0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (6)
  • R500+ (865)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

ISSE 2004 - Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2004 Conference... ISSE 2004 - Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2004 Conference (Paperback, 2004 ed.)
Sacher Paulus, Norbert Pohlmann, Helmut Reimer
R1,552 Discovery Miles 15 520 Ships in 10 - 15 working days

The Information Security Solutions Europe Conference (ISSE) was started in 1999 by EEMA and TeleTrusT with the support of the European Commission and the German Federal Minis try of Technology and Economics. Today the annual conference is a fixed event in every IT security professional's calendar. The aim of ISSE is to support the development of a Euro pean information security culture and especially a cross-border framework for trustworthy IT applications for citizens, industry and administration. Therefore, it is important to take into consideration both international developments and European regulations and to allow for the interdisciplinary character of the information security field. In the five years of its existence ISSE has thus helped shape the profile of this specialist area. The integration of security in IT applications was initially driven only by the actual security issues considered important by experts in the field; currently, however, the economic aspects of the corresponding solutions are the most important factor in deciding their success. ISSE offers a suitable podium for the discussion of the relationship between these considerations and for the presentation of the practical implementation of concepts with their technical, or ganisational and economic parameters."

Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2003 Conference (Paperback,... Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2003 Conference (Paperback, 2004 ed.)
Paulus Sachar, Norbert Pohlmann, Helmut Reimer
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. Here the positions of the experts involved are very diverse: some strive for as much security as possible, others only for as much security as is necessary.

The conference ISSE (Information Security Solutions Europe) is the outstanding forum for the interdisciplinary search for sustainable compromises and for the presentation of concepts which hold up in real life. This book offers the most recent papers in the area of strategies, technologies, applications and best practice.

Progress on Cryptography - 25 Years of Cryptography in China (Hardcover, 2004 ed.): Kefei Chen Progress on Cryptography - 25 Years of Cryptography in China (Hardcover, 2004 ed.)
Kefei Chen
R3,024 Discovery Miles 30 240 Ships in 10 - 15 working days

Cryptography in Chinese consists of two characters meaning "secret coded." Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding." China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students.

Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students.

Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.

Advanced Methods of Pharmacokinetic and Pharmacodynamic Systems Analysis (Hardcover, 2004 ed.): David D'Argenio Advanced Methods of Pharmacokinetic and Pharmacodynamic Systems Analysis (Hardcover, 2004 ed.)
David D'Argenio
R5,763 Discovery Miles 57 630 Ships in 10 - 15 working days

Advanced Methods of Pharmacokinetic and Pharmocodynamic Systems Analysis Volume 3 is vital to professionals and academicians working in drug development and bioengineering. Both basic and clinical scientists will benefit from this work.
This book contains chapters by leading researchers in pharmacokinetic/pharmacodynamic modeling and will be of interest to anyone involved with the application of pharmacokinetic and pharmacodynamics to drug development.
The use of mathematical modeling and associated computational methods is central to the study of the absorption, distribution and elimination of therapeutic drugs (pharmacokinetics) and to understanding how drugs produce their effects (pharmacodynamics). From its inception, the field of pharmacokinetics and pharmacodynamics has incorporated methods of mathematical modeling, simulation and computation in an effort to better understand and quantify the processes of uptake, disposition and action of therapeutic drugs. These methods for pharmacokinetic/pharmacodynamic systems analysis impact all aspects of drug development. In vitro, animal and human testing, as well as drug therapy are all influenced by these methods. Modeling methodologies developed for studying pharmacokinetic/ pharmacodynamic processes confront many challenges. This is related in part to the severe restrictions on the number and type of measurements that are available from laboratory experiments and clinical trials, as well as the variability in the experiments and the uncertainty associated with the processes themselves.
The contributions are organized in three main areas: Mechanism-Based PK/PD, Pharmacometrics and Pharmacotherapy. Both professionals andacademics will profit from this extensive work.

.NET System Management Services (Paperback, Softcover reprint of the original 1st ed.): Alexander Golomshtok .NET System Management Services (Paperback, Softcover reprint of the original 1st ed.)
Alexander Golomshtok
R1,262 R1,069 Discovery Miles 10 690 Save R193 (15%) Ships in 10 - 15 working days

Explores the System.Management namespace of the Microsoft .NET Framework and Windows Management Instrumentation, covers enterprise system management facilities, and reviews WMI and System.Management namespace functionality.

Verification Plans - The Five-Day Verification Strategy for Modern Hardware Verification Languages (Hardcover, 2004 ed.): Peet... Verification Plans - The Five-Day Verification Strategy for Modern Hardware Verification Languages (Hardcover, 2004 ed.)
Peet James
R4,741 Discovery Miles 47 410 Ships in 10 - 15 working days

Verification isjob one in today's modem design process. Statistics tell us that the verification process takes up a majority of the overall work. Chips that come back dead on arrival scream that verification is at fault for not finding the mistakes. How do we ensure success? After an accomplishment, have you ever had someone ask you, "Are you good or are you just lucky?"? Many design projects depend on blind luck in hopes that the chip will work. Other's, just adamantly rely on their own abilities to bring the chip to success. ill either case, how can we tell the difference between being good or lucky? There must be a better way not to fail. Failure. No one likes to fail. ill his book, "The Logic of Failure," Dietrich Domer argues that failure does not just happen. A series of wayward steps leads to disaster. Often these wayward steps are not really logical, decisive steps, but more like default omissions. Anti-planning if you will, an ad-hoc approach to doing something. To not plan then, is to fail.

Privacy Enhancing Technologies - Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised... Privacy Enhancing Technologies - Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers (Paperback, 2003 ed.)
Roger Dingledine, Paul Syverson
R1,587 Discovery Miles 15 870 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Privacy Enhancing Technologies, PET 2002, held in San Francisco, CA, USA, in April 2002. The 17 revised full papers presented were carefully selected during two rounds of reviewing and improvement. Among the topics addressed are Internet security, private authentication, information theoretic anonymity, anonymity measuring, enterprise privacy practices, service architectures for privacy, intersection attacks, online trust negotiation, random data perturbation, Website fingerprinting, Web user privacy, TCP timestamps, private information retrieval, and unobservable Web surfing.

Management of Multimedia on the Internet - 5th IFIP/IEEE International Conference on Management of Multimedia Networks and... Management of Multimedia on the Internet - 5th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2002, Santa Barbara, CA, USA, October 6-9, 2002. Proceedings (Paperback, 2002 ed.)
Kevin C. Almeroth, Masum Z. Hasan
R1,660 Discovery Miles 16 600 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th IFIP/IEEE International Conference on the Management of Multimedia Networks and Services, MMNS 2002, held in Santa Barbara, CA, USA, in October 2002.The 27 revised full papers presented were carefully reviewed and selected from a total of 76 submissions. The papers are organized in topical sections on service management, management of wireless multimedia, bandwidth sharing protocols, distributed video architectures, management systems, differentiated network services, user level traffic adaptation, and multicast congestion control.

Evaluation of Cross-Language Information Retrieval Systems - Second Workshop of the Cross-Language Evaluation Forum, CLEF 2001,... Evaluation of Cross-Language Information Retrieval Systems - Second Workshop of the Cross-Language Evaluation Forum, CLEF 2001, Darmstadt, Germany, September 3-4, 2001. Revised Papers (Paperback, 2002 ed.)
Martin Braschler, Julio Gonzalo, Michael Kluck
R3,154 Discovery Miles 31 540 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the Second Workshop of the Cross-Language Evaluation Forum, CLEF 2001, held in Darmstadt, Germany in September 2001.The 35 revised full papers presented together with two introductory survey articles and a comprehensive appendix were carefully improved during the round of reviewing and selections. The papers are organized in topical sections on systems evaluation experiments, mainly cross-language, monolingual experiments, interactive issues, and evaluation issues and results.

Knowledge Management - Processes and Technologies (Hardcover, 2003 ed.): Herwig Rollett Knowledge Management - Processes and Technologies (Hardcover, 2003 ed.)
Herwig Rollett
R3,012 Discovery Miles 30 120 Ships in 10 - 15 working days

A compact guide to knowledge management, this book makes the subject accessible without oversimplifying it. Organizational issues like strategy and culture are discussed in the context of typical knowledge management processes. The focus is always on pointing out all the issues that need to be taken into account in order to make knowledge management a success. The book then goes on to explore the role of information technology as an enabler of knowledge management relating various technologies to the knowledge management processes, showing the reader what can, and what cannot, be achieved through technology. Throughout the book, references to lessons learned from past projects underline the arguments. Managers will find this book a valuable guide for implementing their own initiatives, while researchers and system designers will find plenty of ideas for future work.

Integrated Network Management VIII - Managing It All (Hardcover, Parental Adviso): German Goldszmidt, Schoenwalder Jurgen Integrated Network Management VIII - Managing It All (Hardcover, Parental Adviso)
German Goldszmidt, Schoenwalder Jurgen
R4,782 Discovery Miles 47 820 Ships in 10 - 15 working days

Welcome to 1M 2003, the eighth in a series of the premier international technical conference in this field. As IT management has become mission critical to the economies of the developed world, our technical program has grown in relevance, strength and quality. Over the next few years, leading IT organizations will gradually move from identifying infrastructure problems to providing business services via automated, intelligent management systems. To be successful, these future management systems must provide global scalability, for instance, to support Grid computing and large numbers of pervasive devices. In Grid environments, organizations can pool desktops and servers, dynamically creating a virtual environment with huge processing power, and new management challenges. As the number, type, and criticality of devices connected to the Internet grows, new innovative solutions are required to address this unprecedented scale and management complexity. The growing penetration of technologies, such as WLANs, introduces new management challenges, particularly for performance and security. Management systems must also support the management of business processes and their supporting technology infrastructure as integrated entities. They will need to significantly reduce the amount of adventitious, bootless data thrown at consoles, delivering instead a cogent view of the system state, while leaving the handling of lower level events to self-managed, multifarious systems and devices. There is a new emphasis on "autonomic" computing, building systems that can perform routine tasks without administrator intervention and take prescient actions to rapidly recover from potential software or hardware failures.

Multiple Classifier Systems - Third International Workshop, MCS 2002, Cagliari, Italy, June 24-26, 2002. Proceedings... Multiple Classifier Systems - Third International Workshop, MCS 2002, Cagliari, Italy, June 24-26, 2002. Proceedings (Paperback, 2002 ed.)
Fabio Roli, Josef Kittler
R1,646 Discovery Miles 16 460 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Workshop on Multiple Classifier Systems, MCS 2002, held in Cagliari, Italy, in June 2002.The 29 revised full papers presented together with three invited papers were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on bagging and boosting, ensemble learning and neural networks, design methodologies, combination strategies, analysis and performance evaluation, and applications.

Software Product-Family Engineering - 4th International Workshop, PFE 2001 Bilbao, Spain, October 3-5, 2001 Revised Papers... Software Product-Family Engineering - 4th International Workshop, PFE 2001 Bilbao, Spain, October 3-5, 2001 Revised Papers (Paperback, 2002 ed.)
Frank van der Linden
R1,694 Discovery Miles 16 940 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Product Family Engineering, PFE 2001, held in Bilbao, Spain, in October 2001.The 31 revised full papers presented together with an introduction and six session reports were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on product issues, process issues, community issues, platform and quality solutions, diversity solutions, product validation, and process validation.

Computer Performance Evaluation: Modelling Techniques and Tools - Modelling Techniques and Tools. 12th International... Computer Performance Evaluation: Modelling Techniques and Tools - Modelling Techniques and Tools. 12th International Conference, TOOLS 2002 London, UK, April 14-17, 2002 Proceedings (Paperback, 2002 ed.)
Tony Field, Peter G. Harrison, Jeremy Bradley, Uli Harder
R1,555 Discovery Miles 15 550 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Modelling Techniques and Tools for Computer Performance Evaluation, TOOLS 2002, held in London, UK in April 2002.The 18 revised full papers and six tool papers presented together with an invited contribution were carefully reviewed and selected from 57 submissions. Among the topics addressed are generic techniques like stochastic process algebras and the analysis of Petri nets and Markov chains, as well as the development and employment of tools in areas such as the Internet, software performance engineering, parallel systems, real-time systems, and transaction processing.

Managing Software Quality - A Measurement Framework for Assessment and Prediction (Paperback, Softcover reprint of the original... Managing Software Quality - A Measurement Framework for Assessment and Prediction (Paperback, Softcover reprint of the original 1st ed. 2002)
Richard E. Nance, James D. Arthur
R1,574 Discovery Miles 15 740 Ships in 10 - 15 working days

What should be every software organization's primary goal? Managing Software Quality. Producing and sustaining the high quality of products and processes in evolutionary systems are at the core of software engineering, and it is only through a comprehensive measurement program that a successful outcome can be assured. Cost and budget limitations, schedule due dates, all represent systems engineering constraints which impinge on the degree to which software development and maintenance professional can achieve maximum quality. Richard Nance and James Arthur's guide to managing software quality goes beyond the usual answers to the "why" and "what" questions generally provided in the standards documents. They not only look at the "how to" in their focus of the measurement of software quality, but also come up with specific suggestions to the pressing needs of practising software engineers, quality assurance engineers and software and project managers."This is one of the few books in this area that addresses the 'quality' aspect based upon the important aspect of documentation. In addition, the book provides a basis for not only the software manager concerned with measurement implementation, but also the researcher in identifying the current state of the art and practice. This will be a key reference guide for anyone that is concerned with developing quality software."(William H Farr, PhD, Naval Surface Warfare Center Dahlgren Division)About the Authors: Research motivated by problems arising in large, complex software systems is what stimulates Richard Nance. His collaboration with the U.S. Navy on major software-intensive programs spans over 30 years. James Arthur is an Associate Professor of Computer Science at Virginia Tech.

Enterprise Information Systems IV (Hardcover, 2003 ed.): Mario G. Piattini, Joaquim Filipe, Jose Braz Enterprise Information Systems IV (Hardcover, 2003 ed.)
Mario G. Piattini, Joaquim Filipe, Jose Braz
R4,523 Discovery Miles 45 230 Ships in 10 - 15 working days

The purpose of the 4th International Conference on Enterprise Information Systems (ICEIS) was to bring together researchers, engineers and practitioners interested in the advances and business applications of information systems. The research papers focused on real world applications covering four main themes: Enterprise Database Applications, Artificial Intelligence Applications and Decision Support Systems, Systems Analysis and Specification, and Internet and Electronic Commerce.
This book will be of interest to information technology professionals, especially those working on systems integration, databases, decision support systems or electronic commerce. It will also be of use to middle managers who need to work with information systems and require knowledge of current trends in development methods and applications.

Programming Constraint Services - High-Level Programming of Standard and New Constraint Services (Paperback, 2002 ed.):... Programming Constraint Services - High-Level Programming of Standard and New Constraint Services (Paperback, 2002 ed.)
Christian Schulte
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

This book is concerned with the architecture and implementation of constraint engines. The author's main contribution is that constraint services, such as search and combinators, are made programmable; this is achieved by devising computation spaces as simple abstractions for programming constraint services at a high level. State-of-the-art and novel search strategies such as visual interactive search and parallel search are covered.This book is indispensable reading for anyone seriously interested in constraint technology.

Security and Privacy in Digital Rights Management - ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001.... Security and Privacy in Digital Rights Management - ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers (Paperback, 2002 ed.)
Tomas Sander
R1,595 Discovery Miles 15 950 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Security and Privacy in Digital Rights Management, DRM 2001, held during the ACM CCS-8 Conference in Philadelphia, PA, USA, in November 2001.The 14 revised full papers presented were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on renewability, fuzzy hashing, cryptographic techniques and fingerprinting, privacy and architectures, software tamper resistance, cryptanalysis, and economic and legal aspects.

Object Modeling with the OCL - The Rationale behind the Object Constraint Language (Paperback, 2002 ed.): Tony Clark, Jos Warmer Object Modeling with the OCL - The Rationale behind the Object Constraint Language (Paperback, 2002 ed.)
Tony Clark, Jos Warmer
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

As part of the UML standard OCL has been adopted by both professionals in industry and by academic researchers and is one of the most widely used languages for expressing object-oriented system properties. This book contains key contributions to the development of OCL. Most papers are developments of work reported at different conferences and workshops. This unique compilation addresses many important issues faced by advanced professionals and researchers in object modeling like e.g. real-time constraints, type checking, and constraint modeling.

Outsourcing Insourcing and IT for Enterprise Management - Business Opportunity Analysis (Hardcover, 2003 ed.): D. Chorafas Outsourcing Insourcing and IT for Enterprise Management - Business Opportunity Analysis (Hardcover, 2003 ed.)
D. Chorafas
R2,901 Discovery Miles 29 010 Ships in 10 - 15 working days

Many firms are now developing policies for outsourcing IT and other basic functions, this book analyzes this issue from the perspective of both the outsourcer and the insourcer. Dimitris N. Chorafas describes management needs and shows how technology can be used to meet these needs. The book also highlights the benefits and risks that companies face when they attempt to differentiate themselves through new technology. The book is based on an extensive research project in the US, UK, Germany, France, Switzerland, and Sweden.

Enterprise Inter- and Intra-Organizational Integration - Building International Consensus (Hardcover, 2003 ed.): Kurt Kosanke,... Enterprise Inter- and Intra-Organizational Integration - Building International Consensus (Hardcover, 2003 ed.)
Kurt Kosanke, Roland Jochem, James G. Nell, Angel Ortiz Bas
R4,607 Discovery Miles 46 070 Ships in 10 - 15 working days

The new organizational paradigms of global cooperation and collaboration require new ways and means for their support. Information and Communication Technology (ICT) can and will play a significant role in this support. However, the many currently available and seemingly conflicting solutions, the confusing terminology, the lack of business justification, and last but not least the insufficient understanding of the technology by the end user community has significantly hampered the large scale application of the relevant ICT support and thereby the acceptance of the new paradigms.

Many of these issues have been addressed in the workshops of the international initiative on Enterprise Inter- and Intra-Organizational Integration, which has been supported by the European IST Programme and NIST. The main subjects of the initiative: relations between knowledge management and business process modeling, interoperability of business processes and process models, enterprise engineering and integration, and representation of process models. Ontologies and agent technologies - the latter with their relations to ontologies and models - have been further subjects of discussions in several workshops.

Results of the initiative are reported in this volume, which comprises the proceedings of the International Conference on Enterprise Integration and Modeling Technology (ICEIMT'02). The conference was sponsored by the International Federation for Information Processing (IFIP) and held in Valencia, Spain in April 2002.

Enterprise Inter- and Intra-Organizational Integration: Building International Consensus provides not only a wealth of information on the state of the art of the subjects of theinitiative, it also identifies opportunities for research and development. Potential projects are identified in the work group reports and some of those will be taken up by organizations involved.

Fundamentals of Data Warehouses (Hardcover, 2nd, rev. and extended ed. 2003): Matthias Jarke, Maurizio Lenzerini, Yannis... Fundamentals of Data Warehouses (Hardcover, 2nd, rev. and extended ed. 2003)
Matthias Jarke, Maurizio Lenzerini, Yannis Vassiliou, Panos Vassiliadis
R1,658 Discovery Miles 16 580 Ships in 10 - 15 working days

Data warehouses have captured the attention of practitioners and researchers alike. But the design and optimization of data warehouses remains an art rather than a science. This book presents the first comparative review of the state of the art and best current practice of data warehouses. It covers source and data integration, multidimensional aggregation, query optimization, update propagation, metadata management, quality assessment, and design optimization. Also, based on results of the European Data Warehouse Quality project, it offers a conceptual framework by which the architecture and quality of data warehouse efforts can be assessed and improved using enriched metadata management combined with advanced techniques from databases, business modeling, and artificial intelligence. For researchers and database professionals in academia and industry, the book offers an excellent introduction to the issues of quality and metadata usage in the context of data warehouses.

Components of System Safety - Proceedings of the Tenth Safety-critical Systems Symposium, Southampton, UK, 2002 (Paperback,... Components of System Safety - Proceedings of the Tenth Safety-critical Systems Symposium, Southampton, UK, 2002 (Paperback, 2002 ed.)
Felix Redmill, Tom Anderson
R4,416 Discovery Miles 44 160 Ships in 10 - 15 working days

Components of System Safety contains the invited papers presented at the tenth annual Safety-critical Systems Symposium, held in Southampton, February 2002. The papers included in this volume are representative of modern safety thinking, the questions that arise from it, and the investigations that result. They are all aimed at the transfer of technology, experience, and lessons to and within industry, and they offer a broad range of views. Not only do they show what has been done and what could be done, but they also lead the reader to speculate on ways in which safety might be improved.

Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources - Semi-Automatic Approaches and... Extraction and Exploitation of Intensional Knowledge from Heterogeneous Information Sources - Semi-Automatic Approaches and Tools (Paperback, 2002 ed.)
Domenico Ursino
R1,629 Discovery Miles 16 290 Ships in 10 - 15 working days

This book is the first comprehensive approach to the construction and the management of cooperative information systems. From a set of input database schemes describing the information content of multiple sources, the techniques presented yield a structured, integrated and consistent description of the information content represented in a suitable data repository. The author builds his work on skilled and controlled use of results and methods from various fields of computer science, such as data mining, algorithmic learning, knowledge representation, database management, etc. The approach presented has been implemented in the prototype system DIKE, Database Intensional Knowledge Extractor, which has been studied in various application contexts.

COTS-Based Software Systems - First International Conference, ICCBSS 2002, Orlando, FL, USA, February 4-6, 2002, Proceedings... COTS-Based Software Systems - First International Conference, ICCBSS 2002, Orlando, FL, USA, February 4-6, 2002, Proceedings (Paperback, 2002 ed.)
John Dean, Andree Gravel
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on COTS-Based Software Systems, ICCBSS 2002, held in Orlando, Florida, USA, in February 2002.The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The book addresses all current issues on commercial-off-the-shelf software systems, from the R&D as well as from the practitioner's point of view.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Short History of the British Empire…
Francis Plowden Paperback R511 Discovery Miles 5 110
The Darkest Evening
Ann Cleeves Paperback  (1)
R464 Discovery Miles 4 640
A Detection of the Sophistry and…
Daniel Defoe Paperback R340 Discovery Miles 3 400
Droomjagter
Leon van Nierop Paperback R340 R314 Discovery Miles 3 140
A Small Hotel
Suanne Laqueur Hardcover R838 R754 Discovery Miles 7 540
AFH Spicy Senorita Xtra-Hot Dress
R1,250 R950 Discovery Miles 9 500
The Prophets and the Rise of Judaism
Adolphe Lods Paperback R1,459 Discovery Miles 14 590
Africa Fashion House Sunflower Fireworks…
R950 Discovery Miles 9 500
Canary
Onke Mazibuko Paperback R320 R270 Discovery Miles 2 700
On the Way to the Wedding
Julia Quinn Paperback R295 R264 Discovery Miles 2 640

 

Partners