0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (18)
  • R500+ (4,488)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition - International... Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition - International Conferences, SIP, WSE, and ICHCI 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings (Paperback, 2012 ed.)
Tai-Hoon Kim, Sabah Mohammed, Carlos Ramos, Jemal Abawajy, Byeong Ho Kang, …
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days

This book comprises the refereed proceedings of the International Conferences, SIP, WSE, and ICHCI 2012, held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of signal processing, image processing, and pattern recognition, and Web science and engineering, and human computer interaction.

Compression and Coding Algorithms (Paperback, Softcover reprint of the original 1st ed. 2002): Alistair Moffat, Andrew Turpin Compression and Coding Algorithms (Paperback, Softcover reprint of the original 1st ed. 2002)
Alistair Moffat, Andrew Turpin
R1,407 Discovery Miles 14 070 Ships in 18 - 22 working days

Compression and Coding Algorithms describes in detail the coding mechanisms that are available for use in data compression systems. The well known Huffman coding technique is one mechanism, but there have been many others developed over the past few decades, and this book describes, explains and assesses them. People undertaking research of software development in the areas of compression and coding algorithms will find this book an indispensable reference. In particular, the careful and detailed description of algorithms and their implementation, plus accompanying pseudo-code that can be readily implemented on computer, make this book a definitive reference in an area currently without one.

Optical Packet Access Protocols for WDM Networks (Paperback, Softcover reprint of the original 1st ed. 2002): Kemal Bengi Optical Packet Access Protocols for WDM Networks (Paperback, Softcover reprint of the original 1st ed. 2002)
Kemal Bengi
R2,650 Discovery Miles 26 500 Ships in 18 - 22 working days

The breathtaking success of the WDM technology in backbone networks also pushes the development and implementation of optical packet-switched WDM local and metropolitan area networks. Local and metropolitan area optical WDM networks are emerging as viable and cost-effective solutions for many telecommunication operators and service providers who have to face an extremely growing bandwidth demand and expensive additional fiber installation costs. Thus, the strong need for the development of novel high-speed architectures and protocols for such networks arises. In Optical Packet Access Protocols for WDM Networks, different basic and novel medium access control (MAC) protocols for WDM-based LANs/MANs, typically belonging to the group of single-hop networks, are proposed and analyzed. Thereby, solutions for the direct and efficient support of distinct Quality-of-Service (QoS) classes over the WDM transmission layer are provided.Besides a comprehensive overview on the state-of-the-art photonic metro networks, highly dynamic reservation-based access protocols relying on the passive-star and the ring topology are presented while assuming the deployment of wavelength-tunable transceivers at the network nodes. Optical Packet Access Protocols for WDM Networks provides both a comprehensive survey on existing WDM local and metro lightwave systems and the design of novel highly efficient medium access control protocols with QoS support for such systems. Accordingly, this work is appropriate for communication and network engineers from both the academic and industrial world working in the field of optical communication networks, computer science, and communication engineering.

Telecommunications Network Planning (Paperback, Softcover reprint of the original 1st ed. 1999): Brunilde Sanso, Patrick Soriano Telecommunications Network Planning (Paperback, Softcover reprint of the original 1st ed. 1999)
Brunilde Sanso, Patrick Soriano
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Telecommunications - central to our daily lives - continues to change dramatically. These changes are the result of technological advances, deregulation, the proliferation of broadband service offers, and the spectacular popularity of the Internet and wireless services. In such adynamic technological and economic environment, competition is increasing among service providers and among equipment manufacturers. Consequently, optimization of the planning process is becoming essential. Although telecommunications network planning has been tackled by the Operations Research community for some time, many fundamental problems remain challenging. Through its fourteen chapters, this book covers some new and some still challenging older problems which arise in the planning of telecommunication networks. Telecommunications Network Planning will benefit both telecommunications practitioners looking for efficient methods to solve their problems and operations researchers interested in telecommunications. The book examines network design and dimensioning problems; it explores Operation Research issues related to a new standard Asynchronous Transfer Mode (ATM); it overviews problems that arise when designing survivable SDH/SONET Networks; it considers some broadband network problems; and it concludes with three chapters on wireless and mobile networks. Leading area researchers have contributed their recent research on the telecommunications and network topics treated in the volume.

Resource Management for Device-to-Device Underlay Communication (Paperback, 2014 ed.): Lingyang Song, Zhu Han, Chen Xu Resource Management for Device-to-Device Underlay Communication (Paperback, 2014 ed.)
Lingyang Song, Zhu Han, Chen Xu
R1,253 Discovery Miles 12 530 Ships in 18 - 22 working days

Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication. This brief presents the state-of-the-art research on resource management for D2D communication underlaying cellular networks. Those who work with D2D communication will use this book's information to help ensure their work is as efficient as possible. Along with the survey of existing work, this book also includes the fundamental theories, key techniques, and applications.

System Simulation and Scientific Computing, Part II - International Conference, ICSC 2012, Shanghai, China, October 27-30,... System Simulation and Scientific Computing, Part II - International Conference, ICSC 2012, Shanghai, China, October 27-30, 2012. Proceedings, Part II (Paperback, 2012 ed.)
Tianyuan Xiao, Lin Zhang, Shiwei Ma
R1,454 Discovery Miles 14 540 Ships in 18 - 22 working days

The Three-Volume-Set CCIS 323, 324, 325 (AsiaSim 2012) together with the Two-Volume-Set CCIS 326, 327 (ICSC 2012) constitutes the refereed proceedings of the Asia Simulation Conference, AsiaSim 2012, and the International Conference on System Simulation, ICSC 2012, held in Shanghai, China, in October 2012. The 267 revised full papers presented were carefully reviewed and selected from 906 submissions. The papers are organized in topical sections on modeling theory and technology; modeling and simulation technology on synthesized environment and virtual reality environment; pervasive computing and simulation technology; embedded computing and simulation technology; verification, validation and accreditation technology; networked modeling and simulation technology; modeling and simulation technology of continuous system, discrete system, hybrid system, and intelligent system; high performance computing and simulation technology; cloud simulation technology; modeling and simulation technology of complex system and open, complex, huge system; simulation based acquisition and virtual prototyping engineering technology; simulator; simulation language and intelligent simulation system; parallel and distributed software; CAD, CAE, CAM, CIMS, VP, VM, and VR; visualization; computing and simulation applications in science and engineering; computing and simulation applications in management, society and economics; computing and simulation applications in life and biomedical engineering; computing and simulation applications in energy and environment; computing and simulation applications in education; computing and simulation applications in military field; computing and simulation applications in medical field.

Metropolitan Area WDM Networks - An AWG Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004): Martin Maier Metropolitan Area WDM Networks - An AWG Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004)
Martin Maier
R4,027 Discovery Miles 40 270 Ships in 18 - 22 working days

This extensive volume provides a comprehensive and technically detailed overview of the latest metropolitan area WDM network experimental systems, architectures and access protocols. Readers will benefit from the thorough overview and gain an in-depth understanding of current and next-generation metro WDM networks.

Computer Applications for Security, Control and System Engineering - International Conferences, SecTech, CA, CES3 2012, Held in... Computer Applications for Security, Control and System Engineering - International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings (Paperback, 2012 ed.)
Tai-Hoon Kim, Adrian Stoica, Wai-Chi Fang, Thanos Vasilakos, Javier Garcia Villalba, …
R1,465 Discovery Miles 14 650 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.

Advances in Information Technology - 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013.... Advances in Information Technology - 6th International Conference, IAIT 2013, Bangkok, Thailand, December 12-13, 2013. Proceedings (Paperback, 2013)
Borworn Papasratorn, Nipon Charoenkitkarn, Vajirasak Vanijja, Vithida Chongsuphajaisiddhi
R2,100 Discovery Miles 21 000 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Conference on Advances in Information Technology, IAIT 2013, held in Bangkok, Thailand, in December 2013. The 23 revised papers presented in this volume were carefully reviewed and selected from numerous submissions. They deal with all areas related to applied information technology.

Swarm, Evolutionary, and Memetic Computing - 4th International Conference, SEMCCO 2013, Chennai, India, December 19-21, 2013,... Swarm, Evolutionary, and Memetic Computing - 4th International Conference, SEMCCO 2013, Chennai, India, December 19-21, 2013, Proceedings, Part II (Paperback, 2013 ed.)
Bijaya Ketan Panigrahi, Ponnuthurai Nagaratnam Suganthan, Swagatam Das, Shubhransu Sekhar Dash
R2,759 Discovery Miles 27 590 Ships in 18 - 22 working days

The two-volume set LNCS 8297 and LNCS 8298 constitutes the proceedings of the 4th International Conference on Swarm, Evolutionary and Memetic Computing, SEMCCO 2013, held in Chennai, India, in December 2013. The total of 123 papers presented in this volume was carefully reviewed and selected for inclusion in the proceedings. They cover cutting-edge research on swarm, evolutionary and memetic computing, neural and fuzzy computing and its application.

Security-aware Cooperation in Cognitive Radio Networks (Paperback, 2014 ed.): Ning Zhang, Jon W. Mark Security-aware Cooperation in Cognitive Radio Networks (Paperback, 2014 ed.)
Ning Zhang, Jon W. Mark
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An introduction to CRNs and literature survey enhance the discussion while numerical results are provided to demonstrate the viability of the proposed schemes. The brief is designed for researchers and professionals working with cognitive radio networks or interested in cooperation based access. Advanced-level students studying computer communication networks and communications engineering will also find this brief useful.

Simulation, Modeling, and Programming for Autonomous Robots - Third International Conference, SIMPAR 2012, Tsukuba, Japan,... Simulation, Modeling, and Programming for Autonomous Robots - Third International Conference, SIMPAR 2012, Tsukuba, Japan, November 5-8, 2012, Proceedings (Paperback, 2012 ed.)
Itsuki Noda, Noriako Ando, Davide Brugali, James J. Kuffner
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Simulation, Modeling, and Programming for Autonomous Robots, SIMPAR 2012, held in Tsukuba, Japan, in November 2012. The 33 revised full papers and presented together with 3 invited talks were carefully reviewed and selected from 46 submissions. Ten papers describe design of complex behaviors of autonomous robots, 9 address software layers, 8 papers refer to related modeling and learning. The papers are organized in topical sections on mobile robots, software modeling and architecture and humanoid and biped robots.

Large-Scale Complex IT Systems. Development, Operation and Management - 17th Monterey Workshop 2012, Oxford, UK, March 19-21,... Large-Scale Complex IT Systems. Development, Operation and Management - 17th Monterey Workshop 2012, Oxford, UK, March 19-21, 2012, Revised Selected Papers (Paperback, 2012)
Radu Calinescu, David Garlan
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

This book presents the thoroughly refereed and revised post-workshop proceedings of the 17th Monterey Workshop, held in Oxford, UK, in March 2012. The workshop explored the challenges associated with the Development, Operation and Management of Large-Scale complex IT Systems. The 21 revised full papers presented were significantly extended and improved by the insights gained from the productive and lively discussions at the workshop, and the feedback from the post-workshop peer reviews.

Service-Oriented Computing - 10th International Conference, ICSOC 2012, Shanghai, China, November 12-15, 2012, Proceedings... Service-Oriented Computing - 10th International Conference, ICSOC 2012, Shanghai, China, November 12-15, 2012, Proceedings (Paperback, 2012 ed.)
Chengfei Liu, Heiko Ludwig, Farouk Toumani, Qi Yu
R1,548 Discovery Miles 15 480 Ships in 18 - 22 working days

This book constitutes the conference proceedings of the 10th International Conference on Service-Oriented Computing, ICSOC 2012, held in Shanghai, China in November 2012. The 32 full papers and 21 short papers presented were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on service engineering, service management, cloud, service QoS, service security, privacy and personalization, service applications in business and society, service composition and choreography, service scaling and cloud, process management, service description and discovery, service security, privacy and personalization, applications, as well as cloud computing.

Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012,... Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings (Paperback, 2012 ed.)
Tat Wing Chim, Tsz Hon Yuen
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Mobile IP - Present State and Future (Paperback, Softcover reprint of the original 1st ed. 2003): Abdul Sakib Mondal Mobile IP - Present State and Future (Paperback, Softcover reprint of the original 1st ed. 2003)
Abdul Sakib Mondal
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Mobile IP: Present State and Future is an up-to-date introduction to the rapidly evolving field of mobile IP. In addition to detailed coverage of motivation behind mobile IP and fundamental concepts of mobile IP like agent advertisement and discovery, registration and tunneling, the book provides a comprehensive treatment of various associated technical issues such as security, TCP performance, multicasting and integration with wireless. The book has been written to serve as a text for network professionals who are yearning to acquire a clear understanding of this interesting field.

Positive 1D and 2D Systems (Paperback, Softcover reprint of the original 1st ed. 2002): Tadeusz Kaczorek Positive 1D and 2D Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Tadeusz Kaczorek
R1,449 Discovery Miles 14 490 Ships in 18 - 22 working days

Moving on from earlier stochastic and robust control paradigms, this book introduces the reader to the fundamentals of probabilistic methods in the analysis and design of uncertain systems. It significantly reduces the computational cost of high-quality control and the complexity of the algorithms involved.

Information Computing and Applications - 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013. Revised... Information Computing and Applications - 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013. Revised Selected Papers, Part I (Paperback, 2013 ed.)
Yuhang Yang, Maode Ma, Baoxiang Liu
R1,513 Discovery Miles 15 130 Ships in 18 - 22 working days

This two-volume set of CCIS 391 and CCIS 392 constitutes the refereed proceedings of the Fourth International Conference on Information Computing and Applications, ICICA 2013, held in Singapore, in August 2013. The 126 revised full papers presented in both volumes were carefully reviewed and selected from 665 submissions. The papers are organized in topical sections on Internet computing and applications; engineering management and applications; intelligent computing and applications; control engineering and applications; cloud and evolutionary computing; knowledge management and applications; computational statistics and applications.

Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013,... Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Sokratis Katsikas, Isaac Agudo
R1,818 Discovery Miles 18 180 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.

Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India,... Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proceedings (Paperback, 2012)
Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas
R1,472 Discovery Miles 14 720 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.

Wireless ATM and Ad-Hoc Networks - Protocols and Architectures (Paperback, Softcover reprint of the original 1st ed. 1997):... Wireless ATM and Ad-Hoc Networks - Protocols and Architectures (Paperback, Softcover reprint of the original 1st ed. 1997)
C.-K. Toh
R4,021 Discovery Miles 40 210 Ships in 18 - 22 working days

ATM is regarded as the next high speed multimedia networking paradigm. Mobile computing, which is a confluence of mobile communications, computing and networks, is changing the way people work. Wireless ATM combines wireless and ATM technologies to provide mobility support and multimedia services to mobile users. Wireless ATM and Ad-Hoc Networks: Protocols and Architectures, a consolidated reference work, presents the state of the art in wireless ATM technology. It encompasses the protocol and architectural aspects of Wireless ATM networks. The topics covered in this book include: mobile communications and computing, fundamentals of ATM and Wireless ATM, mobile routing and switch discovery, handover protocol design and implementation, mobile quality of service, unifying handover strategy for both unicast and multicast mobile connections, and roaming between Wireless ATM LANs. A novel routing protocol for ad-hoc mobile networks (also known as Cambridge Ad-hoc) is also presented in this book along with information about ETSI HIPERLAN, the RACE Mobile Broadband System, and SUPERNET. This timely book is a valuable reference source for researchers, scientists, consultants, engineers, professors and graduate students working in this new and exciting field.

Middleware 2013 - ACM/IFIP/USENIX 14th International Middleware Conference, Beijing, China, December 9-13, 2013, Proceedings... Middleware 2013 - ACM/IFIP/USENIX 14th International Middleware Conference, Beijing, China, December 9-13, 2013, Proceedings (Paperback, 2013)
David Eyers, Karsten Schwan
R2,724 Discovery Miles 27 240 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 14th International Middleware Conference, held in Beijing, China, in December 2013. The 24 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers cover a wide range of topics including design, implementation, deployment and evaluation of middleware for next-generation platforms such as cloud computing, social networks and large-scale storage and distributed systems. The middleware solutions introduced provide features such as availability, efficiency, scalability, fault-tolerance, trustworthy operation and support security and privacy needs.

Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings... Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings (Paperback, 2013)
Aditya Bagchi, Indrakshi Ray
R2,470 Discovery Miles 24 700 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.

IT Security Management - IT Securiteers - Setting up an IT Security Function (Paperback, 2010 ed.): Alberto Partida, Diego... IT Security Management - IT Securiteers - Setting up an IT Security Function (Paperback, 2010 ed.)
Alberto Partida, Diego Andina
R2,650 Discovery Miles 26 500 Ships in 18 - 22 working days

IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers". They will add value to the business, improving the information security stance of organisations.

A Discipline of Multiprogramming - Programming Theory for Distributed Applications (Paperback, Softcover reprint of the... A Discipline of Multiprogramming - Programming Theory for Distributed Applications (Paperback, Softcover reprint of the original 1st ed. 2001)
Jayadev Misra
R1,448 Discovery Miles 14 480 Ships in 18 - 22 working days

In this book, a programming model is developed that addresses the fundamental issues of 'large-scale programming'. The approach unifies several concepts from database theory, object-oriented programming and designs of reactive systems. The model and the associated theory has been christened "Seuss." The major goal of Seuss is to simplify multiprogramming. To this end, the concern of concurrent implementation is separated from the core program design problem. A program execution is understood as a single thread of control - sequential executions of actions that are chosen according to some scheduling policy. As a consequence, it is possible to reason about the properties of a program from its single execution thread.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Robotic Sailing 2017 - Proceedings of…
Kjell Ivar Overgard Hardcover R4,444 Discovery Miles 44 440
On the Cusp - From Population Boom to…
Charles S. Pearson Hardcover R1,179 Discovery Miles 11 790
Navigation and Control of Autonomous…
Sanjay Sharma, Bidyadhar Subudhi Hardcover R3,319 R2,997 Discovery Miles 29 970
Statistical - Ten Easy Ways to Avoid…
Anthony Reuben Hardcover  (1)
R432 R233 Discovery Miles 2 330
The Elements of Graphical Statics and…
Augustus Jay Du Bois Hardcover R768 Discovery Miles 7 680
Bridge Hydraulics
Les Hamill Paperback R1,995 Discovery Miles 19 950
Masonry Bridges, Viaducts and Aqueducts
Ted Ruddock Hardcover R1,698 Discovery Miles 16 980
Economics of Construction in Relation to…
Robert H. Bow Hardcover R765 Discovery Miles 7 650
Consumer Credit Models - Pricing, Profit…
Lyn C. Thomas Hardcover R3,308 Discovery Miles 33 080
Accelerated Bridge Construction - Best…
Mohiuddin Ali Khan Paperback R2,493 Discovery Miles 24 930

 

Partners