Close
(0) items
You have no items in your shopping cart.
All Categories
    Filters
    Currency
    Search

    Computers, Technology & Guides


    View as Grid List
    Display per page

    Guinness World Records: 2018

    R215,00
    From the global authority in record-breaking comes the 11th edition of the world's best-selling gaming annual. Packed with the latest records, coolest stars and the biggest games, the Guinness World Records Gamer's Edition is the go-to bible for every gaming fan. Just ask the five million readers who've made it an international sensation!

    The Smarter Screen: What Your Business Can Learn from the Way Consumers Think Online

    R99,00 R293,33
    A leading behavioral economist shows how businesses can improve consumer thinking and decision-making on screens.

    Tim Noakes

    R185,00 R220,00
    On 5 February 2014, world-renowned scientist Tim Noakes fired off a tweet allegedly dispensing dietary advice to a young mother into a highly volatile media space; the fallout threatened to destroy his career. This is the untold backstory.

    Mac OS X Lion: The Missing Manual

    R40,00 R537,06
    With Lion, Apple has unleashed the most innovative version of Mac OS X yet - and you'll learn all about it with David Pogue's meticulous Missing Manual. Mac OS X 10.7 completely transforms the Mac user interface with multi-touch gestures borrowed from the iPhone and iPad, and includes more 250 brand-new features.

    How to Speak Droid with R2-D2: A Communication Manual

    R129,00 R259,13
    Fans get to see another side of one of the most popular (but least understood) Star Wars characters in the latest of our best-selling sound books.

    Mac OS X Lion For Dummies

    R30,00 R376,71
    The bestselling Mac guide, updated for the latest Mac OS X and now in full color! Mac OS X Lion represents a new era in the Mac operating system. This friendly guide is fully updated for the latest Mac OS X and provides everything new Mac users and users upgrading to Mac OS X Lion need to know.

    That Used to Be Us: How America Fell Behind in the World It Invented and How We Can Come Back

    R179,00
    Friedman, a Pulitzer Prize-winning columnist, and Mandelbaum, a leading foreign policy thinker, analyze four major challenges America faces today and spell out what we need to do now to rediscover America and rise to this moment.

    Hands-On Matrix Algebra Using R: Active and Motivated Learning with Applications

    R2 044,00
    Teaches matrix algebra, allowing the student to learn the material by actually working with matrix objects in modern computer environment of R. This book provides a comprehensive overview of matrix theory without being bogged down in proofs or tedium.

    Data Analysis for Network Cyber-Security

    R1 652,00
    There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.

    Business practice

    R194,00

    The Hyperlinked Life (Frames Series): Live with Wisdom in an Age of Information Overload

    R99,00 R109,95
    In an age of accelerated content, how do you process and filter information well? What if we could read less, but know more? When it comes to being stewards of information streams and discerning truth, we often need help in becoming good stewards of information. If you feel burdened by information overload, then this softcover book is for you.

    Business computing

    R416,00 R450,00
    This text teaches modern business computing principles in an easy-to-read format. Based on African society, the book contains local examples.

    Security in Ad-Hoc and Sensor Networks

    R2 996,00
    Security issues in ad-hoc and sensor networks have become extremely important. This book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed.