0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (6)
  • R100 - R250 (91)
  • R250 - R500 (328)
  • R500+ (2,281)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

.NET and XML (Paperback): Niel M. Bornstein .NET and XML (Paperback)
Niel M. Bornstein
R943 R822 Discovery Miles 8 220 Save R121 (13%) Ships in 18 - 22 working days

If you're seeking ways to build network-based applications or XML-based web services, Microsoft provides most of the tools you'll need. XML is integrated into the .NET Framework and Visual Studio .NET, but if you want to get a grasp on how .NET and XML actually work together, that's a different story. With ."NET & XML," you can get under the hood to see how the .NET Framework implements XML, giving you the skills to write understandable XML-based code that interoperates with code written with other tools, and even other languages.

."NET & XML" starts by introducing XML and the .NET Framework, and then teaches you how to read and write XML before moving on to complex methods for manipulating, navigating, transforming, and constraining it. To demonstrate the power of XML in .NET, author Niel Bornstein builds a simple hardware store inventory system throughout the book. As you move from chapter to chapter, you'll absorb increasingly complex information until you have enough knowledge to successfully program your own XML-based applications. This tutorial also contains a quick reference to the API, plus appendices present additional .NET assemblies that you can use to work with XML, and how to work with the .NET XML configuration file format.

One study puts the potential market for new software based on XML at or near $100 billion over the next five years. The .NET Framework gives you a way to become a part of it. But to use XML and .NET effectively, you need to understand how these two technologies work together. This book gives you the insight to take full advantage of the power the two provide.

Sendmail Cookbook (Paperback): Craig Hunt Sendmail Cookbook (Paperback)
Craig Hunt
R1,120 R948 Discovery Miles 9 480 Save R172 (15%) Ships in 18 - 22 working days

More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators--and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently--only when sendmail is installed or configured. The average system administrator doesn't get enough practice to truly master this inscrutable technology.

Fortunately, there's help. The "sendmail Cookbook" provides step-by-step solutions for the administrator who needs to solve configuration problems fast. Say you need to configure sendmail to relay mail for your clients without creating an open relay that will be abused by spammers. A recipe in the Cookbook shows you how to do just that. No more wading through pages of dense documentation and tutorials and creating your own custom solution--just go directly to the recipe that addresses your specific problem.

Each recipe in the "sendmail Cookbook" outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The discussion of the code is critical because it provides the insight you need to tweak the code for your own circumstances.

The "sendmail Cookbook" begins with an overview of the configuration languages, offering a quick how-to for downloading and compiling the sendmail distribution. Next, you'll find a baseline configuration recipe upon which many of the subsequent configurations, or recipes, in the book are based. Recipes in the following chapters stand on their own and offer solutions for properly configuring important sendmail functions such as:

Delivering and forwarding mail

Relaying

Masquerading

Routing mail

Controlling spam

Strong authentication

Securing the mail transport

Managing the queue

Securing sendmail

"sendmail Cookbook" is more than just a new approach to discussing sendmail configuration. The book also provides lots of new material that doesn't get much coverage elsewhere--STARTTLS and AUTH are given entire chapters, and LDAP is covered in recipes throughout the book. But most of all, this book is about saving time--something that most system administrators have in short supply. Pick up the "sendmail Cookbook" and say good-bye to sendmail dread.

NET Framework Essentials 3e (Paperback, 3rd Revised edition): Thuan Thai NET Framework Essentials 3e (Paperback, 3rd Revised edition)
Thuan Thai
R1,000 R854 Discovery Miles 8 540 Save R146 (15%) Ships in 18 - 22 working days

Fully updated for version 1.1 of the .NET Framework, .NET Framework Essentials, 3rd Edition is an objective, concise, no-nonsense overview of the Microsoft .NET Framework for developing web applications and services. Written for intermediate to advanced VB, C/C++, Java, and Delphi developers, .NET Framework Essentials, 3rd Edition is also useful to system architects and leaders who are assessing tools for future projects.

RTF Pocket Guide (Paperback): Sean M. Burke RTF Pocket Guide (Paperback)
Sean M. Burke
R230 R216 Discovery Miles 2 160 Save R14 (6%) Ships in 18 - 22 working days

Any programmer working with text files today needs a way to deal with Microsoft® Word documents and their underlying Rich Text Format. RTF is notoriously difficult to work with, and our handy quick reference is the only book available on what many developers call "this maddeningly unstructured format." Small and easy to use on the job, RTF Pocket Guide focuses on the "workhorse" codes that programmers can't do without, including text style codes, paragraph formatting codes, and page formatting codes-- all with many examples of real use.

Programming NET Security (Paperback): Adam Freeman Programming NET Security (Paperback)
Adam Freeman
R1,233 R1,061 Discovery Miles 10 610 Save R172 (14%) Ships in 18 - 22 working days

With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.

Cocoa in a Nutshell (Paperback): Michael Beam Cocoa in a Nutshell (Paperback)
Michael Beam
R1,045 R899 Discovery Miles 8 990 Save R146 (14%) Ships in 18 - 22 working days

Cocoa in a Nutshell begins with a complete overview of Cocoa's object classes. It provides developers who may be experienced with other application toolkits the grounding they'll need to start developing Cocoa applications. A complement to Apple's documentation, it is the only reference to the classes, functions, types, constants, protocols, and methods that make up Cocoa's Foundation and Application Kit frameworks, based on the Jaguar release (Mac OS X 10.2).

Samba Pocket Reference 2e (Paperback, 2nd Revised edition): Jay Ts Samba Pocket Reference 2e (Paperback, 2nd Revised edition)
Jay Ts
R225 R210 Discovery Miles 2 100 Save R15 (7%) Ships in 18 - 22 working days

The current edition of Samba Pocket Reference covers Samba 2.x and the most important features of 3.0, which was under development as this book went to print. New options pertain to Samba's acting as a primary domain controller and as a domain member server, its support for the use of Windows NT/2000/XP authentication and filesystem security on the host Unix system, and access to shared files and printers from Unix clients.

Outlook Pocket Guide (Paperback): Walter Glenn Outlook Pocket Guide (Paperback)
Walter Glenn
R232 R218 Discovery Miles 2 180 Save R14 (6%) Ships in 18 - 22 working days

Any Microsoft Outlook® user knows that the program is about more than just email: it's a suite of organizational tools that can help you manage your schedule, contacts, and deadlines with remarkable efficiency. Regardless of experience, you'll find that the Outlook Pocket Guide significantly decreases the amount of time you spend trying to figure out tricky problems and decipher the various settings.

Macintosh Troubleshooting Pocket Guide (Paperback): Aaron Freimark & Tekserve David Learner Macintosh Troubleshooting Pocket Guide (Paperback)
Aaron Freimark & Tekserve David Learner
R215 R198 Discovery Miles 1 980 Save R17 (8%) Ships in 18 - 22 working days

The Macintosh Troubleshooting Pocket Guide covers the most common user hardware and software trouble. It's not just a book for Mac OS X (although it includes tips for OS X and Jaguar), it's for anyone who owns a Mac of any type-- there are software tips going back as far as OS 6. This slim guide distills the answers to the urgent questions that Tekserve's employee's answer every week into a handy guide that fits in your back pocket or alongside your keyboard.

Programming .NET Web Services (Paperback): Alex Ferrara Programming .NET Web Services (Paperback)
Alex Ferrara
R1,054 Discovery Miles 10 540 Ships in 18 - 22 working days

This comprehensive tutorial teaches programmers the skills they need to develop XML web services hosted on the Microsoft .NET platform. Programming .NET Web Services also shows you how to consume these services on both Microsoft and non-Windows clients, and how to weave them into well-designed and scalable applications. For those interested in building industrial-strength web services, this book is full of practical information and good old-fashioned advice.

DNS & Bind Cookbook (Paperback, 1st ed): Cricket Liu DNS & Bind Cookbook (Paperback, 1st ed)
Cricket Liu
R877 R756 Discovery Miles 7 560 Save R121 (14%) Ships in 18 - 22 working days

The DNS & BIND Cookbook presents solutions to the many problems faced by network administrators responsible for a name server. This title is an indispensable companion to DNS & BIND, 4th Edition, the definitive guide to the critical task of name server administration. The cookbook contains dozens of code recipes showing solutions to everyday problems, ranging from simple questions, like, "How do I get BIND?" to more advanced topics like providing name service for IPv6 addresses.

Building Cocoa Applications - A Step-by-Step Guide (Paperback, 1st ed): Simson Garfinkel Building Cocoa Applications - A Step-by-Step Guide (Paperback, 1st ed)
Simson Garfinkel
R1,658 Discovery Miles 16 580 Ships in 18 - 22 working days

Building Cocoa Applications takes a step-by-step approach to teaching developers how to build real graphics applications using Cocoa. By showing the basics of an application in one chapter and then layering additional functionality onto that application in subsequent chapters, the book keeps readers interested and motivated. Readers will see immediate results, and then go on to build onto what they've already achieved. By the end of the book, readers who have built the applications as they have read will have a solid understanding of what it really means to develop complete and incrementally more complex Cocoa applications.

System Performance Tuning (Paperback, 2nd edition): Gian-Paolo Musumeci & Mike Loukides System Performance Tuning (Paperback, 2nd edition)
Gian-Paolo Musumeci & Mike Loukides
R1,008 R861 Discovery Miles 8 610 Save R147 (15%) Ships in 18 - 22 working days

System Performance Tuning covers two distinct areas: performance tuning, or the art of increasing performance for a specific application, and capacity planning, or deciding what hardware best fulfills a given role. Underpinning both subjects is the science of computer architecture. This book focuses on the operating system, the underlying hardware, and their interactions. For system administrators who want a hands-on introduction to system performance, this is the book to recommend.

Malicious Mobile Code - Virus Protection for Windows (Paperback, 1st ed): Roger A. Grimes Malicious Mobile Code - Virus Protection for Windows (Paperback, 1st ed)
Roger A. Grimes
R1,049 R902 Discovery Miles 9 020 Save R147 (14%) Ships in 18 - 22 working days

"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.

iOS 15 Programming Fundamentals with Swift - Swift, Xcode, and Cocoa Basics (Paperback): Matt Neuberg iOS 15 Programming Fundamentals with Swift - Swift, Xcode, and Cocoa Basics (Paperback)
Matt Neuberg
R1,533 R1,244 Discovery Miles 12 440 Save R289 (19%) Ships in 9 - 17 working days

Move into iOS development by getting a firm grasp of its fundamentals, including the Xcode 13 IDE, Cocoa Touch, and the latest version of Apple's acclaimed programming language, Swift 5.5. With this thoroughly updated guide, you'll learn the Swift language, understand Apple's Xcode development tools, and discover the Cocoa framework. Explore Swift's object-oriented concepts Become familiar with built-in Swift types Dive deep into Swift objects, protocols, and generics Tour the life cycle of an Xcode project Learn how nibs are loaded Understand Cocoa's event-driven design Communicate with C and Objective-C In this edition, catch up on the latest iOS programming features: Structured concurrency: async/await, tasks, and actors Swift native formatters and attributed strings Lazy locals and throwing getters Enhanced collections with the Swift Algorithms and Collections packages Xcode tweaks: column breakpoints, package collections, and Info.plist build settings Improvements in Git integration, localization, unit testing, documentation, and distribution And more!

Salt Open - Automating Your Enterprise and Your Network (Paperback, 1st ed.): Andrew Mallett Salt Open - Automating Your Enterprise and Your Network (Paperback, 1st ed.)
Andrew Mallett
R1,177 R980 Discovery Miles 9 800 Save R197 (17%) Ships in 18 - 22 working days

There is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions. You'll see how Salt Open is duplicated with ArubaOS and IOS networking devices, which can be configured without the underlying OS. As you step through the configuration options, you'll learn how to run remote execution modules from the CLI before looking at stateful configuration using SLS files. Moving on, you'll learn how to configure the systems where you also need to monitor your devices and that is when reactors and beacons come into play. Creating beacons to alert the server when thresholds are exceeded, you will be able to create reactors to mitigate the issues identified by the beacons. By the end of this book, you will be able to deploy Salt to your servers and network infrastructure. You will be able to install the Salt-Master and Salt-Minion, executing commands from both the Master and the Minion. The networking devices you need to manage will be controlled through the Salt_Proxy Minions that you have configured. Finally, you will be able to load-balance connections to the master with Salt-Syndic. What You'll Learn Install Salt Services on Ubuntu and CentOS based systems Work with remote execution modules Format YAML files correctly Provide defined configuration using state files Use Salt-Proxy to configure network devices Automate the configuration of Linux servers and networking devices Add value for both the server and network automation team Who This Book Is For System administrators experienced in Linux administration, who desire to expand their horizons into the world of automation, moving from scripts to states.

Asynchronous Programming with SwiftUI and Combine - Functional Programming to Build UIs on Apple Platforms (Paperback, 1st... Asynchronous Programming with SwiftUI and Combine - Functional Programming to Build UIs on Apple Platforms (Paperback, 1st ed.)
Peter Friese
R1,434 R1,187 Discovery Miles 11 870 Save R247 (17%) Ships in 18 - 22 working days

Develop UI-heavy applications more easily, faster, and error-free. Based on several enhancements to the Swift language, SwiftUI takes a declarative approach to building UIs. Instead of imperatively coding the UI, this book will show you how to describe how you want your UI to look. SwiftUI treats the UI as a function of its state, thereby making managing your app's state a lot easier. Change the underlying data model to redraw all parts of the UI that are connected to that particular slice of data. Likewise, easily update the underlying data model from the UI elements your data model is connected to. Combine is Apple's Functional Reactive Programming framework. It complements SwiftUI and other frameworks, such as the networking APIs, in a natural way. Using Combine, you can subscribe to events and describe data processing in a way that is free of side effects. This allows for an easier implementation of event-driven applications. Using SwiftUI and Combine build more error-free apps in a shorter amount of time, targeting all of Apple's platforms (iOS, iPadOS, watchOS, macOS, tvOS) with little to no overhead. By the end of the book you will have a solid understanding for architecting and implementing UI-heavy apps in a declarative and functional reactive way using SwiftUI, Combine, and async/await. You will: - Build simple and gradually more complex UIs in SwiftUI - Understand SwiftUI's state management system - Work with Combine and Swift's new async/await APIs to access the network and access other asynchronous APIs - Architect and structure modern applications on Apple platforms using SwiftUI, Combine, and async/await

DHCP for Windows 2000 (Paperback, 2000 ed.): Neall Alcott DHCP for Windows 2000 (Paperback, 2000 ed.)
Neall Alcott
R1,035 Discovery Miles 10 350 Ships in 18 - 22 working days

DHCP for Windows 2000 is custom-designed for system administrators who are responsible for configuring and maintaining networks with Windows 2000 servers. It explains the DHCP protocol and how to install and manage DHCP on both servers and clients--including client platforms other than Windows 2000.

Linux Cookbook - Essential Skills for Linux Users and System & Network Administrators (Paperback, 2nd Revised edition): Carla... Linux Cookbook - Essential Skills for Linux Users and System & Network Administrators (Paperback, 2nd Revised edition)
Carla Schroder
R1,501 R1,212 Discovery Miles 12 120 Save R289 (19%) Ships in 9 - 17 working days

This handy cookbook teaches new-to-intermediate Linux users the essential skills necessary to manage a Linux system, using both graphical and command-line tools. Whether you run Linux in embedded, desktop, server, or cloud or virtual environments, the fundamental skills are the same. This book aims to get you up and running quickly, with copy-paste examples. Carla Schroder provides recipes that cover specific problems, with discussions that explain how each recipe works, as well as references for additional study. You'll learn how to: Use systemd, the new comprehensive service manager Build simple or complex firewalls with firewalld Set up secure network connections for Linux systems and mobile devices Rescue nonbooting systems Reset lost passwords on Linux and Windows Use dnsmasq to simplify managing your LAN name services Manage users and groups and control access to files Probe your computer hardware and monitor hardware health Manage the GRUB bootloader and multiboot Linux and Windows Keep accurate time across your network with the newest tools Build an internet router/firewall on Raspberry Pi Manage filesystems and partitioning

Web Services - ICWS 2022 - 29th International Conference, Held as Part of the Services Conference Federation, SCF 2022,... Web Services - ICWS 2022 - 29th International Conference, Held as Part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, Proceedings (Paperback, 1st ed. 2022)
Yuchao Zhang, Liang-Jie Zhang
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.The 9 full papers presented in this volume were carefully reviewed and selected from 20 submissions. The papers cover aspects of services computing and applications. Centered around services computing, it covers various systems and networking research pertaining to cloud, edge and Internet-of-Things (IoT), as well as technologies for intelligent computing, learning, big data and blockchain applications.

Windows 98 Annoyances (Paperback, 1st ed): David A. Karp Windows 98 Annoyances (Paperback, 1st ed)
David A. Karp
R764 R668 Discovery Miles 6 680 Save R96 (13%) Ships in 18 - 22 working days

Based on the author's popular Windows Annoyances web site, this book provides an authoritative collection of techniques for customizing Windows 98. It allows you to quickly identify a particular annoyance and immediately offers one or more solutions, making it the definitive resource for customizing Windows 98.

The Authoritative Guide on Harbor - Management and Practice of Cloud Native Artifacts Such as Container Images and Helm Charts... The Authoritative Guide on Harbor - Management and Practice of Cloud Native Artifacts Such as Container Images and Helm Charts (Paperback, 1st ed. 2022)
Haining Zhang, Yan Wang
R1,760 Discovery Miles 17 600 Ships in 18 - 22 working days

Harbor is a major CNCF open source project, with thousands of production users all over the world. This book provides a comprehensive explanation of the open source cloud native registry: Harbor. Written by experts who contributed to and now maintain Harbor, the content covers its architecture, principles, functions, deployment and configuration, scanning artifacts, remote replication, operation and maintenance, customized development, API usage and success stories. The book offers a valuable guide for Harbor users, developers and contributors, cloud native software development engineers, test engineers, operational and maintenance engineers, IT architects and IT technical managers. It will also benefit university students in computer-related disciplines.

Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected... Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Ittay Eyal, Juan Garay
R2,999 Discovery Miles 29 990 Ships in 18 - 22 working days

This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.

Foundations of ARM64 Linux Debugging, Disassembling, and Reversing - Analyze Code, Understand Stack Memory Usage, and... Foundations of ARM64 Linux Debugging, Disassembling, and Reversing - Analyze Code, Understand Stack Memory Usage, and Reconstruct Original C/C++ Code with ARM64 (Paperback, 1st ed.)
Dmitry Vostokov
R1,167 R970 Discovery Miles 9 700 Save R197 (17%) Ships in 18 - 22 working days

Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll Learn Review the basics of ARM64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used Who This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques.

Apple Device Management - A Unified Theory of Managing Macs, iPads, iPhones, and Apple TVs (Paperback, 2nd ed.): Charles Edge,... Apple Device Management - A Unified Theory of Managing Macs, iPads, iPhones, and Apple TVs (Paperback, 2nd ed.)
Charles Edge, Rich Trouton
R1,806 R1,458 Discovery Miles 14 580 Save R348 (19%) Ships in 18 - 22 working days

Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away. You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that's necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they're completely secure. You'll also work on getting standard QA environments built out, so you can test more effectively with less effort. This thoroughly revised and expanded Second Edition provides new coverage and updates on daemons and agents, declarative management, Gatekeeper, script options, SSO tools, Azure/Apple Business Essentials integrations and much more. You will Deploy profiles across devices effectively and securely Install apps remotely both from the app store and through custom solutions Work natively with Apple environments rather than retrofitting older IT solutions Who This Book Is ForMac administrators within organizations that want to integrate with the current Apple ecosystem, including Windows administrators learning how to use/manage Macs, mobile administrators working with iPhones and iPads, and mobile developers tasked with creating custom apps for internal, corporate distribution.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R873 R792 Discovery Miles 7 920
Coding Basics for Beginners - The Smart…
Jefferson Sandyman Hardcover R588 Discovery Miles 5 880
Linux - A complete guide to Linux…
James Arthur Hardcover R546 R500 Discovery Miles 5 000
Linux - The Ultimate Crash Course to…
Mark Reed Hardcover R558 R512 Discovery Miles 5 120
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,491 Discovery Miles 14 910
Android Boot Camp for Developers Using…
Corinne Hoisington Paperback R1,310 R1,216 Discovery Miles 12 160
IBM Mainframe Developer Training and…
Robert Wingate Hardcover R1,674 R1,402 Discovery Miles 14 020
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek Hardcover R1,418 Discovery Miles 14 180
Kubernetes - The Ultimate Beginners…
Mark Reed Hardcover R552 R506 Discovery Miles 5 060

 

Partners