0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (335)
  • R250 - R500 (872)
  • R500+ (14,062)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Computer-Mediated Communication across Cultures - International Interactions in Online Environments (Hardcover, New): Kirk St.... Computer-Mediated Communication across Cultures - International Interactions in Online Environments (Hardcover, New)
Kirk St. Amant, Sigrid Kelsey
R5,338 Discovery Miles 53 380 Ships in 12 - 17 working days

Over one billion people access the Internet worldwide, and new problems of language, security, and culture accompany this new excess in access. Computer-Mediated Communication across Cultures: International Interactions in Online Environments provides readers with the foundational knowledge needed to communicate safely and effectively with individuals from other countries and cultures via online media. Through a closer examination of the expanded global access to the Web, this book discusses the use and design of cross-cultural digital media and the future of the field for executives, marketers, researchers, educators, and the average user.

DiY WiFi: Re-imagining Connectivity (Hardcover, New): K. Jungnickel DiY WiFi: Re-imagining Connectivity (Hardcover, New)
K. Jungnickel
R1,794 Discovery Miles 17 940 Ships in 12 - 17 working days

Who makes WiFi?
Why do different makers matter?
What do barbeques and backyards have to do with the internet?
This book explores how WiFi is made from the ground up, or in this case from the backyard out. Forged around barbeques, made of found, adapted and off-the-shelf materials and installed in ordinary domestic spaces, this book documents the collective work of individuals committed to making 'Ournet not the internet'.
Drawing on rich ethnographic material, Jungnickel's research on community WiFi networking provides an overdue account of the innovative digital cultures and practices of ordinary people making extra-ordinary things. What make-do methods, mods and tales of resourceful ingenuity permit is another way of seeing how technologies come into being. It brings to life an Australian version of WiFi, enriching global studies of wireless technology by signalling the potential of comparative studies.
Critically, the book presents the first sustained study of homebrew high-tech backyard technologists who imbue a DIY ethos but do not do it alone - they Do-It-Together (DIT). This timely critique of collective DIT innovation in an increasingly networked society will be of interest to scholars and practitioners of maker culture.

Computer Networking: A Top-Down Approach, Global Edition (Paperback, 8th edition): James Kurose, Keith Ross Computer Networking: A Top-Down Approach, Global Edition (Paperback, 8th edition)
James Kurose, Keith Ross
R2,366 R1,933 Discovery Miles 19 330 Save R433 (18%) Ships in 12 - 17 working days

This print textbook is available for students to rent for their classes. The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed. A top-down, layered approach to computer networking. Unique among computer networking texts, the 8th Edition of the popular Computer Networking: A Top Down Approach builds on the authors' long tradition of teaching this complex subject through a layered approach in a "top-down manner." The text works its way from the application layer down toward the physical layer, motivating students by exposing them to important concepts early in their study of networking. Focusing on the Internet and the fundamentally important issues of networking, this text provides an excellent foundation for students in computer science and electrical engineering, without requiring extensive knowledge of programming or mathematics. The 8th Edition has been updated to reflect the most important and exciting recent advances in networking, including the importance of software-defined networking (SDN) and the rapid adoption of 4G/5G networks and the mobile applications they enable.

Achieving Federated and Self-Manageable Cloud Infrastructures - Theory and Practice (Hardcover, New): Massimo Villari, Ivona... Achieving Federated and Self-Manageable Cloud Infrastructures - Theory and Practice (Hardcover, New)
Massimo Villari, Ivona Brandic, Francesco Tusa
R5,061 Discovery Miles 50 610 Ships in 12 - 17 working days

Cloud computing presents a promising approach for implementing scalable information and communications technology systems for private and public, individual, community, and business use. Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice overviews current developments in cloud computing concepts, architectures, infrastructures and methods, focusing on the needs of small to medium enterprises. The topic of cloud computing is addressed on two levels: the fundamentals of cloud computing and its impact on the IT world; and an analysis of the main issues regarding the cloud federation, autonomic resource management, and efficient market mechanisms, while supplying an overview of the existing solutions able to solve them. This publication is aimed at both enterprise business managers and research and academic audiences alike.

Justifying the Dependability of Computer-based Systems - With Applications in Nuclear Engineering (Hardcover, 2008 ed.):... Justifying the Dependability of Computer-based Systems - With Applications in Nuclear Engineering (Hardcover, 2008 ed.)
Pierre-Jacques Courtois
R5,622 Discovery Miles 56 220 Ships in 10 - 15 working days

Safety is a paradoxical system property. It remains immaterial, intangible and invisible until a failure, an accident or a catastrophy occurs and, too late, reveals its absence. And yet, a system cannot be relied upon unless its safety can be explained, demonstrated and certified. The practical and difficult questions which motivate this study concern the evidence and the arguments needed to justify the safety of a computer based system, or more generally its dependability. Dependability is a broad concept integrating properties such as safety, reliability, availability, maintainability and other related characteristics of the behaviour of a system in operation. How can we give the users the assurance that the system enjoys the required dependability? How should evidence be presented to certification bodies or regulatory authorities? What best practices should be applied? How should we decide whether there is enough evidence to justify the release of the system? To help answer these daunting questions, a method and a framework are proposed for the justification of the dependability of a computer-based system. The approach specifically aims at dealing with the difficulties raised by the validation of software. Hence, it should be of wide applicability despite being mainly based on the experience of assessing Nuclear Power Plant instrumentation and control systems important to safety. To be viable, a method must rest on a sound theoretical background.

Mobile Data Communication Systems (Hardcover): Peter Wong, David Britland Mobile Data Communication Systems (Hardcover)
Peter Wong, David Britland
R2,311 Discovery Miles 23 110 Ships in 10 - 15 working days

Brings you up to speed on mobile data system design, current and emerging wireless network and systems standards, and network architectures. Describes mobile data applications and wireless LANs, and analyzes and evaluates current technologies.

SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R968 R873 Discovery Miles 8 730 Save R95 (10%) Ships in 10 - 15 working days
Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised... Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers (Hardcover, 1st ed. 2020)
Gilbert Peterson, Sujeet Shenoi
R2,913 Discovery Miles 29 130 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, in the winter of 2020. Advances in Digital Forensics XVI is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Ten Laws for Security (Hardcover, 1st ed. 2016): Eric Diehl Ten Laws for Security (Hardcover, 1st ed. 2016)
Eric Diehl
R2,489 Discovery Miles 24 890 Ships in 12 - 17 working days

In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

Distributed Constraint Satisfaction - Foundations of Cooperation in Multi-agent Systems (Hardcover, 2001 ed.): Makoto Yokoo Distributed Constraint Satisfaction - Foundations of Cooperation in Multi-agent Systems (Hardcover, 2001 ed.)
Makoto Yokoo
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book gives an overview of constraint satisfaction problems (CSPs), adapts related search algorithms and consistency algorithms for applications to multi-agent systems, and consolidates recent research devoted to cooperation in such systems. The techniques introduced are applied to various problems in multi-agent systems. Among the new approaches is a hybrid-type algorithm for weak-commitment search combining backtracking and iterative improvement; also, an extension of the basic CSP formalization called partial CSP is introduced in order to handle over-constrained CSPs.The book is written for advanced students and professionals interested in multi-agent systems or, more generally, in distributed artificial intelligence and constraint satisfaction. Researchers active in the area will appreciate this book as a valuable source of reference.

Heuristic Approaches for Telecommunications Network Management, Planning and Expansion - A Special Issue of the Journal of... Heuristic Approaches for Telecommunications Network Management, Planning and Expansion - A Special Issue of the Journal of Heuristics (Hardcover, Reprinted from JOURNAL OF HEURISTICS, 6:1, 2000)
Robert Doverspike, Iraj Saniee
R2,975 Discovery Miles 29 750 Ships in 10 - 15 working days

The telecommunications industry is experiencing a worldwide explosion of growth as few other industries ever have. However, as recently as a decade ago, the bulk of telecommunications services were delivered by the traditional telephone network, for which design and analysis principles had been under steady development for over three-quarters of a century. This environment was characterized by moderate and steady growth, with an accompanying slower development of new network equipment and standardization processes. In such a near-static environment, attention was given to optimization techniques to squeeze out better profits from existing and limited future investments. To this end, forecasts of network services were developed on a regular planning cycle and networks were optimized accordingly, layer by layer, for cost-effective placement of capacity and efficient utilization. In particular, optimization was based on a fairly stable set of assumptions about the network architecture, equipment models, and forecast uncertainty. This special edition is devoted to heuristic approaches for telecommunications network management, planning, and expansion. We hope that this collection brings to the attention of researchers and practitioners an array of techniques and case studies that meet the stringent time to market' requirements of this industry and which deserve exposure to a wider audience. Telecommunications will face a tremendous challenge in the coming years to be able to design, build, and manage networks in such a rapidly evolving industry. Development and application of heuristic methods will be fundamental in our ability to meet this challenge.

High Speed LAN Technology Handbook (Hardcover, 2000 ed.): Dhiman D. Chowdhury High Speed LAN Technology Handbook (Hardcover, 2000 ed.)
Dhiman D. Chowdhury
R3,174 Discovery Miles 31 740 Ships in 10 - 15 working days

The primary objective of this book is to teach the architectures, design principles, and troubleshooting techniques of a LAN. This will be imparted through the presentation of a broad scope of data and computer communication standards, real-world inter-networking techniques, architectures, hardware, software, protocols, technologies and services as they relate to the design, implementation and troubleshooting of a LAN. The logical and physical design of hardware and software is not the only process involved in the design and implementation of a LAN. The latter also encompasses many other aspects including making the business case, compiling the requirements, choosing the technology, planning for capacity, selecting the vendor, and weighing all the issues before the actual design begins.

Digital Logic for Computing (Hardcover, 1st ed. 2017): John Seiffertt Digital Logic for Computing (Hardcover, 1st ed. 2017)
John Seiffertt
R2,688 Discovery Miles 26 880 Ships in 12 - 17 working days

The book provides a bottom-up approach to understanding how a computer works and how to use computing to solve real-world problems. It covers the basics of digital logic through the lens of computer organization and programming. The reader should be able to design his or her own computer from the ground up at the end of the book. Logic simulation with Verilog is used throughout, assembly languages are introduced and discussed, and the fundamentals of computer architecture and embedded systems are touched upon, all in a cohesive design-driven framework suitable for class or self-study.

Iso/Iec 27001 - 2022: An introduction to information security and the ISMS standard (Paperback, Revised ed.): Steve G. Watkins Iso/Iec 27001 - 2022: An introduction to information security and the ISMS standard (Paperback, Revised ed.)
Steve G. Watkins
R482 Discovery Miles 4 820 Ships in 10 - 15 working days

ISO/IEC 27001:2022 - An introduction to information security and the ISMS standardThe perfect introduction to the principles of information security management and ISO 27001:2022An ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security, this pocket guide will ensure the ISMS (information security management system) you put in place is effective, reliable and auditable. Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. This must-have resource gives a clear, concise and easy-to-read introduction to information security, providing guidance to ensure the management systems you put in place are effective, reliable and auditable. This pocket guide will help you to: Make informed decisions - Enables key employees to make better decisions before embarking on an information security project. Ensure everyone is up to speed - Gives the non-specialists on the project board and in the project team a clearer understanding of what an ISMS involves, reflecting ISO 27001:2022. Raise awareness among staff - Ensures that your staff know what is at stake with regard to information security and understand what is expected of them. Enhance your competitiveness - Gives you confidence to begin your ISO 27001:2022 implementation journey and let your customers know that the information you hold about them is managed and protected appropriately. Get up to speed with the ISO 27001:2022 updates and keep your information secure

Wireless World in 2050 and Beyond: A Window into the Future! (Hardcover, 1st ed. 2016): Ramjee Prasad, Sudhir Dixit Wireless World in 2050 and Beyond: A Window into the Future! (Hardcover, 1st ed. 2016)
Ramjee Prasad, Sudhir Dixit
R3,621 R3,354 Discovery Miles 33 540 Save R267 (7%) Ships in 12 - 17 working days

This book gathers visionary ideas from leading academics and scientists to predict the future of wireless communication and enabling technologies in 2050 and beyond. The content combines a wealth of illustrations, tables, business models, and novel approaches to the evolution of wireless communication. The book also provides glimpses into the future of emerging technologies, end-to-end systems, and entrepreneurial and business models, broadening readers' understanding of potential future advances in the field and their influence on society at large

Resource Allocation in Next-Generation Broadband Wireless Access Networks (Hardcover): Chetna Singhal, Swades De Resource Allocation in Next-Generation Broadband Wireless Access Networks (Hardcover)
Chetna Singhal, Swades De
R5,171 Discovery Miles 51 710 Ships in 12 - 17 working days

With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research on upcoming 5G technologies for next generation mobile networks, examining the various features, solutions, and challenges associated with such advances. Highlighting relevant coverage across topics such as energy efficiency, user support, and adaptive multimedia services, this book is ideally designed for academics, professionals, graduate students, and professionals interested in novel research for wireless innovations.

Implementing Software Defined Radio (Hardcover, 2012): Eugene Grayver Implementing Software Defined Radio (Hardcover, 2012)
Eugene Grayver
R4,078 Discovery Miles 40 780 Ships in 12 - 17 working days

Software Defined Radio makes wireless communications easier, more efficient, and more reliable. This book bridges the gap between academic research and practical implementation. When beginning a project, practicing engineers, technical managers, and graduate students can save countless hours by considering the concepts presented in these pages.The author covers the myriad options and trade-offs available when selecting an appropriate hardware architecture.As demonstrated here, the choice between hardware- and software-centric architecture can mean the difference between meeting an aggressive schedule and bogging down in endless design iterations.Because of the author's experience overseeing dozens of failed and successful developments, he is able to present many real-life examples.Some of the key concepts covered are: Choosing the right architecture for the market - laboratory, military, or commercial, Hardware platforms - FPGAs, GPPs, specialized and hybrid devices, Standardization efforts to ensure interoperability and portabilitym State-of-the-art components for radio frequency, mixed-signal, and baseband processing.

The text requires only minimal knowledge of wireless communications; whenever possible, qualitative arguments are used instead of equations.An appendix provides a quick overview of wireless communications and introduces most of the concepts the readers will need to take advantage of the material.An essential introduction to SDR, this book is sure to be an invaluable addition to any technical bookshelf."

Elements of Queueing Theory - Palm Martingale Calculus and Stochastic Recurrences (Hardcover, 2nd ed. 2003): Francois Baccelli,... Elements of Queueing Theory - Palm Martingale Calculus and Stochastic Recurrences (Hardcover, 2nd ed. 2003)
Francois Baccelli, Pierre Bremaud
R3,075 Discovery Miles 30 750 Ships in 10 - 15 working days

The Palm theory and the Loynes theory of stationary systems are the two pillars of the modern approach to queuing. This book, presenting the mathematical foundations of the theory of stationaryqueuing systems, contains a thorough treatment of both of these.

This approach helps to clarify the picture, in that it separates the task of obtaining the key system formulas from that of proving convergence to a stationary state and computing its law.

The theory is constantly illustrated by classical results and models: Pollaczek-Khintchin and Tacacs formulas, Jackson and Gordon-Newell networks, multiserver queues, blocking queues, loss systems etc., but it also contains recent and significant examples, where the tools developed turn out to be indispensable.

Several other mathematical tools which are useful within this approach are also presented, such as the martingale calculus for point processes, or stochastic ordering for stationary recurrences.

This thoroughly revised second edition contains substantial additions - in particular, exercises and their solutions - rendering this now classic reference suitable for use as a textbook.

Amazon CloudSearch Developer Guide (Hardcover): Documentation Team Amazon CloudSearch Developer Guide (Hardcover)
Documentation Team
R1,862 Discovery Miles 18 620 Ships in 10 - 15 working days
Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019): Liang Xiao, Weihua Zhuang, Sheng Zhou,... Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019)
Liang Xiao, Weihua Zhuang, Sheng Zhou, Cailian Chen
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.

Computer Networks & Communications (NetCom) - Proceedings of the Fourth International Conference on Networks & Communications... Computer Networks & Communications (NetCom) - Proceedings of the Fourth International Conference on Networks & Communications (Hardcover, 1st ed. 2013)
Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai
R9,715 Discovery Miles 97 150 Ships in 10 - 15 working days

Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.

Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover): Manish Gupta, Raj Sharman Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover)
Manish Gupta, Raj Sharman
R5,314 Discovery Miles 53 140 Ships in 12 - 17 working days

"More often than not, it is becoming increasingly evident that the weakest links in the information-security chain are the people. Due an increase in information security threats, it is imperative for organizations and professionals to learn more on the human nature and social interactions behind those creating the problem. Social and Human Elements of Information Security: Emerging Trends and Countermeasures provides insightful, high-quality research into the social and human aspects of information security. A comprehensive source of the latest trends, issues, and findings in the field, this book fills the missing gap in existing literature by bringing together the most recent work from researchers in the fast and evolving field of information security."

Algorithms for Next Generation Networks (Hardcover, 2010 Ed.): Graham Cormode, Marina Thottan Algorithms for Next Generation Networks (Hardcover, 2010 Ed.)
Graham Cormode, Marina Thottan
R4,783 R4,502 Discovery Miles 45 020 Save R281 (6%) Ships in 12 - 17 working days

Data networking now plays a major role in everyday life and new applications continue to appear at a blinding pace. Yet we still do not have a sound foundation for designing, evaluating and managing these networks.

This book covers topics at the intersection of algorithms and networking. It builds a complete picture of the current state of research on Next Generation Networks and the challenges for the years ahead. Particular focus is given to evolving research initiatives and the architecture they propose and implications for networking.

Topics: Network design and provisioning, hardware issues, layer-3 algorithms and MPLS, BGP and Inter AS routing, packet processing for routing, security and network management, load balancing, oblivious routing and stochastic algorithms, network coding for multicast, overlay routing for P2P networking and content delivery.

This timely volume will be of interest to a broad readership from graduate students to researchers looking to survey recent research its open questions.

Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016): Iosif I. Androulidakis Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016)
Iosif I. Androulidakis
R3,596 R2,464 Discovery Miles 24 640 Save R1,132 (31%) Ships in 12 - 17 working days

This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

Research Anthology on Artificial Intelligence Applications in Security, VOL 1 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 1 (Hardcover)
Information Reso Management Association
R10,649 Discovery Miles 106 490 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computational Biomechanics for Medicine…
Karol Miller, Adam Wittek, … Hardcover R2,879 Discovery Miles 28 790
Steamy Shades | Love Sling
R1,320 Discovery Miles 13 200
Into Your Solar Plexus
Donatella Bernardi Hardcover R898 Discovery Miles 8 980
We-Vibe Rave G-Spot Vibrator (Purple)
R2,699 Discovery Miles 26 990
Incidents of Travel in Yucatan Volumes 1…
John L. Stephens Hardcover R1,287 Discovery Miles 12 870
Captain America
Jack Kirby, Joe Simon, … Paperback R543 Discovery Miles 5 430
Intex Underwater Play Sticks Pool Toy
R191 Discovery Miles 1 910
Alice in Borderland, Vol. 1
Haro Aso Paperback R506 R411 Discovery Miles 4 110
Solving a 3D Structural Puzzle
Casper Ronn Hoeck Hardcover R2,900 Discovery Miles 29 000
Oxballs | Pig-Ring - Rainbow
R599 Discovery Miles 5 990

 

Partners