0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,631)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Linksys WRT54G Ultimate Hacking (Paperback): Paul Asadoorian, Larry Pesce Linksys WRT54G Ultimate Hacking (Paperback)
Paul Asadoorian, Larry Pesce
R842 Discovery Miles 8 420 Ships in 10 - 15 working days

This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G s hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.
Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system.
* Never before seen and documented hacks, including wireless spectrum analysis
* Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform
* Full coverage on embedded device development using the WRT54G and OpenWRT"

Cybersecurity Education for Awareness and Compliance (Hardcover): Ismini Vasileiou, Steven Furnell Cybersecurity Education for Awareness and Compliance (Hardcover)
Ismini Vasileiou, Steven Furnell
R4,855 Discovery Miles 48 550 Ships in 18 - 22 working days

Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through. Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so that they have a clear understanding of what security education is, the elements required to achieve it, and the means by which to link it to the wider goal of good security behavior. Split across four thematic sections (considering the needs of users, organizations, academia, and the profession, respectively), the chapters will collectively identify and address the multiple perspectives from which action is required. This book is ideally designed for IT consultants and specialist staff including chief information security officers, managers, trainers, and organizations.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover)
Information R Management Association
R11,906 Discovery Miles 119 060 Ships in 18 - 22 working days
AWS Directory Service Administration Guide (Hardcover): Documentation Team AWS Directory Service Administration Guide (Hardcover)
Documentation Team
R1,688 Discovery Miles 16 880 Ships in 18 - 22 working days
Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover): Edmond K. Machie Network Security Traceback Attack and React in the United States Department of Defense Network (Hardcover)
Edmond K. Machie
R1,699 Discovery Miles 16 990 Ships in 10 - 15 working days

Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.

Network Science - Theory and Applications (Hardcover): T.G. Lewis Network Science - Theory and Applications (Hardcover)
T.G. Lewis
R3,647 Discovery Miles 36 470 Ships in 18 - 22 working days

A comprehensive look at the emerging science of networks

Network science helps you design faster, more resilient communication networks; revise infrastructure systems such as electrical power grids, telecommunications networks, and airline routes; model market dynamics; understand synchronization in biological systems; and analyze social interactions among people.

This is the first book to take a comprehensive look at this emerging science. It examines the various kinds of networks (regular, random, small-world, influence, scale-free, and social) and applies network processes and behaviors to emergence, epidemics, synchrony, and risk. The book's uniqueness lies in its integration of concepts across computer science, biology, physics, social network analysis, economics, and marketing.

The book is divided into easy-to-understand topical chapters and the presentation is augmented with clear illustrations, problems and answers, examples, applications, tutorials, and a discussion of related Java software. Chapters cover:

Origins

Graphs

Regular Networks

Random Networks

Small-World Networks

Scale-Free Networks

Emergence

Epidemics

Synchrony

Influence Networks

Vulnerability

Net Gain

Biology

This book offers a new understanding and interpretation of the field of network science. It is an indispensable resource for researchers, professionals, and technicians in engineering, computing, and biology. It also serves as a valuable textbook for advanced undergraduate and graduate courses in related fields of study.

Deploying IP and MPLS QoS for Multiservice Networks - Theory and Practice (Hardcover): John William Evans, Clarence Filsfils Deploying IP and MPLS QoS for Multiservice Networks - Theory and Practice (Hardcover)
John William Evans, Clarence Filsfils
R1,428 Discovery Miles 14 280 Ships in 10 - 15 working days

QoS, short for "quality of service," is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including voice, video, and data have different idiosyncrasies that try the dimensions of the network. This malleable network architecture poses an always moving potential problem for the network professional.
The authors have provided a comprehensive treatise on this subject. They have included topics such as traffic engineering, capacity planning, and admission control. This book provides real world case studies of QoS in multiservice networks. These case studies remove the mystery behind QoS by illustrating the how, what, and why of implementing QoS within networks. Readers will be able to learn from the successes and failures of these actual working designs and configurations.
*Helps readers understand concepts of IP QoS by presenting clear descriptions of QoS components, architectures, and protocols
*Directs readers in the design and deployment of IP QoS networks through fully explained examples of actual working designs
*Contains real life case studies which focus on implementation

Dictionary of Information Security (Paperback): Robert Slade Dictionary of Information Security (Paperback)
Robert Slade
R659 R540 Discovery Miles 5 400 Save R119 (18%) Ships in 10 - 15 working days

The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.
IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security+ will also find this a valuable resource.
* Your one stop shop coverage of malware, wireless technologies, and phishing
*An easy to use tol featuring the ability to cross references makeing navigation easy
* Includes special coverage of military and government terms for the latest hot topics

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover)
Information R Management Association
R11,899 Discovery Miles 118 990 Ships in 18 - 22 working days
Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover)
Information R Management Association
R11,344 Discovery Miles 113 440 Ships in 18 - 22 working days
Traffic Engineering and QoS Optimization of Integrated Voice and Data Networks (Hardcover): Gerald R. Ash Traffic Engineering and QoS Optimization of Integrated Voice and Data Networks (Hardcover)
Gerald R. Ash
R1,693 Discovery Miles 16 930 Ships in 10 - 15 working days

This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement, modeling, characterization, and control of network traffic, and the application of techniques to achieve specific performance objectives. The scope of the analysis and recommendations include dimensioning, call/flow and connection routing, QoS resource management, routing table management, dynamic transport routing, and operational requirements. Case studies are included which provide the reader with a concrete way into the technical details and highlight why and how to use the techniques described in the book.
* Includes Case Studies of MPLS & GMPLS Network Optimization
* Presents state-of-the-art traffic engineering and quality of service optimization methods and illustrates the tradeoffs between the various methods discussed
* Contains practical Case Studies based on large-scale service provider implementations and architecture plans
* Written by a highly respected and well known active expert in traffic engineering and quality of service

Configuring SonicWALL Firewalls (Paperback): Dan Bendell Configuring SonicWALL Firewalls (Paperback)
Dan Bendell
R1,115 Discovery Miles 11 150 Ships in 10 - 15 working days

SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years.
This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.
Configuring SonicWALL Firewalls is the first book to deliver an in-depth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource.
* First book to deliver an in-depth look at the SonicWALL firewall product line
* Covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls
* Includes advanced troubleshooting techniques and the SonicWALL Security Manager

Securing HP NonStop Servers in an Open Systems World - TCP/IP, OSS and SQL (Paperback, 2nd Revised edition): XYPRO Technology... Securing HP NonStop Servers in an Open Systems World - TCP/IP, OSS and SQL (Paperback, 2nd Revised edition)
XYPRO Technology Corp
R2,565 Discovery Miles 25 650 Ships in 10 - 15 working days

Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing environments.
HP NonStop Servers are used by Financial, Medical, Manufacturing enterprises where there can be no down time. Securing HP NonStop Servers in an Open Systems World: OSS, TCP/IP, and SQL takes a wide angle view of NonStop Server use. This book addresses protection of the Open Systems Services environment, network interfaces including TCP/IP and standard SQL databases. It lays out a roadmap of changes since our first book HP has made to Safeguard, elaborating on the advantages and disadvantages of implementing each new version. Even the security aspects of managing Operating System upgrades are given attention. Auditors, security policy makers, information security administrators and system managers will find the practical information they need for putting security principles into practice to meet industry standards as well as compliance regulations.
* Addresses security issues in Open Systems Services
* Critical security topics for network interfaces TCP/IP, SQL, etc.
* Updates to safeguard thru since publication of XYPRO's last book

Ethical Impact of Technological Advancements and Applications in Society (Hardcover): Rocci Luppicini Ethical Impact of Technological Advancements and Applications in Society (Hardcover)
Rocci Luppicini
R4,943 Discovery Miles 49 430 Ships in 18 - 22 working days

In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer ethics, engineering ethics, and biotech ethics as well as nascent areas of research such as nanoethics, artificial morality, and neuroethics.

The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover): Michael Gentile, Ron Collette, Thomas D. August The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover)
Michael Gentile, Ron Collette, Thomas D. August
R1,106 Discovery Miles 11 060 Ships in 18 - 22 working days

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment. The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdrop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences. Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R879 R734 Discovery Miles 7 340 Save R145 (16%) Ships in 10 - 15 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

IT Governance in a Networked World - Multi-sourcing Strategies and Social Capital for Corporate Computing (Hardcover): Laurence... IT Governance in a Networked World - Multi-sourcing Strategies and Social Capital for Corporate Computing (Hardcover)
Laurence Lock Lee
R4,181 Discovery Miles 41 810 Ships in 18 - 22 working days

The outsourcing of IT services over the past decade has triggered a need to reassess how IT governance and sourcing should be conducted. ""IT Governance in a Networked World: Multi-Sourcing Strategies and Social Capital for Corporate Computing"" provides theories concerning corporate social capital, intellectual capital, and social networks for academicians, practitioners, and field researchers. This book addresses relationship challenges in a world that is becoming increasingly networked, offering useful frameworks and practices for IT governance.

Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R5,768 Discovery Miles 57 680 Ships in 18 - 22 working days
Advancing Consumer-Centric Fog Computing Architectures (Hardcover): Kashif Munir Advancing Consumer-Centric Fog Computing Architectures (Hardcover)
Kashif Munir
R5,214 Discovery Miles 52 140 Ships in 18 - 22 working days

Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.

Wireless Networks - From the Physical Layer to Communication, Computing, Sensing and Control (Hardcover): Giorgio... Wireless Networks - From the Physical Layer to Communication, Computing, Sensing and Control (Hardcover)
Giorgio Franceschetti, Sabatino Stornelli
R1,802 Discovery Miles 18 020 Ships in 10 - 15 working days

Awarded by the International Calabria's Prize!
This multidisciplinary volume originates from lectures presented at a short course on wireless communications in Capri, Italy. This globally attended conference has produced an exceptional book written by pioneers in the field. Lecturers at Capri included pillars in the fields of electromagnetics, communications, information technology and mathematics. As communications technology becomes increasingly wireless, an interdisciplinary viewpoint is necessary for professionals to correct problems and avoid others before they occur.
"Wireless Networks" covers critical technology within WLAN, ad hoc networks, data distribution, TV, radio, and personal mobile devices. As networks become wireless, engineers face increased difficulty securing its malleable boundaries. This book discusses security solutions such as sensor technology that prevent unwanted intrusion. Connectivity is also addressed, featuring chapters on antennas, bandwidth and frequencies. Editors Franceschetti and Stornelli have done a great service to the wireless communications community in creating a compendium that delivers this spectrum of essential information in one reference.
*Presents a uniquely panoramic view of wireless networks with viewpoints from engineering, computing, and mathematics
*The technology is discussed in theory as well as in practice to help engineers design and modify networks
*Globally recognized experts share their critical insight on sensor technology, transfering protocol, ad-hoc networks, and more

S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,137 Discovery Miles 11 370 Ships in 18 - 22 working days
Handbook of Research on Grid Technologies and Utility Computing - Concepts for Managing Large-Scale Applications (Hardcover):... Handbook of Research on Grid Technologies and Utility Computing - Concepts for Managing Large-Scale Applications (Hardcover)
Emmanuel Udoh, Frank Zhigang Wang
R6,632 Discovery Miles 66 320 Ships in 18 - 22 working days

Today, many institutions and corporations are involved in various grid researches that involve improvement in concepts, protocols, applications, methods, and tools. To help capture the rapid growth in grid concepts and applications and chart the future direction in this field, a resource compiling current advances in grid computing is essential. The Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications provides a compendium of terms, definitions, and explanations of concepts, issues, processes, and trends in grid technology. As the first book collection of its kind, this reference features current articles presenting comprehensive coverage of grid technologies valuable to any researcher, practitioner, or academician in grid computing.

Software Piracy Exposed (Paperback): Ron Honick Software Piracy Exposed (Paperback)
Ron Honick
R926 Discovery Miles 9 260 Ships in 10 - 15 working days

This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
* This book is about software piracy--what it is and how it's done
* This is the first book ever to describe how software is actually stolen and traded over the internet
* Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software

Advances in Computers, Volume 67 - Web Technology (Hardcover, 67th edition): Marvin Zelkowitz Advances in Computers, Volume 67 - Web Technology (Hardcover, 67th edition)
Marvin Zelkowitz
R3,908 Discovery Miles 39 080 Ships in 10 - 15 working days

This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 67, subtitled "Web technology," presents 6 chapters that show the impact that the World Wide Web is having on our society today. The general theme running throughout the volume is the ubiquity of web services. Topics such as wireless access and its problems and reliability of web communications are emphasized.


Key features:


- In-depth surveys and tutorials on software development approaches.
- Well-known authors and researchers in the field.
- Extensive bibliographies with most chapters.
- All chapters focus on Internet and web technology issues.
- Discussion of wireless communication and forensic issues, currently important research areas.
- In-depth surveys and tutorials on software development approaches.
- Well-known authors and researchers in the field.
- Extensive bibliographies with most chapters.
- All chapters focus on Internet and web technology issues.
- Discussion of wireless communication and forensic issues, currently important research areas.

Handbook of Research on Information Security in Biomedical Signal Processing (Hardcover): Chittaranjan Pradhan, Himansu Das,... Handbook of Research on Information Security in Biomedical Signal Processing (Hardcover)
Chittaranjan Pradhan, Himansu Das, Bighnaraj Naik, Nilanjan Dey
R8,036 Discovery Miles 80 360 Ships in 18 - 22 working days

Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Advances in Culture and…
Michele J. Gelfand, Chi-yue Chiu, … Hardcover R3,932 Discovery Miles 39 320
The Use of Tools by Human and Non-human…
A. Berthelet, J. Chavaillon Hardcover R4,495 Discovery Miles 44 950
Ritual Gone Wrong - What We Learn from…
Kathryn T. McClymond Hardcover R3,569 Discovery Miles 35 690
Magic, Science, and Religion, and Other…
Bronislaw Malinowski Hardcover R1,931 R1,730 Discovery Miles 17 300
The Social Order of the Underworld - How…
David Skarbek Hardcover R3,839 Discovery Miles 38 390
Rich Pickings Out Of The Past
Bernard Makgabo Ngoepe Paperback  (1)
R373 Discovery Miles 3 730
Hillbilly Elegy - A Memoir of a Family…
J D Vance Paperback  (1)
R330 R295 Discovery Miles 2 950
Nutrition and Physical Degeneration - A…
Weston Price Hardcover R848 Discovery Miles 8 480
Rhythms and Rhymes of Life - Music and…
Miriam Gazzah Paperback R1,524 Discovery Miles 15 240
Manifesto of a Tenured Radical
Cary Nelson Hardcover R2,858 Discovery Miles 28 580

 

Partners