![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
"The AntiPatterns authors have clearly been there and done that when it comes to managing software development efforts. I resonated with one insight after another, having witnessed too many wayward projects myself. The experience in this book is palpable." —John Vlissides, IBM Research "This book allows managers, architects, and developers to learn from the painful mistakes of others. The high-level AntiPatterns on software architecture are a particularly valuable contribution to software engineering. Highly recommended!" —Kyle Brown Author of The Design Patterns Smalltalk Companion "AntiPatterns continues the trend started in Design Patterns. The authors have discovered and named common problem situations resulting from poor management or architecture control, mistakes which most experienced practitioners will recognize. Should you find yourself with one of the AntiPatterns, they even provide some clues on how to get yourself out of the situation." —Gerard Meszaros, Chief Architect, Object Systems Group Are you headed into the software development mine field? Follow someone if you can, but if you’re on your own—better get the map! AntiPatterns is the map. This book helps you navigate through today’s dangerous software development projects. Just look at the statistics:
This book presents simple, elegant methods for dealing, both in theory and in application, with a variety of problems that have formulations in terms of flows in capacity-constrained networks. Since the theoretical considerations lead in all cases to computationally efficient solution procedures, the hook provides a common meeting ground for persons interested in operations research, industrial and communications engineering, or combinatorial mathematics. Originally published in 1962. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
This book constitutes the proceedings of the 19th International Conference on Theory and Practice of Digital Libraries, TPDL 2015, held in Poznan, Poland, in September 2015. The 22 full papers and 14 poster and demo papers presented in this volume were carefully reviewed and selected from 61 submissions. They were organized in topical sections named: interoperability and information integration; multimedia information management and retrieval and digital curation; personal information management and personal digital libraries; exploring semantic web and linked data; user studies for and evaluation of digital library systems and applications; applications of digital libraries; digital humanities; and social-technical perspectives of digital information.
This is an edited book based on the selected submissions made to the conference titled "International Conference in Smart Cities". The project provides an innovative and new approach to holistic management of cities physical, socio-economic, environmental, transportation and political assets across all domains, typically supported by ICT and open data.
According to the W3C Semantic Web Activity [1]: The Semantic Web provides a common framework that allows data to be shared and reused across appli- tion, enterprise, and community boundaries. This statement clearly explains that the Semantic Web is about data sharing. Currently, the Web uses hyperlinks to connect Web pages. The Semantic Web goes beyond that and focuses on data and envisions the creation of the web of data. On the Semantic Web, anyone can say anything about any resource on the Web. This is fully based on the concept of semantic - notations, where each resource on the Web can have an assigned meaning. This is done through the use of ontologies as a formal and explicit representation of domain concepts and their relationships [2]. Ontologies are formally based on description logics. This enables agents and applications to reason over the data when searching the Web, which has not previously been possible. Web 2. 0 has gradually evolved from letting the Web users play a more active role. Unlike the initial version of the Web, where the users mainly "consumed" content, users are now offered easy-to-use services for content production and publication. Mashups, blogs, wikis, feeds, interface remixes, and social networking/tagging s- tems are examples of these well-known services. The success and wide adoption of Web 2. 0 was in its reliance on social interactions as an inevitable characteristic of the use and life of the Web. In particular, Web 2.
Semantic Web services promise to automate tasks such as discovery, mediation, selection, composition, and invocation of services, enabling fully flexible automated e-business. Their usage, however, still requires a significant amount of human intervention due to the lack of support for a machine-processable description. In this book, Jos de Bruijn and his coauthors lay the foundations for understanding the requirements that shape the description of the various aspects related to Semantic Web services, such as the static background knowledge in the form of ontologies, the functional description of the service, and the behavioral description of the service. They introduce the Web Service Modeling Language (WSML), which provides means for describing the functionality and behavior of Web services, as well as the underlying business knowledge, in the form of ontologies, with a conceptual grounding in the Web Service Modeling Ontology. Academic and industrial researchers as well as professionals will find a comprehensive overview of the concepts and challenges in the area of Semantic Web services, the Web Services Modeling Language and its relation to the Web Services Modeling Ontology, and an in-depth treatment of both enabling technologies and theoretical foundations.
Hypermedia & the Web An Engineering Approach David Lowe, University of Technology, Sydney, Australia Wendy Hall, University of Southampton, UK The rich online world offered through the Web is marred by the chaos which underlies it. At the very early stages of understanding how to harness the power of this new medium, electronic document creators, managers and researchers often spend time on technology innovations at the expense of adopting the sound engineering principles which have paid such dividends in the software industry. Hypermedio & the Web approaches interactive information (concentrating on hypertext documents) as a structure requiring management, quantification and documentation. From analysing the purpose for which a website, CD-ROM or online archive is created, assessing the characteristics and resources needed for the process of building each one, to the assessment of the end product itself, this book attempts to carve out features that are essential to the successful structuring of information in an electronic environment. This is an ambitious book charting an emerging discipline. It is an essential tool to help developers and educators shape and maintain useful and relevant electronic information. 'Hypermedia Engineering hasn't produced many tangible benefits in real-life situations, because very few people practise it. That's why the book is needed.' David Barron, Southampton University 'This book is interesting and excellently fulfills a current need [by] providing an exhaustive and up-to-date vision of the hypermedia field.' Fabio Vitali, University of Bologna 'The strength of this book is its breadth - it covers many of the issues in hypermedia with examples from thetechnical to the managerial. Students could use these as starting points when designing or evaluating hypermedia systems.' David Sharp, Imperial College of Science and Technology 'Information systems developers and managers should find this a helpful guide for developing hypermedia applications.' H Ashman, University of Nottingham Visit our Website at: http: //www.wiley.com/compbooks/
This book constitutes the refereed proceedings of the 12th International Conference on Database and Expert Systems Applications, DEXA 2001, held in Munich, Germany in September 2001. The 93 revised full papers presented were carefully reviewed and selected from 175 submissions. The papers are organized in topical sections on advanced databases, information retrieval, digital libraries, user interfaces, multimedia databases, workflow aspects, active databases, spatial databases, distributed databases, web aspects, knowledge management aspects, datawarehouses, hypermedia, indexing, object-oriented databases, database queries, and transaction processing.
Durch die Weiterentwicklung der kommunikationstechnischen Infrastruktur ergeben sich neue Freiraume bei der Distribuierung von Informations- und Kommunikationssystemen (IKS). Das Buch stellt ein computergestutztes Entscheidungsmodell zur Bestimmung des optimalen Distribuierungsgrades von IKS vor und dokumentiert die Entwicklung eines Prototyps. Die Diskussion der Rahmenbedingungen baut auf einem kybernetischen Unternehmensmodell auf, das es ermoeglicht, die Lebensfahigkeit eines Systems in seiner Umwelt zu untersuchen. Die geforderte Eigenschaft der Rekursivitat des Modells fuhrt zu dem Schluss, dass auch das IKS in einem Unternehmen hinsichtlich seiner Lebensfahigkeit beschrieben werden kann. In der Folge wird die Organisation unter einem strukturellen Aspekt untersucht. Dabei wird die Dimension der Distribuierung und das Distribuierungskontinuum beschrieben. Der Prozess der strategischen Unternehmensplanung, die Ableitung von Informatikprojekten (Projektportfolio) und Informatikzielen und die darin begrundeten Einflusse auf eine Distribuierungsentscheidung bilden den Gegenstand weiterer Untersuchungen. Als dritte Rahmenbedingung wird dann die Bedeutung der Entwicklung von Normen und Standards diskutiert. Dabei steht weniger der technische Aspekt im Vordergrund. Vielmehr werden die Anforderungen untersucht, denen ein IKS genugen muss, wenn der Distributionsgrad nicht von den technischen Moeglichkeiten sondern von anderen Faktoren bestimmt wird. Der zweite Teil der Arbeit beinhaltet eine Beschreibung der logischen Struktur des Prototyps, der Entwicklungsumgebung, der zugrundeliegenden Datenstruktur und der Benutzerschnittstelle anhand einer Beispiel-Konsultation.
Analytics in Healthcare: An Introduction provides a clear, straightforward roadmap to achieving your goals within the domain of healthcare analytics. Whether you are a student looking for a career path or a staff member within a healthcare organization needing to apply the value that your institution's data can provide, this manual will give you direction. Building on chapters that describe the evolution of healthcare analytics, others then address current and upcoming challenges including productive data mining from electronic health records, data governance, and the DELTA analytics maturity model. An appendix with learning modules for healthcare providers on secondary use of data as well as a comprehensive glossary are unique features of the book. The authors' varied experiences and perspectives demonstrate the range of opportunities where healthcare analytics can be applied to make a difference in the current healthcare climate. As a quick and manageable read, this to-the-point resource serves as an invaluable tool to building your analytics program.
Advanced Fiber Access Networks takes a holistic view of broadband access networks-from architecture to network technologies and network economies. The book reviews pain points and challenges that broadband service providers face (such as network construction, fiber cable efficiency, transmission challenges, network scalability, etc.) and how these challenges are tackled by new fiber access transmission technologies, protocols and architecture innovations. Chapters cover fiber-to-the-home (FTTH) applications as well as fiber backhauls in other access networks such as 5G wireless and hybrid-fiber-coax (HFC) networks. In addition, it covers the network economy, challenges in fiber network construction and deployment, and more. Finally, the book examines scaling issues and bottlenecks in an end-to-end broadband network, from Internet backbones to inside customer homes, something rarely covered in books.
Dimensions of Uncertainty in Communication Engineering is a comprehensive and self-contained introduction to the problems of nonaleatory uncertainty and the mathematical tools needed to solve them. The book gathers together tools derived from statistics, information theory, moment theory, interval analysis and probability boxes, dependence bounds, nonadditive measures, and Dempster-Shafer theory. While the book is mainly devoted to communication engineering, the techniques described are also of interest to other application areas, and commonalities to these are often alluded to through a number of references to books and research papers. This is an ideal supplementary book for courses in wireless communications, providing techniques for addressing epistemic uncertainty, as well as an important resource for researchers and industry engineers. Students and researchers in other fields such as statistics, financial mathematics, and transport theory will gain an overview and understanding on these methods relevant to their field.
Thoroughly updated to reflect the CompTIA (R) Network+ N10-008 exam, Networking Essentials, Sixth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or day-to-day network management. Networking Essentials, Sixth Edition guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; routing protocols; local, campus, and wide area network configuration; network security; wireless networking; optical networks; Voice over IP; the network server; and Linux networking. This edition reflects the latest exam topics and objectives associated with network security and hardening, cloud networking, virtualization, 5G, and other recent advances in wireless technology, infrastructure management, and current hardware and devices. It also explains many new terms now addressed by CompTIA's N10-008 exam. Clear goals are outlined for each chapter, and every concept is introduced in easy-to-understand language that explains how and why networking technologies are used. Each chapter is packed with real-world examples and practical exercises that reinforce all concepts and guide you through using them to configure, analyze, and fix networks. CHALLENGE SIMULATION SOFTWARE provides hands-on experience with entering router and switch commands, setting up functions, and configuring interfaces and protocols WIRESHARK NETWORK PROTOCOL ANALYZER presents techniques and examples of data traffic analysis throughout PROVEN TOOLS FOR MORE EFFECTIVE LEARNING AND NETWORK+ PREP, including chapter outlines, summaries, and Network+ objectives WORKING EXAMPLES IN EVERY CHAPTER to reinforce key concepts and promote mastery KEY TERM DEFINITIONS, LISTINGS, AND EXTENSIVE GLOSSARY to help you master the language of networking QUESTIONS, PROBLEMS, AND CRITICAL THINKING QUESTIONS to help you deepen your understanding
Data is an intrinsic part of our daily lives. Everything we do is a data point. Many of these data points are recorded with the intent to help us lead more efficient lives. We have apps that track our workouts, sleep, food intake, and personal finance. We use the data to make changes to our lives based on goals we have set for ourselves. Businesses use vast collections of data to determine strategy and marketing. Data scientists take data, analyze it, and create models to help solve problems. You may have heard of companies having data management teams or chief information officers (CIOs) or chief data officers (CDOs), etc. They are all people who work with data, but their function is more related to vetting data and preparing it for use by data scientists. The jump from personal data usage for self-betterment to mass data analysis for business process improvement often feels bigger to us than it is. In turn, we often think big data analysis requires tools held only by advanced degree holders. Although advanced degrees are certainly valuable, this book illustrates how it is not a requirement to adequately run a data science project. Because we are all already data users, with some simple strategies and exposure to basic analytical software programs, anyone who has the proper tools and determination can solve data science problems. The process presented in this book will help empower individuals to work on and solve data-related challenges. The goal of this book is to provide a step-by-step guide to the data science process so that you can feel confident in leading your own data science project. To aid with clarity and understanding, the author presents a fictional restaurant chain to use as a case study, illustrating how the various topics discussed can be applied. Essentially, this book helps traditional businesspeople solve data-related problems on their own without any hesitation or fear. The powerful methods are presented in the form of conversations, examples, and case studies. The conversational style is engaging and provides clarity.
In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society. That governments and organizations around the world now focus on these issues, that universities and research institutes in many different languages dedicate significant resources to study the issues, and that international professional organizations have adopted standards and directed resources toward ethical issues in technology is in no small part the result of the work of Simon Rogerson. - Chuck Huff, Professor of Social Psychology at Saint Olaf College, Northfield, Minnesota In 1995, Apple launched its first WWW server, Quick Time On-line. It was the year Microsoft released Internet Explorer and sold 7 million copies of Windows 95 in just 2 months. In March 1995, the author Simon Rogerson opened the first ETHICOMP conference with these words: We live in a turbulent society where there is social, political, economic and technological turbulence ... it is causing a vast amount of restructuring within all these organisations which impacts on individuals, which impacts on the way departments are set up, organisational hierarchies, job content, span of control, social interaction and so on and so forth. ... Information is very much the fuel of modern technological change. Almost anything now can be represented by the technology and transported to somewhere else. It's a situation where the more information a computer can process, the more of the world it can actually turn into information. That may well be very exciting, but it is also very concerning. That could be describing today. More than 25 years later, these issues are still at the forefront of how ethical digital technology can be developed and utilised. This book is an anthology of the author's work over the past 25 years of pioneering research in digital ethics. It is structured into five themes: Journey, Process, Product, Future and Education. Each theme commences with an introductory explanation of the papers, their relevance and their interrelationship. The anthology finishes with a concluding chapter which summarises the key messages and suggests what might happen in the future. Included in this chapter are insights from some younger leading academics who are part of the community charged with ensuring that ethical digital technology is realised.
A comprehensive guide to understanding network architecture, communication protocols, and network analysis to build secure applications compatible with the latest versions of C# 8 and .NET Core 3.0 Key Features Explore various network architectures that make distributed programming possible Learn how to make reliable software by writing secure interactions between clients and servers Use .NET Core for network device automation, DevOps, and software-defined networking Book DescriptionThe C# language and the .NET Core application framework provide the tools and patterns required to make the discipline of network programming as intuitive and enjoyable as any other aspect of C# programming. With the help of this book, you will discover how the C# language and the .NET Core framework make this possible. The book begins by introducing the core concepts of network programming, and what distinguishes this field of programming from other disciplines. After this, you will gain insights into concepts such as transport protocols, sockets and ports, and remote data streams, which will provide you with a holistic understanding of how network software fits into larger distributed systems. The book will also explore the intricacies of how network software is implemented in a more explicit context, by covering sockets, connection strategies such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), asynchronous processing, and threads. You will then be able to work through code examples for TCP servers, web APIs served over HTTP, and a Secure Shell (SSH) client. By the end of this book, you will have a good understanding of the Open Systems Interconnection (OSI) network stack, the various communication protocols for that stack, and the skills that are essential to implement those protocols using the C# programming language and the .NET Core framework. What you will learn Understand the breadth of C#'s network programming utility classes Utilize network-layer architecture and organizational strategies Implement various communication and transport protocols within C# Discover hands-on examples of distributed application development Gain hands-on experience with asynchronous socket programming and streams Learn how C# and the .NET Core runtime interact with a hosting network Understand a full suite of network programming tools and features Who this book is forIf you're a .NET developer or a system administrator with .NET experience and are looking to get started with network programming, then this book is for you. Basic knowledge of C# and .NET is assumed, in addition to a basic understanding of common web protocols and some high-level distributed system designs.
Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book DescriptionThis book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is forLearning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.
Enhance your skills in expert module development, deployment, security, DevOps, and cloud Key Features A step-by-step guide to get you started with PowerShell Core 6.0 Harness the capabilities of PowerShell Core 6.0 to perform simple to complex administration tasks Learn core administrative concepts such as scripting, pipelines, and DSC Book DescriptionBeginning with an overview of the different versions of PowerShell, Learn PowerShell Core 6.0 introduces you to VSCode and then dives into helping you understand the basic techniques in PowerShell scripting. You will cover advanced coding techniques, learn how to write reusable code as well as store and load data with PowerShell. This book will help you understand PowerShell security and Just Enough Administration, enabling you to create your own PowerShell repository. The last set of chapters will guide you in setting up, configuring, and working with Release Pipelines in VSCode and VSTS, and help you understand PowerShell DSC. In addition to this, you will learn how to use PowerShell with Windows, Azure, Microsoft Online Services, SCCM, and SQL Server. The final chapter will provide you with some use cases and pro tips. By the end of this book, you will be able to create professional reusable code using security insight and knowledge of working with PowerShell Core 6.0 and its most important capabilities. What you will learn Get to grips with Powershell Core 6.0 Explore basic and advanced PowerShell scripting techniques Get to grips with Windows PowerShell Security Work with centralization and DevOps with PowerShell Implement PowerShell in your organization through real-life examples Learn to create GUIs and use DSC in production Who this book is forIf you are a Windows administrator or a DevOps user who wants to leverage PowerShell to automate simple to complex tasks, then this book is for you. Whether you know nothing about PowerShell or just enough to get by, this guide will give you what you need to go to take your scripting to the next level. You'll also find this book useful if you're a PowerShell expert looking to expand your knowledge in areas such as PowerShell Security and DevOps.
Automation through Chef Opscode provides an in-depth understanding of Chef, which is written in Ruby and Erlang for configuration management, cloud infrastructure management, system administration, and network management. Targeted at administrators, consultants, and architect, the book guides them through the advanced features of the tool which are necessary for infrastructure automation, devops automation, and reporting. The book presumes knowledge of Ruby and Erlang which are used as reference languages for creating recipes and cookbooks and as a refresher on them to help the reader get on speed with the flow of book. The book provides step by step instructions on installation and configuration of Chef, usage scenarios of Chef, in infrastructure automation by providing common scenarios like virtual machine provisioning, OS configuration for Windows, Linux, and Unix, provisioning and configuration of web servers like Apache along with popular databases like MySQL. It further elaborates on the creation of recipes, and cookbooks, which help in deployment of servers and applications to any physical, virtual, or cloud location, no matter the size of the infrastructure. The books covers advanced features like LWRPs and Knife and also contains several illustrative sample cookbooks on MySQL, Apache, and CouchDB deployment using a step by step approach.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Bestselling CompTIA A+ author Mike Meyers provides hands-on, step-by-step labs-updated for the 2012 release of Exam 220-801-so you can practice the IT skills essential for your successMike Meyers' CompTIA A+ Guide to Managing and Troubleshooting Hardware Lab Manual, Fourth Edition contains more than 75 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to certification exam objectives, ensuring direct correspondence to Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting Hardware, Fourth Edition. Lab solutions are only available to instructors and are not printed inside the book. The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons guide you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the key term quiz helps to build your vocabulary.
This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The minimum version of Vim required for each hack is clearly indicated. If you are a Vim user who wants to get more out of this legendary text editor, this book is for you. It focuses on making life easier for intermediate to experienced Vim users.
A quick guide to better IT Service Management Many organisations rely on a mishmash of different technologies and ad hoc working practices to deliver products and services. This makes it very difficult to make changes, measure effectiveness and improve service levels. Better for you, better for your customers Employing a structured IT Service Management system will enable your organisation to identify how to improve the service you deliver to your customers. The international standard for IT Service management is ISO/IEC 20000. Achieving compliance with this standard brings real operational benefits and shows new and potential customers that your organisation is efficient, reliable and trustworthy. The ISO/IEC 20000 standard This pocket guide is a handy reference to the key information on ISO/IEC 20000. It features an overview of the purpose of the standard and shows how to use it. It explains qualification programmes, certification schemes and the interrelationship of ISO20000 with other standards, such as ISO27001. The overall emphasis of the guide is on ISO20000's customer-driven approach to ensure your IT service management processes align with the needs of your business.
Although backup and recovery seems as simple as copying bits from point to point, it is far more challenging to implement properly when considering the details involved. This book captures the decades of backup and storage experience that Gareth Fraser-King and Guy Bunker have in the industry and make them ideally suited to provide the insights and questions you should be asking of your backup vendor or provider.Pat Hanavan, Vice President, Symantec Corporation |
You may like...
Governance of Picture Archiving and…
Carrison K.S. Tong, Eric T.T. Wong
Hardcover
R5,612
Discovery Miles 56 120
Meeting People via WiFi and Bluetooth
Joshua Schroeder, Henry Dalziel
Paperback
R777
Discovery Miles 7 770
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,896
Discovery Miles 28 960
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang
Paperback
R2,606
Discovery Miles 26 060
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
|