0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (878)
  • R500+ (13,588)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Convergence of Broadband, Broadcast, and Cellular Network Technologies (Hardcover, New): Ramona Trestian, Gabriel-Miro Muntean Convergence of Broadband, Broadcast, and Cellular Network Technologies (Hardcover, New)
Ramona Trestian, Gabriel-Miro Muntean
R5,899 Discovery Miles 58 990 Ships in 18 - 22 working days

In the ever-evolving telecommunication industry, technological improvements alone are not able to keep up with the significant growth of mobile broadband traffic. As such, new research on communications networks is necessary to keep up with rising demand. Convergence of Broadband, Broadcast, and Cellular Network Technologies addresses the problems of broadband, broadcast, and cellular coexistence, including the increasing number of advanced mobile users and their bandwidth demands. This book will serve as a link between academia and industry, serving students, researchers, and industry professionals.

Mobile IPv6 - Protocols and Implementation (Paperback): Qing Li, Tatuya Jinmei, Keiichi Shima Mobile IPv6 - Protocols and Implementation (Paperback)
Qing Li, Tatuya Jinmei, Keiichi Shima
R1,418 Discovery Miles 14 180 Ships in 10 - 15 working days

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.).

This book covers the IPv6 host mobility protocol known as "mobile IPv6" and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation. A sample configuration for a real Mobile IPv6 operation is provided at the end of the book. Source code will be downloadable form a companion website.
Provides a detailed introduction to the IETF Mobile IPv6 standard
Includes extensive line-by-line code sets with meticulous explanations of their implementation
Numerous diagrams and illustrations to help in visualizing the implementation

IT Security Governance Innovations - Theory and Research (Hardcover, New): Daniel Mellado, Luis Enrique Sanchez, Eduardo... IT Security Governance Innovations - Theory and Research (Hardcover, New)
Daniel Mellado, Luis Enrique Sanchez, Eduardo Fernandez-Medina, Mario Piattini
R4,948 Discovery Miles 49 480 Ships in 18 - 22 working days

IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best practices, and new trends in IT Security Governance. With theoretical and practical perspectives, the book aims to address IT Security Governance implementation in corporate organizations. This collection of works serves as a reference for CEOs and CIOs, security managers, systems specialists, computer science students, and much more.

Amazon Pinpoint Developer Guide (Hardcover): Documentation Team Amazon Pinpoint Developer Guide (Hardcover)
Documentation Team
R1,147 Discovery Miles 11 470 Ships in 18 - 22 working days
Optical Networks - A Practical Perspective (Hardcover, 3rd edition): Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki Optical Networks - A Practical Perspective (Hardcover, 3rd edition)
Rajiv Ramaswami, Kumar Sivarajan, Galen Sasaki
R1,965 Discovery Miles 19 650 Ships in 10 - 15 working days

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded discussions on multimode fiber with additional sections on photonic crystal and plastic fibers, as well as expanded coverage of Ethernet and Multiprotocol Label Switching (MPLS).

This book clearly explains all the hard-to-find information on architecture, control and management. It serves as your guide at every step of optical networking-- from planning to implementation through ongoing maintenance. This book is your key to thoroughly understanding practical optical networks.
In-depth coverage of optimization, design, and management of the components and transmission of optical networks.

Filled with examples, figures, and problem sets to aid in development of dependable, speedy networks.

Focuses on practical, networking-specific issues: everything you need to know to implement currently available optical solutions.

IPv6 Socket API Extensions: Programmer's Guide (Paperback): Qing Li, Jinmei Tatuya, Keiichi Shima IPv6 Socket API Extensions: Programmer's Guide (Paperback)
Qing Li, Jinmei Tatuya, Keiichi Shima
R687 Discovery Miles 6 870 Ships in 10 - 15 working days

"IPv6 Socket API Extensions: Programmer's Guide" covers the IPv6 application programming intercfaces (API) extensions and enhancements that have been made to the socket APIs. The book begins with a brief overview of the API specifications along with sample code usage. Then an explanation of the internal kernel implementation that realizes the services offered by the API sets is detailed. Also descriptions of several standard user libraries that have been extended or created to support IPV6 are reviewed. Includes various examples which illustrate how to write portable applications that can run on either IPv4 or IPv6 networks. Succinct treatment of everything you need know to get up and running with IPv6 socket programming in one affordable volume.
Provides a detailed introduction to the IETF standards for IPv6 APIsIncludes extensive line-by-line code sets with meticulous explanations of their implementationNumerous diagrams and illustrations to aid in fully understanding the socket APIs

Optical Transmission and Networks for Next Generation Internet Traffic Highways (Hardcover): Fouad Mohammed Abbou, Hiew Chee... Optical Transmission and Networks for Next Generation Internet Traffic Highways (Hardcover)
Fouad Mohammed Abbou, Hiew Chee Choong
R4,900 Discovery Miles 49 000 Ships in 18 - 22 working days

Data services, especially those involving multimedia applications, can often be bandwidth intensive and accessed simultaneously by a large number of users. As such, efforts are being made to replace conventional network infrastructure, based on copper lines and coaxial cables, with fiber optic networks for improved performance. Optical Transmission and Networks for Next Generation Internet Traffic Highways provides a broader perspective of the parameters involved in the transmission of optical signals using optical soliton systems, OCDM-WDM, SCM-WDM and OTDM-WDM. This timely publication is ideal for use by technical managers, graduate students, engineers and technicians involved in the fiber-optics industry, and scientists working in the field of optical communications.

Infosec Management Fundamentals (Paperback): Henry Dalziel Infosec Management Fundamentals (Paperback)
Henry Dalziel
R1,105 Discovery Miles 11 050 Ships in 10 - 15 working days

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities.

Intelligent Quality of Service Technologies and Network Management - Models for Enhancing Communication (Hardcover): Intelligent Quality of Service Technologies and Network Management - Models for Enhancing Communication (Hardcover)
R4,604 Discovery Miles 46 040 Ships in 18 - 22 working days

The increasing reliance upon networking and mobile networking devices in the modern world demands constant improvement of network Quality of Service (QoS). Intelligent Quality of Service Technologies and Network Management: Models for Enhancing Communication explores the interrelated natures of network control mechanisms and QoS and offers fundamental knowledge on the subject, describing the significance of network management and the integration of knowledge to demonstrate how network management is related to QoS in real applications. Engaging and innovative, this book provides practical solutions that integrate network management and QoS strategies for real-world application.

Selected Readings on Electronic Commerce Technologies - Contemporary Applications (Hardcover): Wen-Chen Hu Selected Readings on Electronic Commerce Technologies - Contemporary Applications (Hardcover)
Wen-Chen Hu
R5,018 Discovery Miles 50 180 Ships in 18 - 22 working days

Education and research in the field of electronic commerce technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Electronic Commerce Technologies: Contemporary Applications supplements course instruction and student research with quality articles focused on key issues concerning the technologies and applications of electronic commerce. Containing over 30 chapters from authors across the globe, these selected readings in areas such as e-marketing, IT business, and mobile commerce depict the most relevant and important areas of classroom discussion within the categories of fundamental concepts and theories; development and design methodologies; tools and technologies; application and utilization; critical issues; and emerging trends.

AWS CodeStar User Guide (Hardcover): Documentation Team AWS CodeStar User Guide (Hardcover)
Documentation Team
R1,147 Discovery Miles 11 470 Ships in 18 - 22 working days
Information Warfare (Hardcover): Daniel Ventre Information Warfare (Hardcover)
Daniel Ventre
R3,778 Discovery Miles 37 780 Ships in 18 - 22 working days

This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.

Windows Server 2012 Security from End to Edge and Beyond - Architecting, Designing, Planning, and Deploying Windows Server 2012... Windows Server 2012 Security from End to Edge and Beyond - Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions (Paperback, New)
Thomas W. Shinder, Yuri Diogenes, Debra Littlejohn Shinder
R2,156 Discovery Miles 21 560 Ships in 10 - 15 working days

"Windows Server 2012 Security from End to Edge and Beyond" shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access.

Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments.

The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors blog http: //blogs.technet.com.b.security_talk/. Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter.
Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your systemWritten by two Microsoft employees who provide an inside look at the security features of Windows 8 Test Lab Guides enable you to test everything before deploying live to your system"

Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, VOL 1 (Hardcover): Surjit Singh, Rajeev... Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, VOL 1 (Hardcover)
Surjit Singh, Rajeev Mohan Sharma
R6,389 Discovery Miles 63 890 Ships in 18 - 22 working days
Amazon WorkMail Administrator Guide (Hardcover): Documentation Team Amazon WorkMail Administrator Guide (Hardcover)
Documentation Team
R886 Discovery Miles 8 860 Ships in 18 - 22 working days
Wireless Radio-Frequency Standards and System Design - Advanced Techniques (Hardcover, New): Gianluca Cornetta, David J Santos,... Wireless Radio-Frequency Standards and System Design - Advanced Techniques (Hardcover, New)
Gianluca Cornetta, David J Santos, Jose Manuel Vazquez
R4,943 Discovery Miles 49 430 Ships in 18 - 22 working days

Radio-frequency (RF) integrated circuits in CMOS technology are gaining increasing popularity in the commercial world, and CMOS technology has become the dominant technology for applications such as GPS receivers, GSM cellular transceivers, wireless LAN, and wireless short-range personal area networks based on IEEE 802.15.1 (Bluetooth) or IEEE 802.15.4 (ZigBee) standards. Furthermore, the increasing interest in wireless technologies and the widespread of wireless communications has prompted an ever increasing demand for radio frequency transceivers. Wireless Radio-Frequency Standards and System Design: Advanced Techniques provides perspectives on radio-frequency circuit and systems design, covering recent topics and developments in the RF area. Exploring topics such as LNA linearization, behavioral modeling and co-simulation of analog and mixed-signal complex blocks for RF applications, integrated passive devices for RF-ICs and baseband design techniques and wireless standards, this is a comprehensive reference for students as well as practicing professionals.

Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, VOL 2 (Hardcover): Surjit Singh, Rajeev... Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, VOL 2 (Hardcover)
Surjit Singh, Rajeev Mohan Sharma
R6,390 Discovery Miles 63 900 Ships in 18 - 22 working days
Selected Readings on Telecommunication and Networking (Hardcover): Jairo Gutierrez Selected Readings on Telecommunication and Networking (Hardcover)
Jairo Gutierrez
R4,987 Discovery Miles 49 870 Ships in 18 - 22 working days

Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality articles focused on key issues concerning the planning, design, maintenance, and management of telecommunications and networking technologies. Containing over 30 chapters from authors across the globe, these selected readings in areas such as collaborative technologies, virtual teams, and wireless systems depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.

Coding Theory (Hardcover): Sudhakar Radhakrishnan, Muhammad Sarfraz Coding Theory (Hardcover)
Sudhakar Radhakrishnan, Muhammad Sarfraz
R3,093 Discovery Miles 30 930 Ships in 18 - 22 working days
Bluetooth Application Programming with the Java APIs Essentials Edition (Paperback, Essentials ed): Timothy J. Thompson, C.Bala... Bluetooth Application Programming with the Java APIs Essentials Edition (Paperback, Essentials ed)
Timothy J. Thompson, C.Bala Kumar, Paul J. Kline
R987 Discovery Miles 9 870 Ships in 10 - 15 working days

Adoption of Bluetooth wireless technology has become ubiquitous in the last few years. One of the biggest steps forward is the standardization of Java APIs for Bluetooth wireless technology (JABWT). The latest updates to this standard is explained in detail in this book. The JABWT standard, defined by the JSR-82 Java Specification Request, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable. Wireless device manufacturers have responded overwhelmingly to the JABWT specification by implementing JABWT applications in mobile phones and other personal wireless communications products.
"Bluetooth Application Programming Essentials: Programming with the Java APIs" explains in detail how to write Bluetooth applications using the Java APIs to exploit the power of both technologies. Written by the specification lead for JSR-82 and two other key participants in developing the standards of JABWT, this book provides the authoritative explanations and concrete examples needed to get started right away.
This book provides embedded Java developers with to-the-point information on the APIs in the specification with detailed programmatic examples of the APIs in use. A NEW chapter on the Push Registry definition (a new feature in the 1.1 version of JSR-82) has been added. Finally, the new Essentials version of the book will update the remaining chapters to reflect changes in the latest Bluetooth spec (2.1) and the industry as a whole.
As a bonus, this edition of the book offers over 200 pages of added content on the website. This "bonus material" includes complete source code from examples in the book, the javex.bluetooth code package, the java.obex code package, an enhanced set of "Example Applications," and a tutorial on "Implementing JABWT on a Device." These code-heavy sections are actually more effective in electonic format where the application can be easily downloaded.

KEY FEATURES & BENEFITS
* By focusing only on the essentials, this concise resource enables software and hardware vendors to quickly develop Bluetooth applications for mobile devices in an increasingly competitive market.
* The updated material examines crucial programming areas (including RFCOMM, OBEX, device discovery, service discovery, and L2CAP), which allows developers to not only successfully design, but master and build Java APIs for Bluetooth Wireless Technology.
* Includes a new and valuable chapter that delineates the pivotal Push Registry feature ? a recent development that will help programmers avoid the common problem of connection collision.
* By providing real-world issues and problems involved in implementing the Java APIs specification, the book allows developers to identify with the text and encourages repeated reference.

GFI Network Security and PCI Compliance Power Tools (Paperback, New): Brien Posey GFI Network Security and PCI Compliance Power Tools (Paperback, New)
Brien Posey
R1,296 Discovery Miles 12 960 Ships in 10 - 15 working days

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.
In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.
* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.
* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.
* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.
* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.
* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.
* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.
* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.
* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.
* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports.
* Use GFI EndPointSecurity to Lock Down Hardware
* Create Protection Policies to Control the Level of Device Access
* Master Advanced Features of GFI: Locking Device Categories, Blacklisting and Whitelisting Devices, Using File Type Restrictions and More

Planning, Negotiating, Implementing, and Managing Wide Area Networks - A Practical Guide (Hardcover): Luiz Augusto de Carvalho,... Planning, Negotiating, Implementing, and Managing Wide Area Networks - A Practical Guide (Hardcover)
Luiz Augusto de Carvalho, Benjamin Naude
R573 Discovery Miles 5 730 Ships in 10 - 15 working days

Luiz Augusto de Carvalho - WANOPT Wide area network Specialist
Benjamin Naude - Magna international

"Telecommunications is usually responsible for a large percentage of the IT infrastructure costs, usually only surpassed by personnel. Therefore identifying savings, even small in terms of percentage in a large corporate network may mean hundreds of thousands of dollars per month."

"The techniques described in this book already helped and continuous helping hundreds of organizations to save millions of dollars with their telecommunications infra-structures."

Contents Presents the concepts of the WAN design algorithms Provides practical examples of algorithms and demonstrates how to deploy them Discusses cases where the techniques described were deployed with favorable results Discusses negotiating and managerial strategies Presents a practical guide about how to implement and manage a large WAN

Applied Approach to Privacy and Security for the Internet of Things (Hardcover): Parag Chatterjee, Emmanuel Benoist, Asoke Nath Applied Approach to Privacy and Security for the Internet of Things (Hardcover)
Parag Chatterjee, Emmanuel Benoist, Asoke Nath
R6,406 Discovery Miles 64 060 Ships in 18 - 22 working days

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

Online Banking Security Measures and Data Protection (Hardcover): Shadi A. Aljawarneh Online Banking Security Measures and Data Protection (Hardcover)
Shadi A. Aljawarneh
R5,365 Discovery Miles 53 650 Ships in 18 - 22 working days

Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever. Online Banking Security Measures and Data Protection is an authoritative reference source for the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary financial systems. Presenting emerging techniques to secure these systems against potential threats and highlighting theoretical foundations and real-world case studies, this book is ideally designed for professionals, practitioners, upper-level students, and technology developers interested in the latest developments in e-banking security.

Technical, Commercial and Regulatory Challenges of QoS - An Internet Service Model Perspective (Hardcover): Xipeng Xiao Technical, Commercial and Regulatory Challenges of QoS - An Internet Service Model Perspective (Hardcover)
Xipeng Xiao
R1,224 Discovery Miles 12 240 Ships in 10 - 15 working days

This book provides a comprehensive examination of Internet QoS theory, standards, vendor implementation and network deployment from the practitioner's point of view, including extensive discussion of related economic and regulatory issues. Written in a technology-light way so that a variety of professionals and researchers in the information and networking industries can easily grasp the material. Includes case studies based on real-world experiences from industry.
The author starts by discussing the economic, regulatory and technical challenges of the existing QoS model. Key coverage includes defining a clear business model for selling and buying QoS in relation to current and future direction of government regulation and QoS interoperability (or lack thereof) between carriers and networking devices. The author then demonstrates how to improve the current QoS model to create a clear selling point, less regulation uncertainty, and higher chance of deployment success. This includes discussion of QoS re-packaging to end-users; economic and regulatory benefits of the re-packaging; and the overall benefits of an improved technical approach. Finally, the author discusses the future evolution of QoS from an Internet philosophy perspective and lets the reader draw the conclusions.
This book is the first QoS book to provide in depth coverage on the commercial and regulatory aspects of QoS, in addition to the technical aspect. From that, readers can grasp the commercial and regulatory issues of QoS and their implications on the overall QoS business model. This book is also the first QoS book to provide case studies of real world QoS deployments, contributed by the people who did the actual deployments. From that, readers can grasp the practical issues of QoS in real world. This book is also the first QoS book to cover both wireline QoS and wireless QoS. Readers can grasp the QoS issues in the wireless world. The book was reviewed and endorsed by a long list of prominent industrial and academic figures.
* The only book to discuss QoS technology in relation to economic and regulatory issues
* Includes case studies based on real-world examples from industry practitioners.
* Provides unique insight into how to improve the current QoS model to create a clear selling point, less regulatory uncertainty, and higher chance of deployment success.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Themes
Naaahhh Vinyl record R226 Discovery Miles 2 260
Benzedrine
Tackle Vinyl record R205 Discovery Miles 2 050
Geogaddi
Boards Of Canada Vinyl record R1,080 Discovery Miles 10 800
Communion
Rabit Vinyl record R185 Discovery Miles 1 850
Destroyed.
Moby CD R249 Discovery Miles 2 490
Vipassana
Certain Creatures Vinyl record R682 Discovery Miles 6 820
Big Beats
Various Artists CD R164 R131 Discovery Miles 1 310
Raw Solutions
Slava Vinyl record R185 Discovery Miles 1 850
Death After Life
Thug Entrancer Vinyl record R205 Discovery Miles 2 050
Late Night Tales (David Holmes)
Various Artists Vinyl record R645 Discovery Miles 6 450

 

Partners