133 results (0,18549 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Automated Software Testing with Cypress

Automated Software Testing with Cypress

Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2. 0. 0. This book explores Cypress scripts that help implement ‘shift left testing’ which is a dream come true for many software testers. Shift left occurs in the majority of testing projects but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!

GBP 38.99
1

Software Engineering with UML

Oracle Database Programming with Java Ideas Designs and Implementations

Oracle Database Programming with Java Ideas Designs and Implementations

Databases have become an integral part of modern life. Today’s society is an information-driven society and database technology has a direct impact on all aspects of daily life. Decisions are routinely made by organizations based on the information collected and stored in databases. Database management systems such as Oracle are crucial to apply data in industrial or commercial systems. Equally crucial is a graphical user interface (GUI) to enable users to access and manipulate data in databases. The Apache NetBeans IDE with Java is an ideal candidate for developing a GUI with programming functionality. Oracle Database Programming with Java: Ideas Designs and Implementations is written for college students and software programmers who want to develop practical and commercial database programming with Java and relational databases such as Oracle Database XE 18c. The book details practical considerations and applications of database programming with Java and is filled with authentic examples as well as detailed explanations. Advanced topics in Java Web like Java Web Applications and Java Web Services are covered in real project examples to show how to handle the database programming issues in the Apache NetBeans IDE environment. This book features: A real sample database CSE _ DEPT which is built with Oracle SQL Developer provided and used throughout the book Step by step detailed illustrations and descriptions of how to design and build a practical relational database Fundamental and advanced Java database programming techniques practical to both beginning students and experienced programmers Updated Java desktop and Web database programming techniques such as Java Enterprise Edition 7 JavaServer Pages JavaServer Faces Enterprise Java Beans Web applications and Web services including GlassFish and Tomcat Web servers More than 30 real database programming projects with detailed illustrations Actual JDBC APIs and JDBC drivers along with code explanations Homework and selected solutions for each chapter to strengthen and improve students’ learning and understanding of the topics they have studied | Oracle Database Programming with Java Ideas Designs and Implementations

GBP 82.99
1

Securing IoT in Industry 4.0 Applications with Blockchain

Securing IoT in Industry 4.0 Applications with Blockchain

The Industry 4. 0 revolution is changing the world around us. Artificial intelligence and machine learning automation and robotics big data Internet of Things augmented reality virtual reality and creativity are the tools of Industry 4. 0. Improved collaboration is seen between smart systems and humans which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation. Securing IoT in Industry 4. 0 Applications with Blockchain examines the role of IoT in Industry 4. 0 and how it can be made secure through various technologies including blockchain. The book begins with an in-depth look at IoT and discusses applications architecture technologies tools and programming languages. It then examines blockchain and cybersecurity as well as how blockchain achieves cybersecurity. It also looks at cybercrimes and their preventive measures and issues related to IoT security and trust. Features An overview of how IoT is used to improve the performance of Industry 4. 0 systems The evolution of the Industrial Internet of Things (IIoT) its proliferation and market share and some examples across major industries An exploration of how smart farming is helping farmers prevent plant disease The concepts behind the Internet of Nano Things (IoNT) including the nanomachine and nanonetwork architecture and nano-communication paradigms A look at how blockchains can enhance cybersecurity in a variety of applications including smart contracts transferring financial instruments and Public Key Infrastructure An overview of the structure and working of a blockchain including the types evolution benefits and applications of blockchain to industries A framework of technologies designed to shield networks computers and data from malware vulnerabilities and unauthorized activities An explanation of the automation system employed in industries along with its classification functionality flexibility limitations and applications

GBP 115.00
1

Modeling Software with Finite State Machines A Practical Approach

Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

With an ever-increasing amount of information on the web it is critical to understand the pedigree quality and accuracy of your data. Using provenance you can ascertain the quality of data based on its ancestral data and derivations track back to sources of errors allow automatic re-enactment of derivations to update data and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes products tools and standards for secure data management secure Semantic Web secure web services and secure cloud computing.

GBP 56.99
1

Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques

Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques

A company with effective cost reduction activities in place will be better positioned to adapt to shifting economic conditions. In fact it can make the difference between organizations that thrive and those that simply survive during times of economic uncertainty. Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques covers the methods and techniques currently available for lowering the costs of products processes and services. Describing why cost reductions can be just as powerful as revenue increases the book arms readers with the understanding required to select the best solution for their company’s culture and capabilities. It emphasizes home-grown techniques that do not require the implementation of any new methodologies—making it easy to apply them in any organization. The authors explain how to reduce costs through traditional Lean methods and Lean Six Sigma. They also present Six Sigma cost savings techniques from Manufacturing Six Sigma Services Six Sigma and Design for Six Sigma. The book also presents optimization techniques from operations research methods design experiment and engineering process control. Helping you determine what your organization’s value proposition is the text explains how to improve on the existing proposition and suggests a range of tools to help you achieve this goal. The tools and techniques presented vary in complexity and capability and most chapters include a rubric at the start to help readers determine the levels of competence required to perform the tasks outlined in that chapter.

GBP 56.99
1

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

#1 Best Selling Information Security Book by Taylor & Francis in 2019 2020 2021 and 2022! 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success Information Security Governance Simplified: From the Boardroom to the Keyboard co-author for the E-C Council CISO Body of Knowledge and contributor to many others including Official (ISC)2 Guide to the CISSP CBK COBIT 5 for Information Security and ISACA CSX Cybersecurity Fundamental Certification is back with this new book incorporating practical experience in leading building and sustaining an information security/cybersecurity program. CISO COMPASS includes personal pragmatic perspectives and lessons learned of over 75 award-winning CISOs security leaders professional association leaders and cybersecurity standard setters who have fought the tough battle. Todd has also for the first time adapted the McKinsey 7S framework (strategy structure systems shared values staff skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization capable of industry/ peer award-winning recognition enhance cybersecurity maturity gain confidence by senior management and avoid pitfalls. The book is a comprehensive soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy emerging trends and technologies cybersecurity organization structure and reporting models leveraging current incidents security control frameworks risk management laws and regulations data protection and privacy meaningful policies and procedures multi-generational workforce team dynamics soft skills and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity. | CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

GBP 44.99
1

FinTech The Technology Driving Disruption in the Financial Services Industry

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software: Requirements Test Cases and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:Pre-developed nonfunctional requirements that can be reused for any software development project Documented test cases that go along with the requirements and can be used to develop a Test Plan for the softwareTesting methods that can be applied to the test cases provided Downloadable resources with all security requirements and test cases as well as MS Word versions of the checklists requirements and test cases covered in the bookOffering ground-level already-developed software nonfunctional requirements and corresponding test cases and methods this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying downloadable resources filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis design and testing phases of your software development lifecycle. Some Praise for the Book:This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation . . —Doug Cavit Chief Security Strategist Microsoft Corporation. provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC). —Jeff Weekes Sr. Security Architect at Terra Verde Services. full of useful insights and practical advice from two au | Secure and Resilient Software Requirements Test Cases and Testing Methods

GBP 56.99
1

C++ Template Metaprogramming in Practice A Deep Learning Framework

C++ Template Metaprogramming in Practice A Deep Learning Framework

Using the implementation of a deep learning framework as an example C++ Template Metaprogramming in Practice: A Deep Learning Framework explains the application of metaprogramming in a relatively large project and emphasizes ways to optimize systems performance. The book is suitable for developers with a basic knowledge of C++. Developers familiar with mainstream deep learning frameworks can also refer to this book to compare the differences between the deep learning framework implemented with metaprogramming and compile-time computing with deep learning frameworks using object-oriented methods. Consisting of eight chapters the book starts with two chapters discussing basic techniques of metaprogramming and compile-time computing. The rest of the book’s chapters focus on the practical application of metaprogramming in a deep learning framework. It examines rich types and systems expression templates and writing complex meta-functions as well as such topics as: Heterogeneous dictionaries and policy templates An introduction to deep learning Type system and basic data types Operations and expression templates Basic layers Composite and recurrent layers Evaluation and its optimization Metaprogramming can construct flexible and efficient code. For C++ developers who are familiar with object-oriented programming the main difficulty in learning and mastering C++ metaprogramming is establishing the thinking mode of functional programming. The meta-programming approach involved at compile time is functional which means that the intermediate results of the construction cannot be changed and the impact may be greater than expected. This book enables C++ programmers to develop a functional mindset and metaprogramming skills. The book also discusses the development cost and use cost of metaprogramming and provides workarounds for minimizing these costs. | C++ Template Metaprogramming in Practice A Deep Learning Framework

GBP 99.99
1

The Total CISSP Exam Prep Book Practice Questions Answers and Test Taking Tips and Techniques

GBP 160.00
1

Making Your Data Center Energy Efficient

Making Your Data Center Energy Efficient

Detailing powerful methods for reducing the energy costs associated with operating a data center Making Your Data Center Energy Efficient examines both equipment and building facilities. It reviews the rationale for conserving energy and demonstrates how conservation and careful equipment selection can lead to significant improvements to your bottom line. For those not well-versed in financial or energy terms the first two chapters provide a detailed discussion of the terms associated with different types of energy as well as how to compute the return on investment for energy conservation efforts. The text includes tables of monthly expenses associated with operating equipment that will help you convert problems into simple table lookup processes. Among the money-saving topics discussed it considers: How to minimize the energy consumption of a wide range of devices A little-understood topic that can make a big impact on energy costs general heating and cooling Techniques required to effectively monitor different types of meters Phantom energy usage and methods for minimizing its cost to your organization Recognizing that most readers may not have direct control over the selection of a furnace or hot water heater the book provides you with the ability to recognize the efficiencies and inefficiencies of various types of devices so you can provide input into the decision-making process. From replacing lighting to consolidation and virtualization it provides you with the well-rounded understanding needed to properly manage all aspects of the energy consumed in your data center.

GBP 160.00
1

Extremal Optimization Fundamentals Algorithms and Applications

Extremal Optimization Fundamentals Algorithms and Applications

Extremal Optimization: Fundamentals Algorithms and Applications introduces state-of-the-art extremal optimization (EO) and modified EO (MEO) solutions from fundamentals methodologies and algorithms to applications based on numerous classic publications and the authors’ recent original research results. It promotes the movement of EO from academic study to practical applications. The book covers four aspects beginning with a general review of real-world optimization problems and popular solutions with a focus on computational complexity such as NP-hard and the phase transitions occurring on the search landscape. Next it introduces computational extremal dynamics and its applications in EO from principles mechanisms and algorithms to the experiments on some benchmark problems such as TSP spin glass Max-SAT (maximum satisfiability) and graph partition. It then presents studies on the fundamental features of search dynamics and mechanisms in EO with a focus on self-organized optimization evolutionary probability distribution and structure features (e. g. backbones) which are based on the authors’ recent research results. Finally it discusses applications of EO and MEO in multiobjective optimization systems modeling intelligent control and production scheduling. The authors present the advanced features of EO in solving NP-hard problems through problem formulation algorithms and simulation studies on popular benchmarks and industrial applications. They also focus on the development of MEO and its applications. This book can be used as a reference for graduate students research developers and practical engineers who work on developing optimization solutions for those complex systems with hardness that cannot be solved with mathematical optimization or other computational intelligence such as evolutionary computations. | Extremal Optimization Fundamentals Algorithms and Applications

GBP 42.99
1

Packet Forwarding Technologies

Project Management in Small and Medium-Sized Enterprises A European Perspective

Project Management in Small and Medium-Sized Enterprises A European Perspective

The growing importance of projects in organizations combined with difficulties in their implementation is accompanied by the need for professional knowledge in the field of project management. It results from the complexity of project management problems and the difficulty of knowledge that must be applied. However surprisingly little is known about this topic especially in the context of European small and medium-sized enterprises (SMEs). Project Management in Small and Medium-Sized Enterprises: A European Perspective attempts to fill this specific research gap. The book analyses the process of managing projects being implemented by small and medium-sized firms from Europe identifies organizational processes and verifies which elements of these processes require improvement. It concentrates on issues around the multifaceted characteristics of project management with particular emphasis on the process of managing European small and medium enterprises. The book is the result of many years of empirical research and consists of two main parts: A systematization of concepts terminology and thus knowledge in the field of project management with particular emphasis on the phases of planning organizing as well as leading and controlling in the project as well as small and medium-sized enterprises with particular emphasis on their specificity and role in the modern European economy. A systematization of concepts terminology and thus knowledge in the field of project management with particular emphasis on the phases of planning organizing as well as leading and controlling in the project as well as small and medium-sized enterprises with particular emphasis on their specificity and role in the modern European economy Verification and development of such model procedures in the management of projects so that the SME enterprises’ functioning will be efficient and effective. There is a close relationship between the two parts. The theoretical part is the foundation on which practical considerations are later carried out. Integrating theoretical and practical issues the book introduces new content to the literature and has the practical value of indicating how to manage projects in SMEs in the European Union. It also examines the decision-making processes related to project management in these organizations. | Project Management in Small and Medium-Sized Enterprises A European Perspective

GBP 89.99
1

How to Win at CRM Strategy Implementation Management

A Technical Guide to IPSec Virtual Private Networks

TCP Performance over UMTS-HSDPA Systems

TCP Performance over UMTS-HSDPA Systems

The evolution of the mobile communication market is causing a major increase in data traffic demands. This could lead to disrupted mobility and intermittent degraded channel conditions that contribute to poor transmission control protocol (TCP) performance. TCP Performance over UMTS-HSDPA Systems presents a comprehensive study of the effect of TCP on achieved application bit rate performance and system capacity and shows how to reduce the interaction of wireless networks on TCP with minimal cost. With self-contained chapters the book consists of two main sections. The first several chapters provide background and describe the state of the art for wireless networks emphasizing one of the third-generation (3G) wireless technologies: the universal mobile telecommunications system (UMTS). These chapters also include an analysis of the overall cell capacity for UMTS Release 99 and high-speed downlink packet access (HSDPA) systems. The second section focuses on the interaction of TCP with wireless systems presenting an exhaustive list of TCP versions and link layer solutions that adapt TCP (often modifying the original TCP) to a wireless network. This section also displays mathematical modeling of the interaction of hybrid automatic repeat request (HARQ) and TCP in UMTS networks. While offering information for advanced undergraduate students who are unfamiliar with code division multiple access (CDMA) wireless systems as well as UMTS and HSDPA cellular systems the book also provides extensive coverage of TCP over wireless systems problems and solutions for researchers developers and graduate students.

GBP 56.99
1

Handbook of Data Management 1999 Edition

Handbook of Data Management 1999 Edition

Packed with dozens of no-nonsense chapters written by leading professionals Handbook of Data Management 1999 Edition shows your students how to design build and maintain high-performance high-availability databases in multiple environments. Handbook of Data Management 1999 Edition is the most comprehensive single-volume guide of its kind. The book provides the latest most innovative solutions for planning developing and running a powerful data management function. Here students will find exhaustive coverage of the range of data repositories (from legacy indexed files to object data bases and data warehouses) as well as details on everything from strategic planning to maximizing database performance. Completely revised and updated to reflect latebreaking technologies Handbook of Data Management 1999 Edition includes extensive case studies and straightforward descriptions showing students how to:implement Web-enabled data warehousesbuild multimedia databasesmaster data mininguse enterprise database modelingstay up-to-date with data conversion and migrationmaximize OLAP architectures and toolsHandbook of Data Management 1999 Edition also provides ongoing coverage of the latest tools and techniques regarding:organization for quality information systemsdata definitiondatabase design and managementobject and hybrid databasesand moreEach contributor to Handbook of Data Management 1999 Edition is an expert with first-hand experience in database and data management. These contributors provide a depth and breadth of coverage you and your students simply won't find anywhere else. Prepare your students for real-world business computing. Start them off with Handbook of Data Management 1999 Edition.

GBP 425.00
1

Applied Semantic Web Technologies

Applied Semantic Web Technologies

The rapid advancement of semantic web technologies along with the fact that they are at various levels of maturity has left many practitioners confused about the current state of these technologies. Focusing on the most mature technologies Applied Semantic Web Technologies integrates theory with case studies to illustrate the history current state and future direction of the semantic web. It maintains an emphasis on real-world applications and examines the technical and practical issues related to the use of semantic technologies in intelligent information management. The book starts with an introduction to the fundamentals—reviewing ontology basics ontology languages and research related to ontology alignment mediation and mapping. Next it covers ontology engineering issues and presents a collaborative ontology engineering tool that is an extension of the Semantic MediaWiki. Unveiling a novel approach to data and knowledge engineering the text: Introduces cutting-edge taxonomy-aware algorithms Examines semantics-based service composition in transport logistics Offers ontology alignment tools that use information visualization techniques Explains how to enrich the representation of entity semantics in an ontology Addresses challenges in tackling the content creation bottleneck Using case studies the book provides authoritative insights and highlights valuable lessons learned by the authors—information systems veterans with decades of experience. They explain how to create social ontologies and present examples of the application of semantic technologies in building automation logistics ontology-driven business process intelligence decision making and energy efficiency in smart homes.

GBP 54.99
1

Enterprise Systems Integration

Enterprise Systems Integration

The convergence of knowledge technology and human performance which comprises today's enterprise allows creative business process design. Thus an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration. The book combines the perspectives knowledge and experience of more than 70 experts in the various areas that involve enterprise integration. Their expertise ranges from hands-on experience with technology and project management to the higher-level issues of business and management strategy. Each chapter examines an issue or technology relevant to today's enterprise. Collectively these chapters span the range of enterprise computing and systems integration. Once armed with the strategy and technologies you must successfully deploy ERP systems within budget and on time. In addition you must be able to integrate them into the rest of the enterprise. Still ERP software does not make up the full picture of today's enterprise. Legacy systems e-commerce and other Web-based systems client/server applications networks and communications systems data warehousing and integrated databases enter into the mix. Enterprise Systems Integration Second Edition paints a comprehensive picture of the technologies that comprise today's enterprise and shows you how to make them work together.

GBP 56.99
1

Configuration Management Second Edition Theory and Application for Engineers Managers and Practitioners

Practical AI for Cybersecurity

Practical AI for Cybersecurity

The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched new variants of it are already on the way. IT Security teams in businesses and corporations are struggling daily to fight off any cyberthreats that they are experiencing. On top of this they are also asked by their CIO or CISO to model what future Cyberattacks could potentially look like and ways as to how the lines of defenses can be further enhanced. IT Security teams are overburdened and are struggling to find ways in order to keep up with what they are being asked to do. Trying to model the cyberthreat landscape is a very laborious process because it takes a lot of time to analyze datasets from many intelligence feeds. What can be done to accomplish this Herculean task? The answer lies in Artificial Intelligence (AI). With AI an IT Security team can model what the future Cyberthreat landscape could potentially look like in just a matter of minutes. As a result this gives valuable time for them not only to fight off the threats that they are facing but to also come up with solutions for the variants that will come out later. Practical AI for Cybersecurity explores the ways and methods as to how AI can be used in cybersecurity with an emphasis upon its subcomponents of machine learning computer vision and neural networks. The book shows how AI can be used to help automate the routine and ordinary tasks that are encountered by both penetration testing and threat hunting teams. The result is that security professionals can spend more time finding and discovering unknown vulnerabilities and weaknesses that their systems are facing as well as be able to come up with solid recommendations as to how the systems can be patched up quickly.

GBP 44.99
1

A Guide to IT Contracting Checklists Tools and Techniques

A Guide to IT Contracting Checklists Tools and Techniques

Since A Guide to IT Contracting: Checklists Tools and Techniques first published several alarming trends have developed in the technology contracting industry. These trends include: The Dawn of the As-Is Technology Product The Ever-Changing Product Where in the World Is My Data? To meet these challenges the Second Edition helps business managers and lawyers explore alternate solutions from other vendors conduct simultaneous negotiations with other vendors and generally ensure prospective vendors understand they can lose the deal if they refuse to act reasonably. Distilling the most critical business and legal lessons learned through the author’s decades of legal experience drafting and negotiating IT-related agreements this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement each chapter includes a checklist of essential terms a brief summary of what the agreement is intended to do and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes a complete glossary that defines key legal business and technical terms Technology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors. | A Guide to IT Contracting Checklists Tools and Techniques

GBP 44.99
1