topics, namely, Wireless Networking and Mobile Data Management. It is designed around a course the author began teaching to senior undergraduate and master's students at the Department of Computer Science & Engineering of the Indian Institute of Technology Kanpur. The first part of the book, consisting of eight chapters, including the introduction, focuses exclusively on wireless networking aspects. It begins with cellular communication systems, which provided the foundation of wireless networking principles. Three subsequent chapters are devoted to the Global System for Mobile communication (GSM), Wireless Local Area Network (WLAN), Bluetooth, infrared (IR), ZigBee and 6LoWPAN protocols. There is also a chapter on routings in ad hoc networks, an area that is currently being intensively researched due to its potential applications in areas of vehicular network, traffic management, tactical and military systems. Furthermore, the book discusses mobile operating systems and wireless network application level protocols such as Wireless Application Protocols (WAP), Mobile IP and Mosh. The second part highlights mobile data management. It addresses the issues like location management, the importance of replication and caching in mobile environments, the concept of broadcast disk and indexing in air, storage systems for sharing data in mobile environments, and building smart environments. Given that the design of algorithms is the key to applications in data management; this part begins with a chapter on the type of paradigm shift that has been introduced in the design of algorithms, especially due to asymmetry in mobile environments. Lastly, the closing chapter of the book explores smart environments, showing the readers how wireless technology and mobile data management can be combined to provide optimum comfort for human life. Though the book has been structured as a monograph, it can be used both as a textbook and as a reference material for researchers and developers working in the area.

Managed Grids and Cloud Systems in the Asia-Pacific Research Community (Hardcover, 2010 ed.): Simon C. Lin, Eric Yen Managed Grids and Cloud Systems in the Asia-Pacific Research Community (Hardcover, 2010 ed.)
Simon C. Lin, Eric Yen
R6,091 Discovery Miles 60 910 Ships in 10 - 15 working days

ISGC 2009, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan in April 2009 bringing together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and introduce future development in the field of Grid Computing. Managed Grids and Cloud Systems in the Asia-Pacific Research Community presents the latest achievements in grid technology including Cloud Computing. This volume also covers international projects in Grid Operation, Grid Middleware, E-Science applications, technical developments in grid operations and management, Security and Networking, Digital Library and more. The resources used to support these advances, such as volunteer grids, production managed grids, and cloud systems are discussed in detail. This book is designed for a professional audience composed of grid users, developers and researchers working in the grid computing. Advanced-level students focusing on computer science and engineering will find this book valuable as a reference or secondary text book.

Trust in Electronic Commerce: The Role of Trust from a Legal - The Role of Trust from a Legal, an Organizational and a... Trust in Electronic Commerce: The Role of Trust from a Legal - The Role of Trust from a Legal, an Organizational and a Technical Point of View (Hardcover)
J. E. J. Prins, P.M.A. Ribbers, Henk C.A. van Tilborg, A.F.L. Veth
R5,386 Discovery Miles 53 860 Ships in 10 - 15 working days

Electronic commerce is here to stay. No matter how big the dot-com crisis was or how far the e-entrepreneurs' shares fell in the market, the fact remains that there is still confidence in electronic trading. At least it would appear that investors are confident in e-companies again. However, not only trust of venture capitalists is of importance--consumers also have to have faith in on-line business. After all, without consumers there is no e-business. Interacting lawyers, technicians and economists are needed to create a trustworthy electronic commerce environment. To achieve this environment, thorough and inter-disciplinary research is required and that is exactly what this book is about. Researchers of the project Enabling Electronic Commerce from the Dutch universities of Tilburg and Eindhoven have chosen a number of e-topics to elaborate on trust from their point of view. This volume makes clear that the various disciplines can and will play a role in developing conditions for trust and thus contribute to a successful electronic market.

Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R564 Discovery Miles 5 640 Ships in 10 - 15 working days
Swing Trading Strategies 2021 - Complete Investing Guide For Beginners (Hardcover): Ariel House Swing Trading Strategies 2021 - Complete Investing Guide For Beginners (Hardcover)
Ariel House
R1,042 R892 Discovery Miles 8 920 Save R150 (14%) Ships in 10 - 15 working days
Evaluating Websites and Web Services (Hardcover): Denis Yannacopoulos, Panagiotis Manolitzas, Nikolaos Matsatsinis, Evangelos... Evaluating Websites and Web Services (Hardcover)
Denis Yannacopoulos, Panagiotis Manolitzas, Nikolaos Matsatsinis, Evangelos Grigoroudis
R6,175 Discovery Miles 61 750 Ships in 10 - 15 working days

The pervasiveness of the Internet has had a significant impact on global politics, economics, and culture. To create a truly effective product in such a saturated digital environment, developers must study what has come before and how they can utilize existing tools to even greater effect. Evaluating Websites and Web Services: Interdisciplinary Perspectives on User Satisfaction explores some of the various approaches to the study and assessment of Internet technologies, providing scholars, researchers, developers, and professionals with critical knowledge and an interdisciplinary perspective on e-services in a variety of functional areas, from government and commerce to social media and education.

Spatial Data on the Web - Modeling and Management (Hardcover, 2007 ed.): Alberto Belussi, Barbara Catania, Eliseo Clementini,... Spatial Data on the Web - Modeling and Management (Hardcover, 2007 ed.)
Alberto Belussi, Barbara Catania, Eliseo Clementini, Elena Ferrari
R4,615 Discovery Miles 46 150 Ships in 10 - 15 working days

This book focuses on the modeling and management of spatial data in distributed systems. The authors have structured the contributions from internationally renowned researchers into four parts. The book offers researchers an excellent overview of the state-of-the-art in modeling and management of spatial data in distributed environments, while it may also be the basis of specialized courses on Web-based geographical information systems.

Forex Trading for Beginners & Dummies (Hardcover): Giovanni Rigters Forex Trading for Beginners & Dummies (Hardcover)
Giovanni Rigters
R527 Discovery Miles 5 270 Ships in 12 - 17 working days
Economics of Information Security and Privacy (Hardcover, 2010 Ed.): Tyler Moore, David Pym, Christos Ioannidis Economics of Information Security and Privacy (Hardcover, 2010 Ed.)
Tyler Moore, David Pym, Christos Ioannidis
R6,071 Discovery Miles 60 710 Ships in 10 - 15 working days

The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.

Knowledge and Information Technology Management - Human and Social Perspectives (Hardcover): Knowledge and Information Technology Management - Human and Social Perspectives (Hardcover)
R2,528 Discovery Miles 25 280 Ships in 12 - 17 working days

The importance of knowledge and information technology management has been emphasized both by researchers and practitioners in order for companies to compete in the global market. Now such technologies have become crucial in a sense that there is a need to understand the business and operations strategies, as well as how the development of IT would contribute to knowledge management and therefore increase competitiveness. Knowledge and Information Technology Management: Human and Social Perspectives strives to explore the human resource and social dimensions of knowledge and IT management, to discuss the opportunities and major issues related to the management of people along the supply chain in Internet marketing, and to provide an understanding of how the human resource and the IT management should complement each other for improved communication and competitiveness.

Smart Collaborative Identifier Network - A Promising Design for Future Internet (Hardcover, 1st ed. 2016): Hongke Zhang, Wei... Smart Collaborative Identifier Network - A Promising Design for Future Internet (Hardcover, 1st ed. 2016)
Hongke Zhang, Wei Su, Wei Quan
R4,328 R3,745 Discovery Miles 37 450 Save R583 (13%) Ships in 12 - 17 working days

This book introduces a promising design for future Internet, the Smart Collaborative Identifier NETwork (SINET). By examining cutting-edge research from around the world, it is the first book to provide a comprehensive survey of SINET, including its basic theories and principles, a broad range of architectures, protocols, standards, and future research directions. For further investigation, the book also provides readers an experimental analysis of SINET to promote further, independent research. The second part of the book presents in detail key technologies in SINET such as scalable routing, efficient mapping systems, mobility management and security issues. In turn, the last part presents various implementations of SINET, assessing its merits. The authors believe SINET will greatly benefit researchers involved in designing future Internet thanks to its high degree of flexibility, security, manageability, mobility support and efficient resource utilization.

The Multimedia Internet (Hardcover, 1st ed. 2005. Corr. 2nd printing 2006): Stephen Weinstein The Multimedia Internet (Hardcover, 1st ed. 2005. Corr. 2nd printing 2006)
Stephen Weinstein
R3,264 Discovery Miles 32 640 Ships in 10 - 15 working days

Here is a thorough, not-overly-complex introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking); compressive encoding of digital media; and Internet protocol and services. All the contributing systems elements are explained through descriptive text and numerous illustrative figures; the result is a book well-suited toward non-specialists, preferably with technical background, who need well-composed tutorial introductions to the three foundation areas. The text discusses the latest advances in digital audio and video encoding, optical and wireless communications technologies, high-speed access networks, and IP-based media streaming, all crucial enablers of the multimedia Internet.

Geospatial Services and Applications for the Internet (Hardcover, 2008 ed.): John T. Sample, Kevin Shaw, Shengru Tu, Mahdi... Geospatial Services and Applications for the Internet (Hardcover, 2008 ed.)
John T. Sample, Kevin Shaw, Shengru Tu, Mahdi Abdelguerfi
R3,024 Discovery Miles 30 240 Ships in 10 - 15 working days

The use of geospatial technologies has become ubiquitous since the leading Internet vendors delivered a number of popular map websites. This book covers a wide spectrum of techniques, model methodologies and theories on development and applications of GIS relative to the internet. It includes coverage of business process services, and integration of GIS into global enterprise information systems and service architectures. The world's experts in this emerging field present examples and case studies for location-based services, coastal restoration, urban planning, battlefield planning, rehearsal environmental analysis and assessment.

Optimal Mobile Sensing and Actuation Policies in Cyber-physical Systems (Hardcover, 2012): Christophe Tricaud, Yangquan Chen Optimal Mobile Sensing and Actuation Policies in Cyber-physical Systems (Hardcover, 2012)
Christophe Tricaud, Yangquan Chen
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

A successful cyber-physical system, a complex interweaving of hardware and software with some part of the physical environment, depends on proper identification of the, often pre-existing, physical element. A bespoke "cyber" part of the system may then be designed from scratch. Optimal Mobile Sensing and Actuation Strategies in Cyber-physical Systems focuses on distributed-parameter systems the dynamics of which can be modelled with partial differential equations. These are very challenging to observe, their states and inputs being distributed throughout a spatial domain. Consequently, systematic approaches to the optimization of sensor location have to be devised for parameter estimation. The text begins by reviewing the field of cyber-physical systems and introducing background notions of distributed parameter systems and optimal observation theory. New research problems are then defined within this framework. Two important problems considered are optimal mobile sensor trajectory planning and the accuracy effects and allocation of remote sensors. These are followed up with a solution to the problem of optimal robust estimation. Actuation policies are then introduced into the framework with the purpose of improving estimation and optimizing the trajectories of both sensors and actuators simultaneously. The large number of illustrations within the text will assist the reader to visualize the application of the methods proposed. A group of similar examples are used throughout the book to help the reader assimilate the material more easily. The monograph concentrates on the use of methods for which a cyber-physical-systems infrastructure is required. The methods are computationally heavy and require mobile sensors and actuators with communications abilities. Application examples cover fields from environmental science to national security so that readers are encouraged to link the ideas of cyber-physical systems with their own research.

Forex And Crypto 2021 - Make Money Trading Online With The $11,000 per Month Guide (2 Books In 1) (Hardcover): David Uchiha Forex And Crypto 2021 - Make Money Trading Online With The $11,000 per Month Guide (2 Books In 1) (Hardcover)
David Uchiha
R825 Discovery Miles 8 250 Ships in 12 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Social Media Marketing - A Quickstudy…
Edwards Poster R252 Discovery Miles 2 520
Research Anthology on Applying Social…
Information R Management Association Hardcover R10,270 Discovery Miles 102 700
Intro to Python for Computer Science and…
Paul Deitel Paperback R2,441 R2,227 Discovery Miles 22 270
From Striving to Thriving - A New Model…
Cliff Walker Paperback R295 R272 Discovery Miles 2 720
The Honest Guide to Becoming A Digital…
Elizabeth Benton Paperback R240 Discovery Miles 2 400
The Price Of Money - How To Prosper In A…
Rob Dix Paperback R438 Discovery Miles 4 380
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, … Hardcover R7,080 Discovery Miles 70 800
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R382 Discovery Miles 3 820
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel Paperback R900 R750 Discovery Miles 7 500
Relativity - The Special and The General…
Albert Einstein Hardcover R1,165 R958 Discovery Miles 9 580

 

Partners