Computers, Technology & Guides
Filter by price
- R0,00 - R100,00
- R101,00 - R250,00
- R251,00 - R500,00
- R501,00 - R1 000,00
- R1 001,00 - R2 500,00
- Over R2 501,00
Ask most women whether they have the right to equality at work and the answer will be a resounding yes, but ask the same women whether they'd feel confident asking for a raise, or a promotion, and some reticence creeps in. This book tells how women can help themselves, and make changes in their life that can effect change on a universal scale.
THE NEW YORK TIMES BESTSELLERFor all that's been written about the Four over the last two decades, no one has captured their power and staggering success as insightfully as Scott Galloway. How did the Four infiltrate our lives so completely that they're almost impossible to avoid (or boycott)?
From the global authority in record-breaking comes the 11th edition of the world's best-selling gaming annual. Packed with the latest records, coolest stars and the biggest games, the Guinness World Records Gamer's Edition is the go-to bible for every gaming fan. Just ask the five million readers who've made it an international sensation!
The bestselling Mac guide, updated for the latest Mac OS X and now in full color! Mac OS X Lion represents a new era in the Mac operating system. This friendly guide is fully updated for the latest Mac OS X and provides everything new Mac users and users upgrading to Mac OS X Lion need to know.
Unique graphic guide to the fascinating developments in AI and their philosophical implications
New for Icon's Hot Science series - a startling insight into the data that runs our lives.
Friedman, a Pulitzer Prize-winning columnist, and Mandelbaum, a leading foreign policy thinker, analyze four major challenges America faces today and spell out what we need to do now to rediscover America and rise to this moment.
Human-Computer Interaction is important as a means of achieving competitive IT product designs. Providing coverage for a one semester course, the examples and activities are useful exam preparation tools for computing students on an introductory HCI course.
Aimed at technical people including practicing engineers, engineering students, and others interested in Windows[registered] programming and graphic capabilities. This book introduces readers to the subject using the object-oriented environment and tools of Microsoft[registered] Foundation Classes (MFC).
Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents methods for designing and analyzing firewall policies.
Focuses on computational intelligence techniques and its applications. This book brings together many different aspects of the research on intelligence technologies such as neural networks, support vector machines, fuzzy logic and evolutionary computation. It presents fundamental concepts and essential analysis of various computational techniques.
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.
A practical guide to computer usage for owners of small businesses, relating to Microsoft Office and Windows 95. The text offers worked examples from each of the applications including production, budgeting, human resources, and marketing and administration.
Adopts a detailed and methodological algorithmic approach to explain the concepts of pattern recognition. This book deals with topics such as: pattern representation, nearest neighour based classifiers, neural networks, support vector machines, and decision trees.
This text on computers and the law covers topics such as patenting computer hardware and software, the scope of digital copyright, trade secrets and unfair competition, computers and the law of contract, and computer crime.