0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (5)
  • R500+ (854)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

PC Performance Tuning & Upgrading Tips & Techniques (Paperback): Kris Jamsa PC Performance Tuning & Upgrading Tips & Techniques (Paperback)
Kris Jamsa
R1,292 R1,104 Discovery Miles 11 040 Save R188 (15%) Ships in 10 - 15 working days

Find hundreds of readily accessible tips for upgrading and tuning your PC inside this organized resource. Written by best-selling computer book author Kris Jamsa, you’ll get inside information and best practices on everything from system settings to adding and upgrading peripherals, and much more.

Administering Active Directory (Paperback): Mark Wilkins Administering Active Directory (Paperback)
Mark Wilkins
R1,359 R1,144 Discovery Miles 11 440 Save R215 (16%) Ships in 10 - 15 working days

Configure, manage, and optimize Active Directory on your Windows 2000 network

Deploy and administer a distributed, interoperable, and secure Windows 2000 directory system using Active Directory and this hands-on resource. Administering Active Directory explains how to configure and implement Active Directory as your enterprise directory service and improve network performance. You'll learn to use the core AD components and services, including DNS, replication, and group policy, and take advantage of the centralized management capabilities. With step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots, this is the ideal desktop reference to Active Directory-the fully integrated directory service feature at the heart of Windows 2000.

  • Understand Active Directory architecture and hierarchy
  • Manage user accounts and group resources
  • Integrate DNS with LDAP and WINS
  • Create and manage domain trees and forests
  • Manage the Active Directory replication process
  • Configure site links
  • Troubleshoot and optimize Active Directory
  • Back up and restore your AD servers
  • Implement an Active Directory naming strategy
  • Design schema policy
  • Handle a multiple domain administration
  • Use group policy for efficient administration of network resources
  • Analyze and design a complete Active Directory topology
  • Migrate from Windows NT 4.0 to Windows 2000
Admin911: Windows 2000 Terminal Services (Paperback, Ed): Larry Seltzer Admin911: Windows 2000 Terminal Services (Paperback, Ed)
Larry Seltzer
R1,207 R1,019 Discovery Miles 10 190 Save R188 (16%) Ships in 10 - 15 working days

The survival guide for system administrators!

Call on Admin911 to learn whats going on with your network, to understand your options, and to pick the right solutions. --David Chernicoff, Windows 2000 Magazine

PC Technician's Troubleshooting Pocket Reference (Paperback, 2nd edition): Stephen Bigelow PC Technician's Troubleshooting Pocket Reference (Paperback, 2nd edition)
Stephen Bigelow
R1,062 R907 Discovery Miles 9 070 Save R155 (15%) Ships in 10 - 15 working days

*Fully revised updated edition. first edition was strong seller - over 30,000 sold.

*Ties into the booming A+ Certification market. A+ technicians specialize in PC hardware troubleshooting.

*Follows success of Pocket Reference Series by Bigelow, which has sold over 70,000 copies.

*Handy format - designed for technicians, in a convenient, portable, pocket-sized edition.

*Leading author - Bigelows last three books have sold well over 250,000 copies.

Administering Exchange Server 2000 (Paperback): Mitch Tulloch Administering Exchange Server 2000 (Paperback)
Mitch Tulloch
R1,364 R1,149 Discovery Miles 11 490 Save R215 (16%) Ships in 10 - 15 working days

Install, configure, and manage Microsoft's Exchange 2000 Server

Build, maintain, and troubleshoot a scaleable, reliable messaging infrastructure using Exchange 2000 Server. Logically organized into task-based sections, Administering Exchange 2000 Server explains how to manage sites, clients, address lists, and Internet protocols. The book also covers the new features of Exchange, such as Active Directory integration, the Windows 2000 security model, instant messaging, and video conferencing services. The step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots make this the perfect day-to-day reference for administrators working with or migrating to Exchange 2000 Server.


*Use MMC and Terminal Services to administer Exchange
*Create and configure mail-enabled users
*Configure Outlook for Exchange
*Create and modify recipient policies
*Enable support for administrative groups
*Create storage groups and mailbox stores
*Create and replicate public folders
*Build and populate an index
*Apply system policies
*Enable routing groups and configure connectors
*Control virtual servers
*Enable and configure monitors, notifications, protocol logging, and message tracking
*Back up and troubleshoot Exchange

Cisco Access Lists Field Guide (Paperback): Gilbert Held, Kent Hundley Cisco Access Lists Field Guide (Paperback)
Gilbert Held, Kent Hundley
R871 Discovery Miles 8 710 Ships in 10 - 15 working days

ONE-STOP GUIDE TO CONFIGURING CISCO ACCESS LISTS.

Configuring access lists for Cisco Routers and for network operations is one of the most difficult tasks for network administrators working in a Cisco networking environment. Cisco- Access Lists Field Guide, by Gil
Held and Kent Hundley, CCNA, makes this task far less of a headache. This comprehensive reference thoroughly explores basic, dynamic, time-based, reflexive, and context-based access lists, and the use of keywords. Following a consistent, reader-friendly format, each chapter
covers the problem, offers a network illustration and access list, and a full explanation. This invaluable guide also describes potential pitfalls, and tells you how to avoid them. You also get hundreds of practical examples of access lists that can be tailored to your own environment.

Self-Stabilization (Paperback): Shlomi Dolev Self-Stabilization (Paperback)
Shlomi Dolev
R1,229 Discovery Miles 12 290 Ships in 10 - 15 working days

Self-stabilization, an important concept to theoreticians and practitioners in distributed computing and communication networks, refers to a system's ability to recover automatically from unexpected faults. In this book Shlomi Dolev presents the fundamentals of self-stabilization and demonstrates the process of designing self-stabilizing distributed systems. He details the algorithms that can be started in an arbitrary state, allowing the system to recover from the faults that brought it to that state. The book proceeds from the basic concept of self-stabilizing algorithms to advanced applications.

UNIX Backup and Recovery (Paperback): W.Curtis Preston UNIX Backup and Recovery (Paperback)
W.Curtis Preston
R1,336 Discovery Miles 13 360 Ships in 12 - 19 working days

This guide provides a complete overview of all facets of Unix backup and recovery and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. It explains everything from freely available backup systems to large-scale commercial utilities.

The Systems Librarian - Designing Roles, Defining Skills (Paperback): The Systems Librarian - Designing Roles, Defining Skills (Paperback)
R1,175 Discovery Miles 11 750 Ships in 10 - 15 working days

What is a systems librarian? Both history and practice indicate a wide variation in the field, strong commitments to local arrangements and a lack of functional standards. Library administrators and managers struggle with the broad requirements of the position, weighing the skill sets of degree holding professionals and the non-MLS technologists. Systems librarians are often designers, planners, implementors, consultants, technology representatives or facilitators. This text provides an assessment of what system librarianship is and what it can be, outlining the type of training needed for people to fill these positions, and illustrates challenges for libraries - and systems librarians - in computing and networking.

Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover): Cyrus F Nourani Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover)
Cyrus F Nourani
R2,864 Discovery Miles 28 640 Ships in 12 - 19 working days

Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of management and computing. Innovation is the generation and application of new ideas and skills to produce new products, processes, and services that improve economic and social prosperity. This includes management and design policy decisions and encompasses innovation research, analysis, and best practice in enterprises, public and private sector service organizations, government, regional societies and economies. The book, the first volume in the Innovation Management and Computing book series, looks at technology that improves efficiency and idea generation, including systems for business, medical/health, education, and more. The book provides detailed examples to provide readers with current issues, including Venture planning for innovations New technologies supporting innovations systems Competitive business modeling Context-driven innovation modeling The generation of ideas faster The measurement of relevant data Virtual interfaces Business intelligence and content processing Predictive modeling Haptic expression and emotion recognition innovations, with applications to neurocognitive medical science This book provides a wealth of information that will be useful for IT and business professionals, educators, and students in many fields.

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,650 Discovery Miles 26 500 Ships in 12 - 19 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security... Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security Standard (Hardcover)
Heru Susanto, Mohammad Nabil Almunawar
R2,982 Discovery Miles 29 820 Ships in 12 - 19 working days

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.

Reliable Distributed Computing with the Isis Toolkit (Hardcover): K.P. Birman Reliable Distributed Computing with the Isis Toolkit (Hardcover)
K.P. Birman
R3,400 Discovery Miles 34 000 Ships in 12 - 19 working days

In distributed computing systems--the software for networks--a system may have a huge number of components resulting in a high level of complexity. That and issues such as fault-tolerance, security, system management, and exploitation of concurrency make the development of complex distributed systems a challenge.

The Isis Toolkit has become one of the most successful approaches for building reliable distributed software since its release in 1987. Commercially available since 1990, Isis is used in hundreds of settings, including the New York Stock Exchange, the Electronic Stock Exchange of Switzerland, the data acquisition system of the CERN high-energy physics particle accelerator, VLSI fabrication control systems, the Iridium telecommunication system, database applications at the World Bank, and an Arctic weather environment monitoring system. Isis is also widely used for instructional purposes.

This book comprises papers that document Isis and describe its important applications. Many of these are previously unpublished papers that give a broad overview of Isis, provide details of the underlying protocols and theory, and discuss the best ways to exploit Isis features in real applications. This volume will be of use to practitioners developing Isis-based applications, to instructors using Isis in classroom settings, and to researchers who want a single reference source for this important approach to distributed computing.

Information Technology - An Introduction for Today's Digital World (Paperback, 2nd edition): Richard Fox Information Technology - An Introduction for Today's Digital World (Paperback, 2nd edition)
Richard Fox
R2,489 Discovery Miles 24 890 Ships in 9 - 17 working days

This revised edition has more breadth and depth of coverage than the first edition. Information Technology: An Introduction for Today's Digital World introduces undergraduate students to a wide variety of concepts that they will encounter throughout their IT studies and careers. The features of this edition include: Introductory system administration coverage of Windows 10 and Linux (Red Hat 7), both as general concepts and with specific hands-on instruction Coverage of programming and shell scripting, demonstrated through example code in several popular languages Updated information on modern IT careers Computer networks, including more content on cloud computing Improved coverage of computer security Ancillary material that includes a lab manual for hands-on exercises Suitable for any introductory IT course, this classroom-tested text presents many of the topics recommended by the ACM Special Interest Group on IT Education (SIGITE). It offers a far more detailed examination of the computer and IT fields than computer literacy texts, focusing on concepts essential to all IT professionals - from system administration to scripting to computer organization. Four chapters are dedicated to the Windows and Linux operating systems so that students can gain hands-on experience with operating systems that they will deal with in the real world.

Introduction to Healthcare Information - Enabling Technologies (Paperback): Raymond Gensinger Introduction to Healthcare Information - Enabling Technologies (Paperback)
Raymond Gensinger
R2,030 Discovery Miles 20 300 Ships in 12 - 19 working days

Based on HIMSS' highly successful Annual Conference workshop, "Introduction to Healthcare and IT Enabling Technologies: All You Wanted to Know and Were Afraid to Ask," this book is a valuable resource for individuals new to healthcare, healthcare professionals transitioning into the field of information technology, students or anyone wanting a better understanding of the role IT plays within today's healthcare system. The book introduces many enabling technologies currently used within healthcare, including electronic health records, personal health records, medication dispensing devices, bioelectronic equipment and patient identification technologies. In addition, the books contributors--nationally recognized leaders of their organizations' successful IT implementations--explore how external influences, such as the evolving legislative activities in Washington DC, are responsible for the rapid changes facing health IT today. With chapters focused on IT use from bedside to board room, Introduction to Healthcare Information Enabling Technologies examines today's health IT environment from various stakeholder perspectives, including nurses, physicians and the C-Suite--CEO, CFO and CIO. (2010.)

Nonfunctional Requirements in Mobile Application Development (Hardcover): Varun Gupta, Raj Chopra, Durg Chauhan Nonfunctional Requirements in Mobile Application Development (Hardcover)
Varun Gupta, Raj Chopra, Durg Chauhan
R1,668 R1,053 Discovery Miles 10 530 Save R615 (37%) Ships in 9 - 17 working days

Nonfunctional Requirements in Mobile Application Development is an empirical study that investigates how nonfunctional requirements--as compared with functional requirements--are treated by the software engineers during mobile application development. The book empirically analyzes the contribution of nonfunctional requirements to project parameters such as cost, time, and quality. Such parameters are of prime interest as they determine the survival of organizations in highly dynamic environments. The impact of nonfunctional requirements on project success is analyzed through surveys and case studies, both individually and relative to each other. Sources for data collection include industry, academia, and literature. The book also empirically studies the impact of nonfunctional requirements on the overall business success of both the software development firm and the software procuring firm. Project success is examined to determine if it leads to business success. The book provides rich empirical evidence to place nonfunctional requirements on par with functional requirements to achieve business success in highly competitive markets. This work enhances the body of knowledge through multiple empirical research methods including surveys, case studies, and experimentation to study software engineers' focus on nonfunctional requirements at both project and business levels. The book can guide both computer scientists and business managers in devising theoretical and technical solutions for software release planning to achieve business success.

Data Analytics in Marketing, Entrepreneurship, and Innovation (Hardcover): Mounir Kehal, Shahira El Alfy Data Analytics in Marketing, Entrepreneurship, and Innovation (Hardcover)
Mounir Kehal, Shahira El Alfy
R2,625 R1,608 Discovery Miles 16 080 Save R1,017 (39%) Ships in 9 - 17 working days

Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analytics Applying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analytics Developing new products Technopreneurship Disruptive versus incremental innovation The book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.

Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover): Maryann Simmons Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover)
Maryann Simmons
R3,884 Discovery Miles 38 840 Ships in 12 - 19 working days

In this book, new developments in network coding and data compression are examined. The first chapter proposes a new multipath transmission scheme that employs network coding at the source for rate-delay adaptation. The second chapter presents the theory, applications and challenges of a physical-layer network coding technique that promises significant improvement to the spectral efficiency and interference mitigation challenges in future heterogenous cellular and wireless networks. In this third chapter, network and distributed turbo coding based HARQ protocol are examined for wireless broadcasting systems. The last three chapters included in this book present three models that are based on Data Envelopment Analysis (DEA) methodology to appropriately evaluate the efficiency of multicast energy and further minimizes energy transmission in wireless networks without affecting the overall network performance; the development of methods of experimental statistical modeling of physical laws and the cascade scheme of data compression in multimode fibre systems.

UML in Practice - The Art of Modeling Software Systems Demonstrated Through Worked Examples and Solutions (Paperback): P Roques UML in Practice - The Art of Modeling Software Systems Demonstrated Through Worked Examples and Solutions (Paperback)
P Roques
R1,380 R1,143 Discovery Miles 11 430 Save R237 (17%) Ships in 10 - 15 working days

* Offers comprehensive coverage of all major modeling viewpoints
* Provides details of collaboration and class diagrams for filling in the design-level models

Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback): Surya Sinha Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback)
Surya Sinha
R478 Discovery Miles 4 780 Ships in 10 - 15 working days
Kya Hai Network Marketing Jaaniyen (Hindi, Paperback): Surya Sinha Kya Hai Network Marketing Jaaniyen (Hindi, Paperback)
Surya Sinha
R553 Discovery Miles 5 530 Ships in 10 - 15 working days
Turf - A Social and Economic History of Horse Racing (Hardcover, 2nd Edition): Wary Vamplew Turf - A Social and Economic History of Horse Racing (Hardcover, 2nd Edition)
Wary Vamplew
R2,651 Discovery Miles 26 510 Ships in 10 - 15 working days

This is the second edition of the classic on the history of British horse racing. It provides a detailed and far-ranging social and economic analysis of the major changes in British flat racing, in particular in the period between 1830 and 1939. Four major themes are explored. Firstly, the changing character and structure of the sport. Secondly, the morality of racing, which was a corrupt sport par excellence for much of the nineteenth century. Thirdly, on four categories of participants in racing jockeys, trainers, owners and breeders. Here, the author assesses whether or not these could make money out of racing. Fourthly, the book examines gambling and its important symbiotic relationship with racing. The televised, sponsored, carefully governed sport today is a vastly different affair from that of the 18th century. Then racing was a free, social event, the highlight of the entertainment calendar for the bulk of the local community. By the late 19th century most race meetings were highly commercial enterprises, requiring payment from all spectators, many of whom had travelled some distance to attend. The excitement and historical interest of these meetings is well captured here."

Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover): J. J. Stapleton Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover)
J. J. Stapleton
R3,219 Discovery Miles 32 190 Ships in 9 - 17 working days

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. The text delves beyond the typical cryptographic abstracts of encryption and digital signatures as the fundamental security controls to explain how to implement them into applications, policies, and procedures to meet business and compliance requirements. Providing you with a foundation in cryptography, it keeps things simple regarding symmetric versus asymmetric cryptography, and only refers to algorithms in general, without going too deeply into complex mathematics. Presenting comprehensive and in-depth coverage of confidentiality, integrity, authentication, non-repudiation, privacy, and key management, this book supplies authoritative insight into the commonalities and differences of various users, providers, and regulators in the U.S. and abroad.

SAP MM: Interview Questions, Answers, and Explanations (Paperback): Jordan Schliem SAP MM: Interview Questions, Answers, and Explanations (Paperback)
Jordan Schliem
R852 Discovery Miles 8 520 Ships in 10 - 15 working days

The Comprehensive Guide for SAP MM Consultants and Managers SAP MM Certification Questions, Answers, and Explanations! It's clear that MM is one of the core modules in SAP, but finding relevant resources can be difficult. SAP MM Interview Questions, Answers, and Explanations will guide you through your learning process. From helping to assess the skills you will need for your team to how to choose a project resource, SAP MM Interview Questions will put you on the path to understanding what resources really know. The book is organized around three areas of the MM module: configuration, troubleshooting, and production support. Each question includes everything you need to know to master the interview or properly evaluate a candidate. More than just a rehash of SAP documentation and sales presentations, each question is based on project knowledge and experience gained on successful high-profile SAP MM implementation projects.;Key interview topics include: - The most important MM Configuration to know - Common MM Implementation Scenarios - MM Certification Exam Questions - Consumption Based Planning - Warehouse Management - Material Master Creation and Planning - Purchasing Document Inforecords

Business Continuity Planning - A Step-by-Step Guide With Planning Forms on CD-ROM, 3rd Edition (Paperback, 3rd Enlarged ed.):... Business Continuity Planning - A Step-by-Step Guide With Planning Forms on CD-ROM, 3rd Edition (Paperback, 3rd Enlarged ed.)
Kenneth L Fulmer; Edited by Philip Jan Rothstein
R1,261 Discovery Miles 12 610 Ships in 10 - 15 working days

Your businessa survival depends on a solid business continuity and disaster recover plan. If you are overwhelmed by the very thought of creating a continuity plan for your business, this is the book for you.

It acknowledges the day-to-day realities of running an enterprise or any size by taking you step-by-step through the generally accepted abest practices, a enabling you to construct an appropriately sized recovery plan. It will neither overwhelm you nor break the bank and it will get your business continuity program running surprisingly fast and with a lot less effort than you expect. The author uses straightforward, jargon-free writing and supplements it with checklists, tables and worksheets to illustrate the easiest path to your destination.

Once you have the basic structure in place, you can refer back to this guide time and time again to build on your business continuity plan as your business evolves. The simplicity of this reference and the accompanying materials on CD-ROM will allay your concerns and allow you to confidently devote more time and resources to this critical process. As you move through the steps, you will see the practical and measurable results of a business that is becoming more resilient, more agile, and better prepared to take advantage of the next business change.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Math Games - Practice Addition And…
Kumon Paperback R290 Discovery Miles 2 900
The Pony Tails Book of Colouring Fun and…
Alice The Pony Hardcover R685 R621 Discovery Miles 6 210
Elmer Search and Find Numbers
David McKee Board book R275 R249 Discovery Miles 2 490
Mazes For Clever Kids Buster Brain Games
Dr Gareth Moore Paperback R139 Discovery Miles 1 390
Lyapunov Exponents
Luis Barreira Hardcover R3,170 Discovery Miles 31 700
Applications of Computer Content…
Mark D. West Hardcover R2,974 Discovery Miles 29 740
Measure Theory and Fine Properties of…
Lawrence Craig Evans, Ronald F. Gariepy Hardcover R2,640 Discovery Miles 26 400
Match Analysis - How to Use Data in…
Daniel Memmert Paperback R1,270 Discovery Miles 12 700
Parallaxic Praxis: Multimodal…
Pauline Sameshima Paperback R1,770 Discovery Miles 17 700
Visions of the Fantastic - Selected…
Allienne R Becker Hardcover R2,773 Discovery Miles 27 730

 

Partners