0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,896)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14,... Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Sabrina de Capitani di Vimercati, Chris Mitchell
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures.

Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings... Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings (Paperback, 2013 ed.)
Emiliano De Cristofaro, Matthew Wright
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.

Codes, Systems, and Graphical Models (Paperback, 2001 ed.): Brian Marcus, Joachim Rosenthal Codes, Systems, and Graphical Models (Paperback, 2001 ed.)
Brian Marcus, Joachim Rosenthal
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

Coding theory, system theory, and symbolic dynamics have much in common. A major new theme in this area of research is that of codes and systems based on graphical models. This volume contains survey and research articles from leading researchers at the interface of these subjects.

Foundations of Security Analysis and Design VII - FOSAD 2012 / 2013 Tutorial Lectures (Paperback, 2014 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design VII - FOSAD 2012 / 2013 Tutorial Lectures (Paperback, 2014 ed.)
Alessandro Aldini, Javier Lopez, Fabio Martinelli
R2,132 Discovery Miles 21 320 Ships in 18 - 22 working days

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.

Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings (Paperback,... Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013, Proceedings (Paperback, 2013 ed.)
Philippe Gaborit
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations.

Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August... Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings (Paperback, 2014 ed.)
Maki Yoshida, Koichi Mouri
R2,153 Discovery Miles 21 530 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.

Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014,... Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Juan A. Garay, Rosario Gennaro
R2,925 Discovery Miles 29 250 Ships in 18 - 22 working days

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.

Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014,... Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II (Paperback, 2014 ed.)
Juan A. Garay, Rosario Gennaro
R2,819 Discovery Miles 28 190 Ships in 18 - 22 working days

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.

Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings (Paperback, 2013 ed.)
Thomas Johansson, Phong Q. Nguyen
R1,531 Discovery Miles 15 310 Ships in 18 - 22 working days

This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.

Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings... Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings (Paperback, 2014 ed.)
Sjouke Mauw, Christian Damsgaard Jensen
R1,941 Discovery Miles 19 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.

Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29,... Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers (Paperback, 2014 ed.)
Aurelien Francillon, Pankaj Rohatgi
R2,111 Discovery Miles 21 110 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013. The 17 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on security technologies; attacks on masking; side channel attacks; software and protocol analysis; side channel countermeasures; and side channel and fault attacks.

Advanced Infocomm Technology - 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected... Advanced Infocomm Technology - 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papers (Paperback, 2013 ed.)
Vincent Guyot
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Advanced Infocomm Technology, ICAIT 2012, held in Paris, France, July 2012.
The 32 revised full papers presented together with 4 invited talks were carefully selected from 97 submissions. The papers are organized in topical sections on fixed mobile convergence and emerging networks technologies, performance and quality of service, fiber technologies and multimedia processing, communication softwares and services, security, sensor technologies and wireless systems, energy-aware networks and power management, and mobile ad-hoc, mesh and vehicular networks.

Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014.... Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings (Paperback, 2014 ed.)
Willy Susilo, Yi Mu
R2,629 Discovery Miles 26 290 Ships in 18 - 22 working days

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.

Emerging Management Mechanisms for the Future Internet - 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure,... Emerging Management Mechanisms for the Future Internet - 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013, Proceedings (Paperback, 2013 ed.)
Guillaume, Doyen,, Martin Waldburger, Pavel Celeda, Anna Sperotto, Burkhard Stiller
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, held in Barcelona, Spain, in June 2013. The 11 full papers presented were carefully reviewed and selected from 32 submissions. The volume also includes 7 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 14 submissions. The papers are organized in topical sections on traffic engineering and quality-of-service; monitoring and modeling; security management; content distribution and multimedia; autonomous management; and monitoring mechanisms.

Digital Signatures (Paperback, 2010 ed.): Jonathan Katz Digital Signatures (Paperback, 2010 ed.)
Jonathan Katz
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren't there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions - at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various "folklore" results that are, perhaps, not as well known as they should be. This book could also serve as a textbook for a graduate seminar on advanced cryptography; in such a class, I expect the entire book could be covered at a leisurely pace in one semester with perhaps some time left over for excursions into related topics.

Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013,... Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings (Paperback, 2013 ed.)
Robert H. Deng, Tao Feng
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.

Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014,... Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings (Paperback, 2014 ed.)
Emiliano De Cristofaro, Steven J. Murdoch
R2,269 Discovery Miles 22 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014.The 16 full papers presented were carefully selected from 86 submissions. Topics addressed by the papers published in these proceedings include study of privacy erosion, designs of privacy-preserving systems, censorship resistance, social networks and location privacy."

Security for Wireless Implantable Medical Devices (Paperback, 2013 ed.): Xiali Hei, Xiaojiang Du Security for Wireless Implantable Medical Devices (Paperback, 2013 ed.)
Xiali Hei, Xiaojiang Du
R1,518 Discovery Miles 15 180 Ships in 18 - 22 working days

In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient's medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs. While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research.

Integrity and Internal Control in Information Systems VI - IFIP TC11 / WG11.5 Sixth Working Conference on Integrity and... Integrity and Internal Control in Information Systems VI - IFIP TC11 / WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland (Paperback, Softcover reprint of the original 1st ed. 2004)
Sushil Jajodia, Leon Strous
R2,647 Discovery Miles 26 470 Ships in 18 - 22 working days

This sixth volume in the series Integrity and Internal Control in Information Systems is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support corporate governance codes. Integrity and Internal Control in Information Systems VI represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The objectives of this dialogue are: To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.The book contains a collection of papers from the Sixth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Lausanne, Switzerland in November 2003. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and IT-auditing.

Advances in Cryptology - Proceedings of Crypto 82 (Paperback, Softcover reprint of the original 1st ed. 1983): David Chaum Advances in Cryptology - Proceedings of Crypto 82 (Paperback, Softcover reprint of the original 1st ed. 1983)
David Chaum
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days
Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences... Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings (Paperback, 2013 ed.)
David Basin, John C. Mitchell
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.

Fundamentals of Cryptology - A Professional Reference and Interactive Tutorial (Paperback, Softcover reprint of the original... Fundamentals of Cryptology - A Professional Reference and Interactive Tutorial (Paperback, Softcover reprint of the original 1st ed. 2002)
Henk C.A. van Tilborg
R1,500 Discovery Miles 15 000 Ships in 18 - 22 working days

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g. adding a signature to an electronic document. Cryptology addresses the above issues - it is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical in nature. Fundamentals of Cryptology serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver must share a secret key. Second, the book presents public key cryptosystems, which make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, such as the factorization of large numbers.The remaining chapters cover a variety of topics, including zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in detail: one presents elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions) and the other introduces finite fields and their algebraic structure. Fundamentals of Cryptology is an updated and improved version of An Introduction to Cryptology, originally published in 1988. Apart from a revision of the existing material, there are many new sections, and two new chapters on elliptic curves and authentication codes, respectively. Fundamentals of Cryptology will be of interest to computer scientists, mathematicians, and researchers, students, and practitioners in the area of cryptography.

Pairing-Based Cryptography -- Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected... Pairing-Based Cryptography -- Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Michel Abdalla, Tanja Lange
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012.
The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software, industry track, properties of pairings, and signature schemes and applications.

Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography (Paperback, 2014 ed.): Yun Q.... Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography (Paperback, 2014 ed.)
Yun Q. Shi, Feng Liu, Weiqi Yan
R1,741 Discovery Miles 17 410 Ships in 18 - 22 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The seven papers included in this special issue were carefully reviewed and selected from 21 submissions. They address the challenges faced by the emerging area of visual cryptography and provide the readers with an overview of the state of the art in this field of research.

Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings... Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings (Paperback, 2013 ed.)
Amit Sahai
R1,510 Discovery Miles 15 100 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones; formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Innovations in Digital Watermarking…
Feng-Hsing Wang Hardcover R2,755 Discovery Miles 27 550
Radical transparency and digital…
Luke Heemsbergen Hardcover R2,676 Discovery Miles 26 760
Construction and Analysis of…
Lilya Budaghyan Hardcover R3,268 Discovery Miles 32 680
Stream Ciphers and Number Theory, Volume…
Thomas W Cusick, Cunsheng Ding, … Hardcover R2,957 Discovery Miles 29 570
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740

 

Partners