0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (88)
  • R500+ (1,941)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

The Code Book - The Secret History of Codes and Code-Breaking (Paperback, Reissue): Simon Singh The Code Book - The Secret History of Codes and Code-Breaking (Paperback, Reissue)
Simon Singh 3
R326 R271 Discovery Miles 2 710 Save R55 (17%) Ships in 12 - 17 working days

Since humans began writing, they have been communicating in code. This obsession with secrecy has had dramatic effects on the outcome of wars, monarchies and individual lives.

With clear mathematical, linguistic and technological demonstrations of many of the codes, as well as illustrations of some of the remarkable personalities behind them – many courageous, some villainous – The Code Book traces the fascinating development of codes and code-breaking from military espionage in Ancient Greece to modern computer ciphers, to reveal how the remarkable science of cryptography has often changed the course of history.

Amongst many extraordinary examples, Simon Singh relates in detail the story of Mary, Queen of Scots, trapped by her own code and put to death by Elizabeth I; the strange history of the Beale Ciphers, describing the hidden location of a fortune in gold, buried somewhere in Virginia in the nineteenth century and still not found; and the monumental efforts in code-making and code-breaking that influenced the outcomes of the First and Second World Wars.

Now, with the Information Age bringing the possibility of a truly unbreakable code ever nearer, and cryptography one of the major debates of our times, Singh investigates the challenge that technology has brought to personal privacy today.

Dramatic, compelling and remarkably far-reaching, The Code Book will forever alter your view of history, what drives it and how private your last e-mail really was.

Enigma: How Breaking the Code Helped Win World War II (Hardcover): Michael Kerrigan Enigma: How Breaking the Code Helped Win World War II (Hardcover)
Michael Kerrigan
R619 R557 Discovery Miles 5 570 Save R62 (10%) Ships in 9 - 15 working days

At its peak in January 1945, 10,000 people worked at Bletchley Park, reading 4000 messages a day, decrypting German and Japanese communications and helping the Allies to victory. But while we know that Bletchley was the centre of Britain's World War II code-breaking, how did its efforts actually change the course of the war? Enigma: How Breaking the Code Helped Win World War II tells the story of Bletchley's role in defeating U-boats in the Atlantic, breaking the Japanese codes, helping the Allies to victory in North Africa, deciphering the German military intelligence code, learning of most German positions in western Europe before the Normandy Landings, defeating the Italian Navy in the Mediterranean, and helping sink the German battleship Scharnhorst off Norway. In tracing these events, the book also delves into the stories of major Bletchley characters, 'boffins' such as Alan Turing and Gordon Welchman, and 'Debs' such as Joan Clarke and Margaret Rock. An accessible work of military history that ranges across air, land and naval warfare, the book also touches on the story of early computer science. Illustrated with 120 black-&-white and colour photographs, artworks and maps, Enigma: How Breaking the Code Helped Win World War II is an authoritative and novel perspective on WWII history.

Myths Vs. Facts Of Cryptocurrency (Hardcover): Alex Caine Myths Vs. Facts Of Cryptocurrency (Hardcover)
Alex Caine; Edited by Matthew Thrush
R724 Discovery Miles 7 240 Ships in 12 - 17 working days
Tribe of Hackers Blue Team - Tribal Knowledge from  the best in Defensive Cybersecurity (Paperback): M. J. Carey Tribe of Hackers Blue Team - Tribal Knowledge from the best in Defensive Cybersecurity (Paperback)
M. J. Carey
R526 R487 Discovery Miles 4 870 Save R39 (7%) Ships in 12 - 17 working days

Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.

Tribe of Hackers Security Leaders - Tribal Knowledge from the best in Cybersecurity Leadership (Paperback): M. J. Carey Tribe of Hackers Security Leaders - Tribal Knowledge from the best in Cybersecurity Leadership (Paperback)
M. J. Carey
R480 Discovery Miles 4 800 Ships in 12 - 17 working days

Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.

Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Paperback):... Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Paperback)
Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
R1,089 Discovery Miles 10 890 Ships in 12 - 17 working days

Key Features / Selling Points Unique selling point: * The only book to distill the CSEC2017 recommendations down into practical teaching approaches for K-12 classrooms Core audience: * Teachers and educators of cybersecurity, who may or may not have a background in the subject Place in the market: * First book of its kind

Integrated Research in Steganography (Hardcover): Audrey Coon Integrated Research in Steganography (Hardcover)
Audrey Coon
R1,544 Discovery Miles 15 440 Ships in 12 - 17 working days
An Introduction to Number Theory with Cryptography (Paperback, 2nd edition): James Kraft, Lawrence Washington An Introduction to Number Theory with Cryptography (Paperback, 2nd edition)
James Kraft, Lawrence Washington
R1,491 Discovery Miles 14 910 Ships in 9 - 15 working days

Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors have written the text in an engaging style to reflect number theory's increasing popularity. The book is designed to be used by sophomore, junior, and senior undergraduates, but it is also accessible to advanced high school students and is appropriate for independent study. It includes a few more advanced topics for students who wish to explore beyond the traditional curriculum. Features of the second edition include Over 800 exercises, projects, and computer explorations Increased coverage of cryptography, including Vigenere, Stream, Transposition,and Block ciphers, along with RSA and discrete log-based systems "Check Your Understanding" questions for instant feedback to students New Appendices on "What is a proof?" and on Matrices Select basic (pre-RSA) cryptography now placed in an earlier chapter so that the topic can be covered right after the basic material on congruences Answers and hints for odd-numbered problems About the Authors: Jim Kraft received his Ph.D. from the University of Maryland in 1987 and has published several research papers in algebraic number theory. His previous teaching positions include the University of Rochester, St. Mary's College of California, and Ithaca College, and he has also worked in communications security. Dr. Kraft currently teaches mathematics at the Gilman School. Larry Washington received his Ph.D. from Princeton University in 1974 and has published extensively in number theory, including books on cryptography (with Wade Trappe), cyclotomic fields, and elliptic curves. Dr. Washington is currently Professor of Mathematics and Distinguished Scholar-Teacher at the University of Maryland.

Computing Security & Cryptography Handbook (Hardcover): Stephen Mason Computing Security & Cryptography Handbook (Hardcover)
Stephen Mason
R2,164 Discovery Miles 21 640 Ships in 12 - 17 working days
Allied and Axis Signals Intelligence in World War II (Hardcover, annotated edition): David Alvarez Allied and Axis Signals Intelligence in World War II (Hardcover, annotated edition)
David Alvarez
R4,737 Discovery Miles 47 370 Ships in 12 - 17 working days

In the 25 years since the revelation of the so-called 'Ultra secret', the importance of codebreaking and signals intelligence in the diplomacy and military operations of the Second World War has become increasingly evident. Studies of wartime signals intelligence, however, have largely focused on Great Britain and the United States and their successes against, respectively, the German Enigma and Japanese Purple cipher machines. Drawing upon newly available sources in Australia, Britain, China, France and the United States, the articles in this volume demonstrate that the codebreaking war was a truly global conflict in which many countries were active and successful. They discuss the work of Australian, Chinese, Finnish, French and Japanese codebreakers, shed new light on the work of their American and British counterparts, and describe the struggle to apply technology to the problems of radio intercept and cryptanalysis. The contributions also reveal that, for the Axis as well as the Allies, success in the signals war often depended upon close collaboration among alliance partners.

Allied and Axis Signals Intelligence in World War II (Paperback): David Alvarez Allied and Axis Signals Intelligence in World War II (Paperback)
David Alvarez
R1,958 Discovery Miles 19 580 Ships in 12 - 17 working days

In the 25 years since the revelation of the so-called 'Ultra secret', the importance of codebreaking and signals intelligence in the diplomacy and military operations of the Second World War has become increasingly evident. Studies of wartime signals intelligence, however, have largely focused on Great Britain and the United States and their successes against, respectively, the German Enigma and Japanese Purple cipher machines. Drawing upon newly available sources in Australia, Britain, China, France and the United States, the articles in this volume demonstrate that the codebreaking war was a truly global conflict in which many countries were active and successful. They discuss the work of Australian, Chinese, Finnish, French and Japanese codebreakers, shed new light on the work of their American and British counterparts, and describe the struggle to apply technology to the problems of radio intercept and cryptanalysis. The contributions also reveal that, for the Axis as well as the Allies, success in the signals war often depended upon close collaboration among alliance partners.

Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.)
Wenliang Du
R1,879 Discovery Miles 18 790 Ships in 9 - 15 working days
Cryptocurrency Trading & Investing - 2 manuscripts (Hardcover): Keizer Soeze Cryptocurrency Trading & Investing - 2 manuscripts (Hardcover)
Keizer Soeze
R943 R813 Discovery Miles 8 130 Save R130 (14%) Ships in 10 - 15 working days
Cryptocurrency Trading - Strategies & Techniques for successful Portfolio Management (Hardcover): Keizer Soeze Cryptocurrency Trading - Strategies & Techniques for successful Portfolio Management (Hardcover)
Keizer Soeze
R725 R642 Discovery Miles 6 420 Save R83 (11%) Ships in 10 - 15 working days
Secret Colors (Hardcover): Martin Kleppmann Secret Colors (Hardcover)
Martin Kleppmann; Illustrated by Mitch Seymour
R601 Discovery Miles 6 010 Ships in 12 - 17 working days
Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,160 Discovery Miles 11 600 Ships in 9 - 15 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Exercises in Programming Style (Paperback, 2nd edition): Cristina Videira Lopes Exercises in Programming Style (Paperback, 2nd edition)
Cristina Videira Lopes
R1,177 Discovery Miles 11 770 Ships in 9 - 15 working days

The first edition of Exercises in Programming Style was honored as an ACM Notable Book and praised as "The best programming book of the decade." This new edition retains the same presentation but has been upgraded to Python 3, and there is a new section on neural network styles. Using a simple computational task (term frequency) to illustrate different programming styles, Exercises in Programming Style helps readers understand the various ways of writing programs and designing systems. It is designed to be used in conjunction with code provided on an online repository. The book complements and explains the raw code in a way that is accessible to anyone who regularly practices the art of programming. The book can also be used in advanced programming courses in computer science and software engineering programs. The book contains 40 different styles for writing the term frequency task. The styles are grouped into ten categories: historical, basic, function composition, objects and object interactions, reflection and metaprogramming, adversity, data-centric, concurrency, interactivity, and neural networks. The author states the constraints in each style and explains the example programs. Each chapter first presents the constraints of the style, next shows an example program, and then gives a detailed explanation of the code. Most chapters also have sections focusing on the use of the style in systems design as well as sections describing the historical context in which the programming style emerged.

How to Prove It - A Structured Approach (Paperback, 3rd Revised edition): Daniel J. Velleman How to Prove It - A Structured Approach (Paperback, 3rd Revised edition)
Daniel J. Velleman
R1,154 Discovery Miles 11 540 Ships in 9 - 15 working days

Proofs play a central role in advanced mathematics and theoretical computer science, yet many students struggle the first time they take a course in which proofs play a significant role. This bestselling text's third edition helps students transition from solving problems to proving theorems by teaching them the techniques needed to read and write proofs. Featuring over 150 new exercises and a new chapter on number theory, this new edition introduces students to the world of advanced mathematics through the mastery of proofs. The book begins with the basic concepts of logic and set theory to familiarize students with the language of mathematics and how it is interpreted. These concepts are used as the basis for an analysis of techniques that can be used to build up complex proofs step by step, using detailed 'scratch work' sections to expose the machinery of proofs about numbers, sets, relations, and functions. Assuming no background beyond standard high school mathematics, this book will be useful to anyone interested in logic and proofs: computer scientists, philosophers, linguists, and, of course, mathematicians.

Understanding Blockchain and Cryptocurrencies - A Primer for Implementing and Developing Blockchain Projects (Paperback): Akira... Understanding Blockchain and Cryptocurrencies - A Primer for Implementing and Developing Blockchain Projects (Paperback)
Akira Summers
R1,499 Discovery Miles 14 990 Ships in 9 - 15 working days

Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need. You have probably noticed that blockchains are growing in popularity. Governments are investigating Digital Currencies, supply chains are adopting Digital Ledgers, games makers and artists are developing NFTs (Non-Fungible Tokens), and new use-cases are emerging regularly. With such growth, many people will find themselves needing to understand how these technologies work. There will be new project teams, with technical leads managing blockchain projects and developers creating distributed applications. This book is great for them as it explains the concepts on which blockchain technologies are based, in simple terms. We will discuss and explain topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms encryption, vulnerabilities, and much more. The structures and principles described will be relevant for developers and managers alike, and will be demonstrated through relevant examples throughout the text. If you are looking to understand this exciting new technology, this is the book for you.

Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover): Deepak Kumar Sharma, Koyel... Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover)
Deepak Kumar Sharma, Koyel Datta Gupta, Rinky Dwivedi
R3,368 Discovery Miles 33 680 Ships in 9 - 15 working days

This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

Advanced Cybersecurity Technologies (Paperback): Ralph Moseley Advanced Cybersecurity Technologies (Paperback)
Ralph Moseley
R1,580 Discovery Miles 15 800 Ships in 9 - 15 working days

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

Recent Trends in Blockchain for Information Systems Security and Privacy (Hardcover): Amit Kumar Tyagi, Ajith Abraham Recent Trends in Blockchain for Information Systems Security and Privacy (Hardcover)
Amit Kumar Tyagi, Ajith Abraham
R3,110 Discovery Miles 31 100 Ships in 9 - 15 working days

Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. The reader will be provided with the most up-to-date knowledge of blockchain in mainstream areas of security and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and p2p applications are increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book provides a detailed explanation of security and privacy with respect to blockchain for information systems, and will be an essential resource for students, researchers and scientists studying blockchain uses in information systems and those wanting to explore the current state of play.

European Axis Signal Intelligence in World War II (Hardcover): National Security Agency, Army Security Agency European Axis Signal Intelligence in World War II (Hardcover)
National Security Agency, Army Security Agency
R2,453 Discovery Miles 24 530 Ships in 12 - 17 working days

An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army Security Agency relying on captured documents and interviews with prisoners. This is an absolutely essential primary reference for anyone interested in cryptography as a vital aspect of World War II.

The volumes include:

Volume I: Synopsis

Volume 2: Notes on German High Level Cryptography and Cryptanalysis

Volume 3: The Signal Intelligence Agency of the Supreme Command, Armed Forces

Volume 4: The Signal Intelligence Service of the Army High Command

Volume 5: The German Air Force Signal Intelligence Service

Volume 6: The Foreign Office Cryptanalytic Section

Volume 7: Goering's "Research" Bureau

Volume 8: Miscellaneous

Volume 9: German Traffic Analysis of Russian Communications

Arithmetic, Geometry, and Coding Theory - Proceedings of the International Conference held at Centre International de... Arithmetic, Geometry, and Coding Theory - Proceedings of the International Conference held at Centre International de Rencontres de Mathematiques (CIRM), Luminy, France, June 28 - July 2, 1993 (Hardcover, Reprint 2011)
R. Pellikaan, M Perret, S.G. Vladut
R4,920 Discovery Miles 49 200 Ships in 12 - 17 working days

The series is aimed specifically at publishing peer reviewed reviews and contributions presented at workshops and conferences. Each volume is associated with a particular conference, symposium or workshop. These events cover various topics within pure and applied mathematics and provide up-to-date coverage of new developments, methods and applications.

Radical transparency and digital democracy - Wikileaks and beyond (Hardcover): Luke Heemsbergen Radical transparency and digital democracy - Wikileaks and beyond (Hardcover)
Luke Heemsbergen
R2,858 Discovery Miles 28 580 Ships in 12 - 17 working days

This book tells the story of radical transparency in a datafied world. It is a story that not only includes the beginnings of WikiLeaks and its endings as a weapon of the GRU, but also exposes numerous other decentralised disclosure networks designed to crack open democracy - for good or ill - that followed in its wake. This is a story that can only be understood through rethinking how technologies of government, practices of media, and assumptions of democracy interact. By combining literatures of governmentality, media studies, and democracy, this illuminating account offers novel insights and critiques of the transparency ideal through its material-political practice. Case studies uncover evolving media practices that, regardless of being scraped from public records or leaked from internal sources, still divulge secrets. The narrative also traces new corporate players such as Clearview AI, the civic-minded ICIJ, and state-based public health disclosures in times of pandemic to reveal how they all form unique proto-institutional instances of disclosure as a technology of government. The analysis of novel forms of digital radical transparency - from a trickle of paper-based leaks to the modern digital .torrent - is grounded in analogues from the analogue past, which combine to tell the whole story of how transparency functions in and helps form democracy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
Blockchain Applications
Arshdeep Bagha Hardcover R2,030 R1,645 Discovery Miles 16 450
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R844 R733 Discovery Miles 7 330
Algebraic Geometry Modeling In…
Edgar Martinez-Moro Hardcover R3,153 Discovery Miles 31 530
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,151 R967 Discovery Miles 9 670
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,551 Discovery Miles 25 510
The Economics of Blockchain and…
James L. Caton Hardcover R2,926 Discovery Miles 29 260
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Technical Articles about the Voynich…
National Security Agency Hardcover R608 Discovery Miles 6 080

 

Partners