0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (101)
  • R500+ (1,926)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Blockchain Technology and Application - 5th CCF China Blockchain Conference, CBCC 2022, Wuxi, China, December 23-25, 2022,... Blockchain Technology and Application - 5th CCF China Blockchain Conference, CBCC 2022, Wuxi, China, December 23-25, 2022, Proceedings (Paperback, 1st ed. 2022)
Yi Sun, Liang Cai, Wei Wang, Xianhua Song, Zeguang Lu
R1,783 Discovery Miles 17 830 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th CCF China Blockchain Conference, CBCC 2022, held in Wuxi, China, in December 2022. The 7 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology.

Multi-Agent Systems - 19th European Conference, EUMAS 2022, Dusseldorf, Germany, September 14-16, 2022, Proceedings (Paperback,... Multi-Agent Systems - 19th European Conference, EUMAS 2022, Dusseldorf, Germany, September 14-16, 2022, Proceedings (Paperback, 1st ed. 2022)
Dorothea Baumeister, Joerg Rothe
R2,359 Discovery Miles 23 590 Ships in 10 - 15 working days

This book constitutes thoroughly refereed and revised selected papers from the proceedings of 19th European Conference on Multi-Agent Systems, EUMAS 2022, held in Dusseldorf, Germany, during September 14-16, 2022. The 23 full papers included in this book were carefully reviewed and selected from 36 submissions. The book also contains 6 short summaries of talks from PhD students at the PhD day. The papers deal with current topics in the research and development of multi-agent systems.

Encrypt, Sign, Attack - A compact introduction to cryptography (Paperback, 1st ed. 2022): Olaf Manz Encrypt, Sign, Attack - A compact introduction to cryptography (Paperback, 1st ed. 2022)
Olaf Manz
R1,022 Discovery Miles 10 220 Ships in 10 - 15 working days

This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.

Gaming, Simulation and Innovations: Challenges and Opportunities - 52nd International Simulation and Gaming Association... Gaming, Simulation and Innovations: Challenges and Opportunities - 52nd International Simulation and Gaming Association Conference, ISAGA 2021, Indore, India, September 6-10, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Upinder Dhar, Jigyasu Dubey, Vinod Dumblekar, Sebastiaan Meijer, Heide Lukosch
R2,314 Discovery Miles 23 140 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 52nd International Simulation and Gaming Association Conference, ISAGA 2021, held in Indore, India, during September 6-10, 2021. The 24 full papers included in this book were carefully reviewed and selected from 58 submissions. They were organized in topical sections as follows: game design and facilitation; gaming in education; player experience in simulations; and policy formulation and serious games.

Personalized Privacy Protection in Big Data (Paperback, 1st ed. 2021): Youyang Qu, Mohammad  Reza Nosouhi, Lei Cui, Shui Yu Personalized Privacy Protection in Big Data (Paperback, 1st ed. 2021)
Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu
R1,788 Discovery Miles 17 880 Ships in 10 - 15 working days

This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.

Machine Translation - 18th China Conference, CCMT 2022, Lhasa, China, August 6-10, 2022, Revised Selected Papers (Paperback,... Machine Translation - 18th China Conference, CCMT 2022, Lhasa, China, August 6-10, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Tong Xiao, Juan Pino
R1,794 Discovery Miles 17 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th China Conference on Machine Translation, CCMT 2022, held in Lhasa, China, during August 6-10, 2022. The 16 full papers were included in this book were carefully reviewed and selected from 73 submissions.

Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings... Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings (Paperback, 1st ed. 2022)
Emmanuel Ahene, Fagen Li
R2,592 Discovery Miles 25 920 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13-15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.

Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December... Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Lejla Batina, Stjepan Picek, Mainack Mondal
R2,207 Discovery Miles 22 070 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.

Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022,... Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Khoa Nguyen, Guomin Yang, Fuchun Guo, Willy Susilo
R2,624 Discovery Miles 26 240 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings (Paperback,... Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings (Paperback, 1st ed. 2022)
Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan
R2,379 Discovery Miles 23 790 Ships in 10 - 15 working days

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022. The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems XV - International Workshop,... Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems XV - International Workshop, COINE 2022, Virtual Event, May 9, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Nirav Ajmeri, Andreasa Morris Martin, Bastin Tony Roy Savarimuthu
R1,814 Discovery Miles 18 140 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Coordination, Organizations, Institutions, and Norms for Governance of Multi-Agent Systems, COINE 2022, which was held in Auckland, New Zealand, on May 9, 2022. The 14 papers included in these proceedings were carefully reviewed and selected from 15 submissions. They deal with autonomous agents and multi-agent systems, focusing on the scientific and technological aspects of social coordination, organizational theory, artificial (electronic) institutions, and normative and ethical MAS.

Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Paperback, 1st ed. 2022):... Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Paperback, 1st ed. 2022)
Pethuru Raj, Ashutosh Kumar Dubey, Abhishek Kumar, Pramod Singh Rathore
R1,568 Discovery Miles 15 680 Ships in 10 - 15 working days

This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries.

Security in Computer and Information Sciences - Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26,... Security in Computer and Information Sciences - Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Erol Gelenbe, Marija Jankovic, Dionysios Kehagias, Anna Marton, Andras Vilmos
R1,307 Discovery Miles 13 070 Ships in 10 - 15 working days

This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book.

Quantum Codes for Topological Quantum Computation (Paperback, 1st ed. 2022): Clarice Dias de Albuquerque, Eduardo Brandani da... Quantum Codes for Topological Quantum Computation (Paperback, 1st ed. 2022)
Clarice Dias de Albuquerque, Eduardo Brandani da Silva, Waldir Silva Soares Jr.
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

This book offers a structured algebraic and geometric approach to the classification and construction of quantum codes for topological quantum computation. It combines key concepts in linear algebra, algebraic topology, hyperbolic geometry, group theory, quantum mechanics, and classical and quantum coding theory to help readers understand and develop quantum codes for topological quantum computation. One possible approach to building a quantum computer is based on surface codes, operated as stabilizer codes. The surface codes evolved from Kitaev's toric codes, as a means to developing models for topological order by using qubits distributed on the surface of a toroid. A significant advantage of surface codes is their relative tolerance to local errors. A second approach is based on color codes, which are topological stabilizer codes defined on a tessellation with geometrically local stabilizer generators. This book provides basic geometric concepts, like surface geometry, hyperbolic geometry and tessellation, as well as basic algebraic concepts, like stabilizer formalism, for the construction of the most promising classes of quantum error-correcting codes such as surfaces codes and color codes. The book is intended for senior undergraduate and graduate students in Electrical Engineering and Mathematics with an understanding of the basic concepts of linear algebra and quantum mechanics.

Autonomic Computing in Cloud Resource Management in Industry 4.0 (Paperback, 1st ed. 2021): Tanupriya Choudhury, Bhupesh Kumar... Autonomic Computing in Cloud Resource Management in Industry 4.0 (Paperback, 1st ed. 2021)
Tanupriya Choudhury, Bhupesh Kumar Dewangan, Ravi Tomar, Bhupesh Kumar Singh, Teoh Teik Toe, …
R4,987 Discovery Miles 49 870 Ships in 10 - 15 working days

This book describes the next generation of industry-Industry 4.0-and how it holds the promise of increased flexibility in manufacturing, along with automation, better quality, and improved productivity. The authors discuss how it thus enables companies to cope with the challenges of producing increasingly individualized products with a short lead-time to market and higher quality. The authors posit that intelligent cloud services and resource sharing play an important role in Industry 4.0 anticipated Fourth Industrial Revolution. This book serves the different issues and challenges in cloud resource management CRM techniques with proper propped solution for IT organizations. The book features chapters based on the characteristics of autonomic computing with its applicability in CRM. Each chapter features the techniques and analysis of each mechanism to make better resource management in cloud.

Engineering Software for Modern Challenges - First International Conference, ESMoC 2021, Johor, Malaysia, October 20-21, 2021,... Engineering Software for Modern Challenges - First International Conference, ESMoC 2021, Johor, Malaysia, October 20-21, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Dayang Norhayati A. Jawawi, Imran Sarwar Bajwa, Rafaqut Kazmi
R1,798 Discovery Miles 17 980 Ships in 10 - 15 working days

This volume constitutes selected papers presented at the First International Conference on Engineering Software for Modern Challenges, ESMoC 2021, held in Johor, Malaysia, in October 20-21, 2021. The 17 papers presented were thoroughly reviewed and selected from the 167 submissions. They are organized in the topical sections on software engineering; intelligent systems; software quality.

Personalized Privacy Protection in Big Data (Hardcover, 1st ed. 2021): Youyang Qu, Mohammad  Reza Nosouhi, Lei Cui, Shui Yu Personalized Privacy Protection in Big Data (Hardcover, 1st ed. 2021)
Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu
R1,580 R1,485 Discovery Miles 14 850 Save R95 (6%) Ships in 9 - 15 working days

This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.

Cryptology and Network Security - 21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13-16,... Cryptology and Network Security - 21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13-16, 2022, Proceedings (Paperback, 1st ed. 2022)
Alastair R. Beresford, Arpita Patra, Emanuele Bellini
R2,222 Discovery Miles 22 220 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates.The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.

Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach (Paperback, 1st ed. 2021): Maamar Ouladj, Sylvain... Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach (Paperback, 1st ed. 2021)
Maamar Ouladj, Sylvain Guilley
R1,433 Discovery Miles 14 330 Ships in 10 - 15 working days

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.

HCI International 2022 Posters - 24th International Conference on Human-Computer Interaction, HCII 2022, Virtual Event, June 26... HCI International 2022 Posters - 24th International Conference on Human-Computer Interaction, HCII 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Constantine Stephanidis, Margherita Antona, Stavroula Ntoa
R2,895 Discovery Miles 28 950 Ships in 10 - 15 working days

The four-volume set CCIS 1580, CCIS 1581, CCIS 1582, and CCIS 1583 contains the extended abstracts of the posters presented during the 24th International Conference on Human-Computer Interaction, HCII 2022, which was held virtually in June - July 2022. The total of 1276 papers and 275 posters included in the 40 HCII 2021 proceedings volumes was carefully reviewed and selected from 5583 submissions.The posters presented in these four volumes are organized in topical sections as follows: Part I: user experience design and evaluation; visual design and visualization; data, information and knowledge; interacting with AI; universal access, accessibility and design for aging. Part II: multimodal and natural interaction; perception, cognition, emotion and psychophysiological monitoring; human motion modelling and monitoring; IoT and intelligent living environments. Part III: learning technologies; HCI, cultural heritage and art; eGovernment and eBusiness; digital commerce and the customer experience; social media and the metaverse. Part IV: virtual and augmented reality; autonomous vehicles and urban mobility; product and robot design; HCI and wellbeing; HCI and cybersecurity.

Industrial Networks and Intelligent Systems - 8th EAI International Conference, INISCOM 2022, Virtual Event, April 21-22, 2022,... Industrial Networks and Intelligent Systems - 8th EAI International Conference, INISCOM 2022, Virtual Event, April 21-22, 2022, Proceedings (Paperback, 1st ed. 2022)
Nguyen-Son Vo, Quoc-Tuan Vien, Dac-Binh Ha
R2,190 Discovery Miles 21 900 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2022, held in April 2022. Due to COVID-19 pandemic the conference was held virtually. The 19 full papers were selected from 48 submissions and are organized thematically in tracks on Telecommunications Systems and Networks; Information Processing and Data Analysis; Industrial Networks and Intelligent Systems; Security and Privacy.

Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected... Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Ittay Eyal, Juan Garay
R3,159 Discovery Miles 31 590 Ships in 10 - 15 working days

This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.

Multimedia Communications, Services and Security - 11th International Conference, MCSS 2022, Krakow, Poland, November 3-4,... Multimedia Communications, Services and Security - 11th International Conference, MCSS 2022, Krakow, Poland, November 3-4, 2022, Proceedings (Paperback, 1st ed. 2022)
Andrzej Dziech, Wim Mees, Marcin Niemiec
R1,796 Discovery Miles 17 960 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference, MCSS 2022, held in Krakow, Poland, during November 3-4, 2022. The 13 full papers included in this book were carefully reviewed and selected from 33 submissions. The papers cover ongoing research activities in the following topics: cybersecurity, multimedia services; intelligent monitoring; audio-visual systems; biometric applications; experiments and deployments.

Guide to Data Privacy - Models, Technologies, Solutions (Paperback, 1st ed. 2022): Vicenc Torra Guide to Data Privacy - Models, Technologies, Solutions (Paperback, 1st ed. 2022)
Vicenc Torra
R1,240 Discovery Miles 12 400 Ships in 10 - 15 working days

Data privacy technologies are essential for implementing information systems with privacy by design.Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure. For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training? This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement-among other models-differential privacy, k-anonymity, and secure multiparty computation. Topics and features: Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications) Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for users Offers characterization of privacy models, comparing their differences, advantages, and disadvantages Describes some of the most relevant algorithms to implement privacy models Includes examples of data protection mechanisms This unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview. Vicenc Torra is Professor with the Department of Computing Science at Umea University, Umea, Sweden.

Next Generation Arithmetic - Third International Conference, CoNGA 2022, Singapore, March 1-3, 2022, Revised Selected Papers... Next Generation Arithmetic - Third International Conference, CoNGA 2022, Singapore, March 1-3, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
John Gustafson, Vassil Dimitrov
R1,665 Discovery Miles 16 650 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Next Generation Arithmetic, CoNGA 2022, which was held in Singapore, during March 1-3, 2022. The 8 full papers included in this book were carefully reviewed and selected from 12 submissions. They deal with emerging technologies for computer arithmetic focusing on the demands of both AI and high-performance computing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Economics of Blockchain and…
James L. Caton Hardcover R2,745 Discovery Miles 27 450
Information Theory - Poincare Seminar…
Bertrand Duplantier, Vincent Rivasseau Hardcover R3,518 Discovery Miles 35 180
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,473 Discovery Miles 24 730
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R875 Discovery Miles 8 750
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980
Alice and Bob Learn Application Security
T Janca Paperback R849 Discovery Miles 8 490
Technical Articles about the Voynich…
National Security Agency Hardcover R568 Discovery Miles 5 680

 

Partners