☰
×
My Account
Cart
My Account
Categories
Appliances
Arts, Crafts & Sewing
Automotive
Baby
Beauty
Books
CDs & Vinyl
Collectibles & Fine Arts
Cell Phones & Accessories
Clothing, Shoes & Jewellery
Computers
Electronics
Health & Personal Care
Home & Kitchen
Industrial & Scientific
Luggage & Travel Gear
Musical Instruments
Office Products
Patio, Lawn & Garden
Pet Supplies
Software
Sports & Outdoors
Tools & Home Improvement
Toys
Video Games
Books
>
Subjects
>
Computers & Technology
>
Networking & Cloud Computing
>
Data in the Enterprise
>
Electronic Data Interchange (EDI)
R 2,745
Computer Engineering and Technology: 23rd CCF Conference, NCCET 2019, Enshi, China, August 1–2, 2019, Revised Selected Papers (Communications in Computer and Information Science Book 1146)
R 3,959
Synthesis and Optimization of Digital Circuits
R 2,863
Job Scheduling Strategies for Parallel Processing: 23rd International Workshop, JSSPP 2020, New Orleans, LA, USA, May 22, 2020, Revised Selected Papers (Lecture Notes in Computer Science Book 12326)
R 2,745
Supercomputing: 10th International Conference on Supercomputing in Mexico, ISUM 2019, Monterrey, Mexico, March 25–29, 2019, Revised Selected Papers (Communications ... Computer and Information Science Book 1151)
R 2,368
High Performance Computing: ISC High Performance 2017 International Workshops, DRBSD, ExaComm, HCPM, HPC-IODC, IWOPH, IXPUG, P^3MA, VHPC, Visualization ... Notes in Computer Science Book 10524)
R 3,076
Accelerator Programming Using Directives: 8th International Workshop, WACCPD 2021, Virtual Event, November 14, 2021, Proceedings (Lecture Notes in Computer Science Book 13194)
R 2,745
Parallel Processing and Applied Mathematics: 13th International Conference, PPAM 2019, Bialystok, Poland, September 8–11, 2019, Revised Selected Papers, ... Notes in Computer Science Book 12043)
R 640
Hacking: How to Hack Computers, Basic Security and Penetration Testing (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, penetration testing, basic security, arduino, python)
R 2,115
Cybersecurity Bible: The Complete Guide to Detect, Prevent and Manage Cyber Threats | Includes Practical Tests & Hacking Tips for IT Security Specialists
R 1,561
Mastering Docker and Kubernetes: Build Scalable Apps with Containers: A Step-by-Step Guide to Using Docker and Kubernetes for DevOps
70
-
80
of
100 Results
previous
6
7
8
9
10
next