0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (2)
  • R250 - R500 (18)
  • R500+ (4,488)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011,... Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings (Paperback, Edition.)
Udaya Parampalli, Philip Hawkes
R1,456 Discovery Miles 14 560 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback,... Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback, Edition.)
Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe
R1,739 Discovery Miles 17 390 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn't the attacker's capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.

Multifractal Based Network Traffic Modeling (Paperback, Softcover reprint of the original 1st ed. 2003): Murali Krishna P.,... Multifractal Based Network Traffic Modeling (Paperback, Softcover reprint of the original 1st ed. 2003)
Murali Krishna P., Vikram M. Gadre, Uday B. Desai
R2,641 Discovery Miles 26 410 Ships in 18 - 22 working days

This helpful book provides an overview of existing broadband traffic modelling based on the Poisson process and its variants. It also offers very good coverage of models based on self-similar processes. The authors have focused throughout on the problem of broadband traffic modelling.

Artificial Intelligence in Medicine - 13th Conference on Artificial Intelligence in Medicine, AIME 2011, Bled, Slovenia, July... Artificial Intelligence in Medicine - 13th Conference on Artificial Intelligence in Medicine, AIME 2011, Bled, Slovenia, July 2-6, 2011, Proceedings (Paperback, 2011 ed.)
Mor Peleg, Nada Lavrac, Carlo Combi
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th Conference on Artificial Intelligence in Medicine, AIME 2011, held in Bled, Slovenia, in July 2011.

The 42 revised full and short papers presented together with 2 invited talks were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on knowledge-based systems; data mining; special session on AI applications; probabilistic modeling and reasoning; terminologies and ontologies; temporal reasoning and temporal data mining; therapy planning, scheduling and guideline-based care; and natural language processing.

Online Communities and Social Computing - 4th International Conference, OCSC 2011, Held as Part of HCI International 2011,... Online Communities and Social Computing - 4th International Conference, OCSC 2011, Held as Part of HCI International 2011, Orlando, FL, USA, July 9-14, 2011. Proceedings (Paperback, 2011 ed.)
A. Ant Ozok, Panayiotis Zaphiris
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Conference on Online Communities and Social Computing, OCSC 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011 with 10 other thematically similar conferences. The 77 revised papers presented were carefully reviewed and selected from numerous submissions. The papers accepted for presentation thoroughly cover the thematic area of online communities and social computing, addressing the following major topics: on-line communities and intelligent agents in education and research; blogs, Wikis and Twitters; social computing in business and the enterprise; social computing in everyday life; information management in social computing.

Design, User Experience, and Usability. Theory, Methods, Tools and Practice - First International Conference, DUXU 2011, Held... Design, User Experience, and Usability. Theory, Methods, Tools and Practice - First International Conference, DUXU 2011, Held as Part of HCI International 2011, Orlando, FL, USA, July 9-14, 2011, Proceedings, Part I (Paperback, Edition.)
Aaron Marcus
R2,798 Discovery Miles 27 980 Ships in 18 - 22 working days

The two-volume set LNCS 6769 + LNCS 6770 constitutes the proceedings of the First International Conference on Design, User Experience, and Usability, DUXU 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, incorporating 12 thematically similar conferences. A total of 4039 contributions was submitted to HCII 2011, of which 1318 papers were accepted for publication. The total of 154 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on DUXU theory, methods and tools; DUXU guidelines and standards; novel DUXU: devices and their user interfaces; DUXU in industry; DUXU in the mobile and vehicle context; DXU in Web environment; DUXU and ubiquitous interaction/appearance; DUXU in the development and usage lifecycle; DUXU evaluation; and DUXU beyond usability: culture, branding, and emotions.

Advances in Information Technology and Education - International Conference, CSE 2011, Qingdao, China, July 9-10, 2011,... Advances in Information Technology and Education - International Conference, CSE 2011, Qingdao, China, July 9-10, 2011, Proceedings, Part I (Paperback)
Honghua Tan, Mark Zhou
R2,740 Discovery Miles 27 400 Ships in 18 - 22 working days

This two-volume set (CCIS 201 and CCIS 202) constitutes the refereed proceedings of the International Conference on Computer Science and Education, CSE 2011, held in Qingdao, China, in July 2011. The 164 revised full papers presented in both volumes were carefully reviewed and selected from a large number of submissions. The papers address a large number of research topics and applications: from artificial intelligence to computers and information technology; from education systems to methods research and other related issues; such as: database technology, computer architecture, software engineering, computer graphics, control technology, systems engineering, network, communication, and other advanced technology, computer education, and life-long education.

Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network... Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings (Paperback, 2012 ed.)
Igor Kotenko, Victor Skormin
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.

Trusted Systems - 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings (Paperback, 2012):... Trusted Systems - 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings (Paperback, 2012)
Chris J. Mitchell, Allan Tomlinson
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.

Software Composition - 10th International Conference, SC 2011, Zurich, Switzerland, June 30 - July 1, 2011, Proceedings... Software Composition - 10th International Conference, SC 2011, Zurich, Switzerland, June 30 - July 1, 2011, Proceedings (Paperback, 2011 ed.)
Sven Apel, Ethan Jackson
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The book constitutes the refereed proceedings of the 10th International Conference on Software Composition, SC 2011, held in Zurich, Switzerland, in June/July 2011, co-located with TOOLS 2011 Federated Conferences. The 10 revised full papers and 2 short papers were carefully reviewed and selected from 32 initial submissions for inclusion in the book. The papers reflect all current research in software composition and are organized in topical sections on composition and interfaces, aspects and features, and applications.

CDMA Techniques for Third Generation Mobile Systems (Paperback, Softcover reprint of the original 1st ed. 1999): Francis... CDMA Techniques for Third Generation Mobile Systems (Paperback, Softcover reprint of the original 1st ed. 1999)
Francis Swarts, Pieter van Rooyen, Ian Oppermann, Michiel P. Loetter
R4,023 Discovery Miles 40 230 Ships in 18 - 22 working days

CDMA Techniques for Third Generation Mobile Systems presents advanced techniques for analyzing and developing third generation mobile telecommunication systems. Coverage includes analysis of CDMA-based systems, multi-user receivers, Turbo coding for mobile radio applications, spatial and temporal processing techniques as well as software radio techniques. Special emphasis has been given to recent advances in coding techniques, smart antenna systems, spatial filtering, and software implementation issues. Internationally recognized specialists contributed to this volume, and each chapter has been reviewed and edited for uniformity. CDMA Techniques for Third Generation Mobile Systems is an invaluable reference work for engineers and researchers involved in the development of specific CDMA systems.

Disseminating Security Updates at Internet Scale (Paperback, Softcover reprint of the original 1st ed. 2003): Jun Li, Peter... Disseminating Security Updates at Internet Scale (Paperback, Softcover reprint of the original 1st ed. 2003)
Jun Li, Peter Reiher, Gerald J. Popek
R2,621 Discovery Miles 26 210 Ships in 18 - 22 working days

Disseminating Security Updates at Internet Scale describes a new system, "Revere", that addresses these problems. "Revere" builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes. "Revere" also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure "Revere" overlay networks, considering possible attacks and countermeasures. Disseminating Security Updates at Internet Scale presents experimental measurements of a prototype implementation of "Revere" gathered using a large-scale oriented approach. These measurements suggest that "Revere" can deliver security updates at the required scale, speed and resiliency for a reasonable cost. Disseminating Security Updates at Internet Scale will be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by "Revere". The "Revere" solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here will be helpful in designing a customized approach for such systems.

Optical Networks - Architecture and Survivability (Paperback, Softcover reprint of the original 1st ed. 2003): Hussein T.... Optical Networks - Architecture and Survivability (Paperback, Softcover reprint of the original 1st ed. 2003)
Hussein T. Mouftah, Pin-Han Ho
R4,018 Discovery Miles 40 180 Ships in 18 - 22 working days

Optical Networks - Architecture and Survivability, is a state-of-the-art work on survivable and cost-effective design of control and management for networks with IP directly over Wavelength Division Multiplexing (WDM) technology (or called Optical Internet). The authors address issues of signaling mechanisms, resource reservation, and survivable routing and wavelength assignment. Special emphasis has been given to the design of meshed, middle-sized, and wavelength-routed networks with dynamic traffic in the optical domain, such as the next-generation Metropolitan Area Network.

Research and development engineers, graduate students studying wavelength-routed WDM networks, and senior undergraduate students with a background in algorithms and networking will find this book interesting and useful. This work may also be used as supplemental readings for graduate courses on internetworking, routing, survivability, and network planning algorithms.

Photonic Slot Routing in Optical Transport Networks (Paperback, Softcover reprint of the original 1st ed. 2003): Gosse Wedzinga Photonic Slot Routing in Optical Transport Networks (Paperback, Softcover reprint of the original 1st ed. 2003)
Gosse Wedzinga
R2,634 Discovery Miles 26 340 Ships in 18 - 22 working days

All-optical networking is generally believed to be the only solution for coping with the ever-increasing demands in bandwidth, such as the World Wide Web application. Optical backbone networks efficiently achieve a high level of traffic aggregation by multiplexing numerous users on circuit-switched wavelength paths - the so-called wavelength routing approach. In contrast, the reduced level of traffic aggregation in access and metro networks makes wavelength routing solutions not adequate. In these network areas, packet-interleaved optical time-division multiplexing with its finer and more dynamic bandwidth allocation is advocated. The book presents such an approach, known as photonic slot routing. It illustrates how this approach may provide a cost-effective solution to deploying all-optical transport networks, using today's optical device technology. To that end, the author combines DWDM-technology with fixed slot optical switching, and gives a comprehensive description of this approach in which slots are aligned across the wavelengths to form groups of data-flows that propagate as a whole inside the network. Operating algorithms are developed, and network performance is analyzed, both by means of theoretical analysis and many simulations of sample networks. This work will be of particular interest to researchers and professionals who are active in photonic networking.

Progress in Cryptology - INDOCRYPT 2012 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14,... Progress in Cryptology - INDOCRYPT 2012 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, Proceedings (Paperback, 2012)
Steven Galbraith, Mridul Nandi
R1,485 Discovery Miles 14 850 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Recent Trends in Wireless and Mobile Networks - Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey,... Recent Trends in Wireless and Mobile Networks - Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey, June 26-28, 2011. Proceedings (Paperback, Edition.)
Abdulkadir OEzcan, Jan Zizka, Dhinaharan Nagamalai
R2,694 Discovery Miles 26 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Wireless, Mobile Networks, WiMo 2011, and of The Third International Conference on Computer Networks and Communications, CoNeCo 2011, held in Ankara, Turkey, in June 2011. The 40 revised full papers presented were carefully reviewed and selected from 202 submissions.

Computing and Combinatorics - 17th Annual International Conference, COCOON 2011, Dallas, TX, USA, August 14-16, 2011.... Computing and Combinatorics - 17th Annual International Conference, COCOON 2011, Dallas, TX, USA, August 14-16, 2011. Proceedings (Paperback, 2011 ed.)
Bin Fu, Dingzhu Du
R1,505 Discovery Miles 15 050 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th Annual International Conference on Computing and Combinatorics, held in Dallas, TX, USA, in August 2011. The 54 revised full papers presented were carefully reviewed and selected from 136 submissions. Topics covered are algorithms and data structures; algorithmic game theory and online algorithms; automata, languages, logic, and computability; combinatorics related to algorithms and complexity; complexity theory; computational learning theory and knowledge discovery; cryptography, reliability and security, and database theory; computational biology and bioinformatics; computational algebra, geometry, and number theory; graph drawing and information visualization; graph theory, communication networks, and optimization; parallel and distributed computing.

Swarm, Evolutionary, and Memetic Computing - Third International Conference, SEMCCO 2012, Bhubaneswar, India, December 20-22,... Swarm, Evolutionary, and Memetic Computing - Third International Conference, SEMCCO 2012, Bhubaneswar, India, December 20-22, 2012, Proceedings (Paperback, 2012 ed.)
Bijaya Ketan Panigrahi, Swagatam Das, Ponnuthurai Nagaratnam Suganthan, Pradipta Kumar Nanda
R1,553 Discovery Miles 15 530 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Swarm, Evolutionary, and Memetic Computing, SEMCCO 2012, held in Bhubaneswar, India, in December 2012. The 96 revised full papers presented were carefully reviewed and selected from 310 initial submissions. The papers cover a wide range of topics in swarm, evolutionary, memetic and other intelligent computing algorithms and their real world applications in problems selected from diverse domains of science and engineering.

Code Division Multiple Access Communications (Paperback, Softcover reprint of the original 1st ed. 1995): Savo G. Glisic,... Code Division Multiple Access Communications (Paperback, Softcover reprint of the original 1st ed. 1995)
Savo G. Glisic, Pentti A. Leppanen
R4,039 Discovery Miles 40 390 Ships in 18 - 22 working days

Code Division Multiple Access (CDMA) has become one of the main candidates for the next generation of mobile land and satellite communication systems. CDMA is based on spread spectrum techniques, which have been used in military applications for over half a century. Only recently, however, has it been recognised that spread spectrum techniques, combined with some additional steps, can provide higher capacity and better flexibility for the mobile cellular radio communications. Code Division Multiple Access Communications comprises a set of contributions from the most distinguished world scientists in the field. These papers review the basic theory and some of the most important problems related to spread spectrum and CDMA. The topics covered centre on the information theory aspects of CDMA; interference suppression and performance analysis. The material presented in this book summarises the main problems in modern CDMA theory and practice and gives a solid starting point for studying this complex and still challenging field. As such Code Division Multiple Access Communications is essential reading for all researchers and designers working in mobile communication systems and provides an excellent text for a course on the subject.

Phase-Locked Loops for Wireless Communications - Digital and Analog Implementation (Paperback, Softcover reprint of the... Phase-Locked Loops for Wireless Communications - Digital and Analog Implementation (Paperback, Softcover reprint of the original 1st ed. 1998)
Donald R. Stephens
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book is intended for the graduate or advanced undergraduate engineer. The primary motivation for writing the text was to present a complete tutorial of phase-locked loops with a consistent notation. As such, it can serve as a textbook in formal classroom instruction, or as a self-study guide for the practicing engineer. A former colleague, Kevin Kreitzer, had suggested that I write a text, with an emphasis on digital phase-locked loops. As modem designers, we were continually receiving requests from other engineers asking for a definitive reference on digital phase-locked loops. There are several good papers in the literature, but there was not a good textbook for either classroom or self-paced study. From my own experience in designing low phase noise synthesizers, I also knew that third-order analog loop design was omitted from most texts. With those requirements, the material in the text seemed to flow naturally. Chapter 1 is the early history of phase-locked loops. I believe that historical knowledge can provide insight to the development and progress of a field, and phase-locked loops are no exception. As discussed in Chapter 1, consumer electronics (color television) prompted a rapid growth in phase-locked loop theory and applications, much like the wireless communications growth today. xiv Preface Although all-analog phase-locked loops are becoming rare, the continuous time nature of analog loops allows a good introduction to phase-locked loop theory."

Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings... Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings (Paperback, Edition.)
Javier Lopez, Gene Tsudik
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

Pervasive Computing - 9th International Conference, Pervasive 2011, San Francisco, USA, June 12-15, 2011. Proceedings... Pervasive Computing - 9th International Conference, Pervasive 2011, San Francisco, USA, June 12-15, 2011. Proceedings (Paperback, Edition.)
Kent Lyons, Jeffrey Hightower, Elaine M. Huang
R1,431 Discovery Miles 14 310 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Pervasive Computing, Pervasive 2011, held in San Francisco, USA, in June 2011. The 19 revised full papers and three short papers presented were carefully reviewed and selected from 93 submissions. The contributions are grouped into the following topical sections: practices with smartphones; sensing at home, sensing at work; predicting the future; location sensing; augmenting mobile phone use; pervasive computing in the public arena; public displays; hands on with sensing; sensing on the body.

Contemporary Computing - 4th International Conference, IC3 2011, Noida, India, August 8-10, 2011. Proceedings (Paperback,... Contemporary Computing - 4th International Conference, IC3 2011, Noida, India, August 8-10, 2011. Proceedings (Paperback, Edition.)
Srinivas Aluru, Sanghamitra Bandyopadhyay, Umit V. Catalyurek, Devdatt Dubhashi, Phillip H. Jones, …
R1,486 Discovery Miles 14 860 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the Fourth International Conference on Contemporary Computing, IC3 2010, held in Noida, India, in August 2011. The 58 revised full papers presented were carefully reviewed and selected from 175 submissions.

Neural Networks in Telecommunications (Paperback, Softcover reprint of the original 1st ed. 1994): Ben Yuhas, Nirwan Ansari Neural Networks in Telecommunications (Paperback, Softcover reprint of the original 1st ed. 1994)
Ben Yuhas, Nirwan Ansari
R7,659 Discovery Miles 76 590 Ships in 18 - 22 working days

Neural Networks in Telecommunications consists of a carefully edited collection of chapters that provides an overview of a wide range of telecommunications tasks being addressed with neural networks. These tasks range from the design and control of the underlying transport network to the filtering, interpretation and manipulation of the transported media. The chapters focus on specific applications, describe specific solutions and demonstrate the benefits that neural networks can provide. By doing this, the authors demonstrate that neural networks should be another tool in the telecommunications engineer's toolbox. Neural networks offer the computational power of nonlinear techniques, while providing a natural path to efficient massively-parallel hardware implementations. In addition, the ability of neural networks to learn allows them to be used on problems where straightforward heuristic or rule-based solutions do not exist. Together these capabilities mean that neural networks offer unique solutions to problems in telecommunications. For engineers and managers in telecommunications, Neural Networks in Telecommunications provides a single point of access to the work being done by leading researchers in this field, and furnishes an in-depth description of neural network applications.

Information and Business Intelligence - International Conference, IBI 2011, Chongqing, China, December 23-25, 2011.... Information and Business Intelligence - International Conference, IBI 2011, Chongqing, China, December 23-25, 2011. Proceedings, Part I (Paperback, 2012 ed.)
Xilong Qu, Chenguang Yang
R1,542 Discovery Miles 15 420 Ships in 18 - 22 working days

This two-volume set (CCIS 267 and CCIS 268) constitutes the refereed proceedings of the International Conference on Information and Business Intelligence, IBI 2011, held in Chongqing, China, in December 2011. The 229 full papers presented were carefully reviewed and selected from 745 submissions. The papers address topics such as communication systems; accounting and agribusiness; information education and educational technology; manufacturing engineering; multimedia convergence; security and trust computing; business teaching and education; international business and marketing; economics and finance; and control systems and digital convergence.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Micro-Tec Spanner Combination (16mm)
The Beltrami Equation - A Geometric…
Vladimir Gutlyanskii, Vladimir Ryazanov, … Hardcover R4,045 Discovery Miles 40 450
The Water-cure Journal, and Herald of…
Anonymous Hardcover R797 Discovery Miles 7 970
Problems in the Calculus, With Formulas…
David D (David Deitch) 1879- Leib Hardcover R839 Discovery Miles 8 390
An Introduction to Complex Analysis
Ravi P. Agarwal, Kanishka Perera, … Hardcover R2,606 Discovery Miles 26 060
The Fibonacci Resonance and Other New…
Clive N. Menhinick Hardcover R1,421 Discovery Miles 14 210
Jacobians Of Matrix Transformation And…
Arak M. Mathai Hardcover R2,532 Discovery Miles 25 320
Edexcel Award in Algebra Level 3…
Paperback R437 Discovery Miles 4 370
Advanced Topics in Linear Algebra…
Kevin O'Meara, John Clark, … Hardcover R2,822 Discovery Miles 28 220
Micro-Tec Spanner Combination (20mm)

 

Partners