0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Ubiquitous Computing Application and Wireless Sensor - UCAWSN-14 (Hardcover, 2015 ed.): James J (Jong Hyuk) Park, Yi Pan,... Ubiquitous Computing Application and Wireless Sensor - UCAWSN-14 (Hardcover, 2015 ed.)
James J (Jong Hyuk) Park, Yi Pan, Han-Chieh Chao, Gangman Yi
R5,296 Discovery Miles 52 960 Ships in 18 - 22 working days

IT changes everyday's life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its special tracks.

Secure Networked Inference with Unreliable Data Sources (Hardcover, 1st ed. 2018): Aditya Vempaty, Bhavya Kailkhura, Pramod K.... Secure Networked Inference with Unreliable Data Sources (Hardcover, 1st ed. 2018)
Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney
R2,662 Discovery Miles 26 620 Ships in 18 - 22 working days

The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.

Coding, Cryptography and Combinatorics (Hardcover, 2004 ed.): Keqin Feng, Harald Niederreiter, Chaoping Xing Coding, Cryptography and Combinatorics (Hardcover, 2004 ed.)
Keqin Feng, Harald Niederreiter, Chaoping Xing
R2,875 Discovery Miles 28 750 Ships in 18 - 22 working days

It has long been recognized that there are fascinating connections between cod ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the program committee. Thus, it was de cided to call on all invited speakers and presenters of accepted contributed talks to submit their manuscripts for publication in the present volume. Altogether, 39 submissions were received and subjected to another round of refereeing. After care ful scrutiny, 28 papers were accepted for publication."

VLSI-SoC: Technologies for Systems Integration - 17th IFIP WG 10.5/IEEE International Conference on Very Large Scale... VLSI-SoC: Technologies for Systems Integration - 17th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2009, Florianopolis, Brazil, October 12-15, 2009, Revised Selected Papers (Hardcover, 2011 Ed.)
Jurgen Becker, Marcelo De Oliveira Johann, Ricardo Reis
R1,414 Discovery Miles 14 140 Ships in 18 - 22 working days

This book contains extended and revised versions of the best papers presented at the 17th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2009, held in Florian polis, Brazil, in October 2009. The 8 papers included in the book together with two keynote talks were carefully reviewed and selected from 27 papers presented at the conference. The papers cover a wide variety of excellence in VLSI technology and advanced research addressing the current trend toward increasing chip integration and technology process advancements bringing about stimulating new challenges both at the physical and system-design levels, as well as in the test of theses systems.

Critical Infrastructure Protection II (Hardcover, 2008 ed.): Mauricio Papa, Sujeet Shenoi Critical Infrastructure Protection II (Hardcover, 2008 ed.)
Mauricio Papa, Sujeet Shenoi
R2,810 Discovery Miles 28 100 Ships in 18 - 22 working days

Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.

This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

Allied and Axis Signals Intelligence in World War II (Hardcover, annotated edition): David Alvarez Allied and Axis Signals Intelligence in World War II (Hardcover, annotated edition)
David Alvarez
R4,922 Discovery Miles 49 220 Ships in 10 - 15 working days

In the 25 years since the revelation of the so-called 'Ultra secret', the importance of codebreaking and signals intelligence in the diplomacy and military operations of the Second World War has become increasingly evident. Studies of wartime signals intelligence, however, have largely focused on Great Britain and the United States and their successes against, respectively, the German Enigma and Japanese Purple cipher machines. Drawing upon newly available sources in Australia, Britain, China, France and the United States, the articles in this volume demonstrate that the codebreaking war was a truly global conflict in which many countries were active and successful. They discuss the work of Australian, Chinese, Finnish, French and Japanese codebreakers, shed new light on the work of their American and British counterparts, and describe the struggle to apply technology to the problems of radio intercept and cryptanalysis. The contributions also reveal that, for the Axis as well as the Allies, success in the signals war often depended upon close collaboration among alliance partners.

Allied and Axis Signals Intelligence in World War II (Paperback): David Alvarez Allied and Axis Signals Intelligence in World War II (Paperback)
David Alvarez
R2,032 Discovery Miles 20 320 Ships in 10 - 15 working days

In the 25 years since the revelation of the so-called 'Ultra secret', the importance of codebreaking and signals intelligence in the diplomacy and military operations of the Second World War has become increasingly evident. Studies of wartime signals intelligence, however, have largely focused on Great Britain and the United States and their successes against, respectively, the German Enigma and Japanese Purple cipher machines. Drawing upon newly available sources in Australia, Britain, China, France and the United States, the articles in this volume demonstrate that the codebreaking war was a truly global conflict in which many countries were active and successful. They discuss the work of Australian, Chinese, Finnish, French and Japanese codebreakers, shed new light on the work of their American and British counterparts, and describe the struggle to apply technology to the problems of radio intercept and cryptanalysis. The contributions also reveal that, for the Axis as well as the Allies, success in the signals war often depended upon close collaboration among alliance partners.

Integrated Research in Steganography (Hardcover): Audrey Coon Integrated Research in Steganography (Hardcover)
Audrey Coon
R1,565 R1,456 Discovery Miles 14 560 Save R109 (7%) Ships in 18 - 22 working days
Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,311 Discovery Miles 33 110 Ships in 10 - 15 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Computing Security & Cryptography Handbook (Hardcover): Stephen Mason Computing Security & Cryptography Handbook (Hardcover)
Stephen Mason
R2,121 Discovery Miles 21 210 Ships in 10 - 15 working days
Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover): Deepak Kumar Sharma, Koyel... Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover)
Deepak Kumar Sharma, Koyel Datta Gupta, Rinky Dwivedi
R3,576 Discovery Miles 35 760 Ships in 9 - 17 working days

This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

Principles of Signals and Systems (Hardcover, 1st ed. 2023): Orhangazi Principles of Signals and Systems (Hardcover, 1st ed. 2023)
Orhangazi
R2,478 Discovery Miles 24 780 Ships in 18 - 22 working days

The textbook presents basic concepts of signals and systems in a clear manner, based on the author's 15+ years of teaching the undergraduate course for engineering students. To attain full benefit from the content, readers should have a strong knowledge of calculus and be familiar with integration, differentiation, and summation operations. The book starts with an introduction to signals and systems and continues with coverage of basic signal functions and their manipulations; energy, power, convolution, and systems; Fourier analysis of continuous time signals and digital signals; Laplace transform; and Z transforms. Practical applications are included throughout. The book is also packed with solved examples, self-study exercises, and end of chapter problems.

Searchable Encryption - From Concepts to Systems (Hardcover, 1st ed. 2023): Kui Ren, Cong Wang Searchable Encryption - From Concepts to Systems (Hardcover, 1st ed. 2023)
Kui Ren, Cong Wang
R3,650 Discovery Miles 36 500 Ships in 10 - 15 working days

This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.

Collaborative Humanities Research and Pedagogy - The Networks of John Matthews Manly and Edith Rickert (Hardcover, 1st ed.... Collaborative Humanities Research and Pedagogy - The Networks of John Matthews Manly and Edith Rickert (Hardcover, 1st ed. 2022)
Katherine Ellison, Susan M Kim
R2,687 Discovery Miles 26 870 Ships in 18 - 22 working days

This edited collection of essays brings together scholars across disciplines who consider the collaborative work of John Matthews Manly and Edith Rickert, philologists, medievalists and early modernists, cryptologists, and education reformers. These pioneers crafted interdisciplinary partnerships as they modeled and advocated for cooperative alliances at every level of their work and in all their academic relationships. Their extensive network of intellectual partnerships made possible groundbreaking projects, from the eight-volume Text of the Canterbury Tales (1940) to the deciphering of the Waberski Cipher, yet, except for their Chaucer work, their many other accomplishments have received little attention. Collaborative Humanities Research and Pedagogy not only surveys the rich range of their work but also emphasizes the transformative intellectual and pedagogical benefits of collaboration.

Myths Vs. Facts Of Cryptocurrency (Hardcover): Alex Caine Myths Vs. Facts Of Cryptocurrency (Hardcover)
Alex Caine; Edited by Matthew Thrush
R711 Discovery Miles 7 110 Ships in 10 - 15 working days
Systematic Innovation Partnerships with Artificial Intelligence and Information Technology - 22nd International TRIZ Future... Systematic Innovation Partnerships with Artificial Intelligence and Information Technology - 22nd International TRIZ Future Conference, TFC 2022, Warsaw, Poland, September 27-29, 2022, Proceedings (Hardcover, 1st ed. 2022)
Robert Nowak, Jerzy Chrzaszcz, Stelian Brad
R2,734 Discovery Miles 27 340 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 22nd International TRIZ Future Conference on Automated Invention for Smart Industries, TFC 2022, which took place in Warsaw, Poland, in September 2022; the event was sponsored by IFIP WG 5.4.The 39 full papers presented were carefully reviewed and selected from 43 submissions. They are organized in the following thematic sections: New perspectives of TRIZ; AI in systematic innovation; systematic innovations supporting IT and AI; TRIZ applications; TRIZ education and ecosystem.

Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers (Hardcover, 1st ed. 2022)
Michael Friedewald, Stephan Krenn, Ina Schiering, Stefan Schiffner
R2,435 Discovery Miles 24 350 Ships in 18 - 22 working days

This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021.The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.

Modern Cryptography and Computational Number Theory (Hardcover): Megan Cosgrove Modern Cryptography and Computational Number Theory (Hardcover)
Megan Cosgrove
R3,053 R2,768 Discovery Miles 27 680 Save R285 (9%) Ships in 18 - 22 working days
Mathematics in Computing - An Accessible Guide to Historical, Foundational and Application Contexts (Hardcover, 2013 ed.):... Mathematics in Computing - An Accessible Guide to Historical, Foundational and Application Contexts (Hardcover, 2013 ed.)
Gerard O'Regan
R2,282 Discovery Miles 22 820 Ships in 10 - 15 working days

This clearly written and enlightening textbook provides a concise, introductory guide to the key mathematical concepts and techniques used by computer scientists. Topics and features: ideal for self-study, offering many pedagogical features such as chapter-opening key topics, chapter introductions and summaries, review questions, and a glossary; places our current state of knowledge within the context of the contributions made by early civilizations, such as the ancient Babylonians, Egyptians and Greeks; examines the building blocks of mathematics, including sets, relations and functions; presents an introduction to logic, formal methods and software engineering; explains the fundamentals of number theory, and its application in cryptography; describes the basics of coding theory, language theory, and graph theory; discusses the concept of computability and decideability; includes concise coverage of calculus, probability and statistics, matrices, complex numbers and quaternions.

Cryptographic Engineering (Hardcover, 2009 ed.): Cetin Kaya Koc Cryptographic Engineering (Hardcover, 2009 ed.)
Cetin Kaya Koc
R6,580 Discovery Miles 65 800 Ships in 18 - 22 working days

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry.

This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments. Students will have to have the knowledge of basic cryptographic algorithms before taking this course which will teach them how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.

Additionally, engineers working in the industry will be interested in this book to learn how to design cryptographic chips and embedded software. Engineers working on the design of cellular phones, mobile computing and sensor systems, web and enterprise security systems which rely upon cryptographic hardware and software will be interested in this book. Essential and advanced design techniques for cryptography will be covered by this book."

Human Choice and Digital by Default: Autonomy vs Digital Determination - 15th IFIP International Conference on Human Choice and... Human Choice and Digital by Default: Autonomy vs Digital Determination - 15th IFIP International Conference on Human Choice and Computers, HCC 2022, Tokyo, Japan, September 8-9, 2022, Proceedings (Hardcover, 1st ed. 2022)
David Kreps, Robert Davison, Taro Komukai, Kaori Ishii
R1,420 Discovery Miles 14 200 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th IFIP TC 9 International Conference on Human Choice and Computers, HCC15 2022, in Tokyo, Japan, in September 2022. The 17 full papers presented were carefully reviewed and selected from 32 submissions. Summaries of 2 keynote presentations are also included. The papers deal with the constantly evolving intimate relationship between humans and technology.

AI and Deep Learning in Biometric Security - Trends, Potential, and Challenges (Hardcover): Gaurav Jaswal, Vivek Kanhangad,... AI and Deep Learning in Biometric Security - Trends, Potential, and Challenges (Hardcover)
Gaurav Jaswal, Vivek Kanhangad, Raghavendra Ramachandra
R4,927 Discovery Miles 49 270 Ships in 10 - 15 working days

This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. This text highlights a showcase of cutting-edge research on the use of convolution neural networks, autoencoders, recurrent convolutional neural networks in face, hand, iris, gait, fingerprint, vein, and medical biometric traits. It also provides a step-by-step guide to understanding deep learning concepts for biometrics authentication approaches and presents an analysis of biometric images under various environmental conditions. This book is sure to catch the attention of scholars, researchers, practitioners, and technology aspirants who are willing to research in the field of AI and biometric security.

Interference Cancellation Using Space-Time Processing and Precoding Design (Hardcover, 2013 ed.): Feng Li Interference Cancellation Using Space-Time Processing and Precoding Design (Hardcover, 2013 ed.)
Feng Li
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Interference Cancellation Using Space-Time Processing and Precoding Design introduces original design methods to achieve interference cancellation, low-complexity decoding and full diversity for a series of multi-user systems. In multi-user environments, co-channel interference will diminish the performance of wireless communications systems. In this book, we investigate how to design robust space-time codes and pre-coders to suppress the co-channel interference when multiple antennas are available. This book offers a valuable reference work for graduate students, academic researchers and engineers who are interested in interference cancellation in wireless communications. Rigorous performance analysis and various simulation illustrations are included for each design method. Dr. Feng Li is a scientific researcher at Cornell University.

An Introduction to Number Theory with Cryptography (Paperback, 2nd edition): James Kraft, Lawrence Washington An Introduction to Number Theory with Cryptography (Paperback, 2nd edition)
James Kraft, Lawrence Washington
R1,545 Discovery Miles 15 450 Ships in 9 - 17 working days

Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors have written the text in an engaging style to reflect number theory's increasing popularity. The book is designed to be used by sophomore, junior, and senior undergraduates, but it is also accessible to advanced high school students and is appropriate for independent study. It includes a few more advanced topics for students who wish to explore beyond the traditional curriculum. Features of the second edition include Over 800 exercises, projects, and computer explorations Increased coverage of cryptography, including Vigenere, Stream, Transposition,and Block ciphers, along with RSA and discrete log-based systems "Check Your Understanding" questions for instant feedback to students New Appendices on "What is a proof?" and on Matrices Select basic (pre-RSA) cryptography now placed in an earlier chapter so that the topic can be covered right after the basic material on congruences Answers and hints for odd-numbered problems About the Authors: Jim Kraft received his Ph.D. from the University of Maryland in 1987 and has published several research papers in algebraic number theory. His previous teaching positions include the University of Rochester, St. Mary's College of California, and Ithaca College, and he has also worked in communications security. Dr. Kraft currently teaches mathematics at the Gilman School. Larry Washington received his Ph.D. from Princeton University in 1974 and has published extensively in number theory, including books on cryptography (with Wade Trappe), cyclotomic fields, and elliptic curves. Dr. Washington is currently Professor of Mathematics and Distinguished Scholar-Teacher at the University of Maryland.

Cryptography - Theory and Practice (Paperback, 4th edition): Douglas Robert Stinson, Maura Paterson Cryptography - Theory and Practice (Paperback, 4th edition)
Douglas Robert Stinson, Maura Paterson
R1,544 Discovery Miles 15 440 Ships in 9 - 17 working days

Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject's fundamentals while presenting the most current advances in cryptography. The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world. Key Features of the Fourth Edition: New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9). New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1). New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A). An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium. Interesting attacks on cryptosystems, including: padding oracle attack correlation attacks and algebraic attacks on stream ciphers attack on the DUAL-EC random bit generator that makes use of a trapdoor. A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard. Methods of key distribution in sensor networks. The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret. The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain. The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Endocrine Tumors, An Issue of Surgical…
Douglas L. Fraker Hardcover R1,692 Discovery Miles 16 920
Clinical Pharmacology During Pregnancy
Donald Mattison, Lee-Ann Halbert Paperback R2,515 Discovery Miles 25 150
What Happened To You? - Conversations On…
Bruce D. Perry, Oprah Winfrey Hardcover R692 R523 Discovery Miles 5 230
Vaxxers - The Inside Story Of The Oxford…
Sarah Gilbert, Catherine Green Paperback R122 Discovery Miles 1 220
Lung Epithelial Biology in the…
Venkataramana K Sidhaye, Michael Koval Hardcover R3,059 Discovery Miles 30 590
Healing Your Thyroid Naturally - Manage…
Emily Lipinski Paperback R379 R347 Discovery Miles 3 470
Introduction to Basic Aspects of the…
Otto Appenzeller, Guillaume J. Lamotte, … Hardcover R3,484 Discovery Miles 34 840
Lahita's Systemic Lupus Erythematosus
Robert G. Lahita Hardcover R5,897 Discovery Miles 58 970
Encyclopedia of Respiratory Medicine
Sam Janes Hardcover R74,387 Discovery Miles 743 870
Optimizing the Treatment of Upper…
Kevin C. Chung Hardcover R2,146 Discovery Miles 21 460

 

Partners