0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (317)
  • R250 - R500 (847)
  • R500+ (14,014)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Advances in Ubiquitous Computing - Future Paradigms and Directions (Hardcover): Soraya Kouadri Mostefaoui, Zakaria Maamar,... Advances in Ubiquitous Computing - Future Paradigms and Directions (Hardcover)
Soraya Kouadri Mostefaoui, Zakaria Maamar, George M Giaglis
R2,948 Discovery Miles 29 480 Ships in 12 - 17 working days

The development and availability of new computing and communication devices, and the increased connectivity between these devices, thanks to wired and wireless networks, are enabling new opportunities for people to perform their operations anywhere and anytime. This technological expansion has developed a multitude of challenges that demand further research. ""Advances in Ubiquitous Computing: Future Paradigms and Directions"" investigates the technology foreground of ubiquitous computing, the emerging applications and services, as well as certain social issues that are vital for the successful deployment of a ubiquitous computing application, through a multi-perspective analytical lens.Providing academics and practitioners with high quality, authoritative content on such topics as device design, wireless communication, location sensing, privacy concerns, attention focus, multi-person interaction, and direct interaction, work patterns, this Premier Reference Source is a must-have addition to library collections worldwide.

Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 International Conference, CCTA 2010, Nanchang, China,... Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 International Conference, CCTA 2010, Nanchang, China, October 22-25, 2010, Selected Papers, Part IV (Hardcover, Edition.)
Daoliang Li, Yande Liu, Yingyi Chen
R3,204 Discovery Miles 32 040 Ships in 10 - 15 working days

This book constitutes Part IV of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010, held in Nanchang, China, in October 2010. The 352 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas.

Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing (Hardcover, 2013... Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing (Hardcover, 2013 ed.)
Vinu V. Das
R6,018 Discovery Miles 60 180 Ships in 10 - 15 working days

Third International Conference on Recent Trends in Information, Telecommunication and Computing - ITC 2012. ITC 2012 will be held during Aug 03-04, 2012, Kochi, India. ITC 2012, is to bring together innovative academics and industrial experts in the field of Computer Science, Information Technology, Computational Engineering, and Communication to a common forum. The primary goal of the conference is to promote research and developmental activities in Computer Science, Information Technology, Computational Engineering, and Communication. Another goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners.

Cyber-Physical Systems Security (Hardcover, 2018 ed.): Cetin Kaya Koc Cyber-Physical Systems Security (Hardcover, 2018 ed.)
Cetin Kaya Koc
R4,623 Discovery Miles 46 230 Ships in 10 - 15 working days

The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.

Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC - 16') (Hardcover, 1st... Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC - 16') (Hardcover, 1st ed. 2016)
V. Vijayakumar, V. Neelanarayanan
R6,023 Discovery Miles 60 230 Ships in 10 - 15 working days

This proceedings volume contains selected papers that were presented in the 3rd International Symposium on Big data and Cloud Computing Challenges, 2016 held at VIT University, India on March 10 and 11. New research issues, challenges and opportunities shaping the future agenda in the field of Big Data and Cloud Computing are identified and presented throughout the book, which is intended for researchers, scholars, students, software developers and practitioners working at the forefront in their field. This book acts as a platform for exchanging ideas, setting questions for discussion, and sharing the experience in Big Data and Cloud Computing domain.

Video over Cognitive Radio Networks - When Quality of Service Meets Spectrum (Hardcover, 2014 ed.): Shiwen Mao Video over Cognitive Radio Networks - When Quality of Service Meets Spectrum (Hardcover, 2014 ed.)
Shiwen Mao
R4,080 R3,497 Discovery Miles 34 970 Save R583 (14%) Ships in 12 - 17 working days

This book focuses on the problem of video streaming over emerging cognitive radio (CR) networks. The book discusses the problems and techniques for scalable video streaming over cellular cognitive radio networks, ad hoc CR networks, cooperative CR networks, and femtocell CR networks. The authors formulate these problems and propose optimal algorithms to solve these problems. Also the book analyzes the proposed algorithms and validates the algorithms with simulations.

Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.): Francisco Rodriguez-henriquez, N. A. Saqib, Arturo... Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.)
Francisco Rodriguez-henriquez, N. A. Saqib, Arturo Diaz Perez, Cetin Kaya Koc
R5,456 Discovery Miles 54 560 Ships in 12 - 17 working days

Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.

Heterogeneous Wireless Access Networks - Architectures and Protocols (Hardcover, 2009 ed.): Ekram Hossain Heterogeneous Wireless Access Networks - Architectures and Protocols (Hardcover, 2009 ed.)
Ekram Hossain
R3,112 Discovery Miles 31 120 Ships in 10 - 15 working days

Heterogeneous wireless networking, which is sometimes referred to as the fourth-generation (4G) wireless, is a new frontier in the future wireless communications technology and there has been a growing interest on this topic among researchers and engineers in both academia and industry. This book will include a set of research and survey articles featuring the recent advances in theory and applications of heterogeneous wireless networking technology for the next generation (e.g., fourth generation) wireless communications systems. With the rapid growth in the number of wireless applications, services and devices, using a single wireless technology such as a second generation (2G) and third generation (3G) wireless system would not be efficient to deliver high speed data rate and quality-of-service (QoS) support to mobile users in a seamless way. Fourth generation (4G) wireless systems are devised with the vision of heterogeneity in which a mobile user/device will be able to connect to multiple wireless networks (e.g., WLAN, cellular, WMAN) simultaneously. This book intends to provide a unified view on the state-of-the-art of protocols and architectures for heterogeneous wireless networking. The contributed articles will cover both the theoretical concepts and system-level implementation issues related to design, analysis, and optimization of architectures and protocols for heterogeneous wireless access networks.

Virtualization of Universities - Digital Media and the Organization of Higher Education Institutions (Hardcover, 2012 ed.):... Virtualization of Universities - Digital Media and the Organization of Higher Education Institutions (Hardcover, 2012 ed.)
Thomas Pfeffer
R3,023 Discovery Miles 30 230 Ships in 10 - 15 working days

The purpose of this volume is to shape conceptual tools to understand the impact of new information and communication technologies (ICTs) on the organization of universities. Traditional research-based universities, the most typical representatives of the higher education system, find themselves challenged by the speed and the wide range of technical innovations, but also by a vast array of implicit assumptions and explicit promises associated with the distribution of digital media.

The author observes that as universities increasingly use digital media (computers and the Internet) to accomplish their tasks, a transformation takes place in an "evolutionary" rather than in a revolutionary way.Using the University of Klagenfurt as an in-depth case study, he explores such dynamic issues as how digital media affect the practice of research, the preservation and dissemination of knowledge (for example, through publishing and archiving), and delivery of education at universities.More broadly, he considers issues of organizational culture and design, administration, and leadership as universities integrate digital technologies into all aspects of their operations."

Protocols for Secure Electronic Commerce (Hardcover, 2nd edition): Mostafa Hashem Sherif Protocols for Secure Electronic Commerce (Hardcover, 2nd edition)
Mostafa Hashem Sherif; Series edited by Saba Zamir
R4,933 Discovery Miles 49 330 Ships in 12 - 17 working days

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology.

The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money.

Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.

An Ontology for Unconventional Conflict (Hardcover, 1st ed. 2018): Dean S. Hartley III An Ontology for Unconventional Conflict (Hardcover, 1st ed. 2018)
Dean S. Hartley III
R3,090 Discovery Miles 30 900 Ships in 10 - 15 working days

This book describes the ontology structure, types of actors, their potential actions, and ways that actions can affect the things that are part of the conflict. An ontology of unconventional conflict supports the understanding of unconventional conflict in general. It also provides a tool for understanding and investigating a particular unconventional conflict. The ontology specifies the relations among the elements and supports creating a description of a particular situation. Unconventional conflict spans the range from natural disasters through human disagreements to irregular warfare (up to conventional war). Unconventional conflict involves damage to things and injuries to people; however, the critical factors are the actions, reactions, and opinions of people, including political, military, economic, social, infrastructure, and information components. This ontology supports and will appeal to military strategists, political scientists, economists, and politicians in understanding their planning for, and managing of these conflicts.

Resource Allocation and MIMO for 4G and Beyond (Hardcover, 2014 ed.): Francisco Rodrigo Porto Cavalcanti Resource Allocation and MIMO for 4G and Beyond (Hardcover, 2014 ed.)
Francisco Rodrigo Porto Cavalcanti
R6,633 R5,398 Discovery Miles 53 980 Save R1,235 (19%) Ships in 12 - 17 working days

This book will be a comprehensive collection of advanced concepts related to 4th generation wireless communication systems. It will be divided into two main parts: resource allocation and transceiver architectures. These two research areas are at the core of the recent advances experimented by wireless communication systems. Each chapter will cover a relevant, timely, topic with two focuses: a first part which is of tutorial and survey nature, reviews the state of the art in that topic, followed by a more deep treatment including current research topics, case studies and performance analysis.

Network Science, Nonlinear Science and Infrastructure Systems (Hardcover, 2007 ed.): Terry L. Friesz Network Science, Nonlinear Science and Infrastructure Systems (Hardcover, 2007 ed.)
Terry L. Friesz
R3,077 Discovery Miles 30 770 Ships in 10 - 15 working days

Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems.

Advances in Mobile Cloud Computing and Big Data in the 5G Era (Hardcover, 1st ed. 2017): Constandinos X. Mavromoustakis, George... Advances in Mobile Cloud Computing and Big Data in the 5G Era (Hardcover, 1st ed. 2017)
Constandinos X. Mavromoustakis, George Mastorakis, Ciprian Dobre
R5,542 Discovery Miles 55 420 Ships in 12 - 17 working days

This book reports on the latest advances on the theories, practices, standards and strategies that are related to the modern technology paradigms, the Mobile Cloud computing (MCC) and Big Data, as the pillars and their association with the emerging 5G mobile networks. The book includes 15 rigorously refereed chapters written by leading international researchers, providing the readers with technical and scientific information about various aspects of Big Data and Mobile Cloud Computing, from basic concepts to advanced findings, reporting the state-of-the-art on Big Data management. It demonstrates and discusses methods and practices to improve multi-source Big Data manipulation techniques, as well as the integration of resources availability through the 3As (Anywhere, Anything, Anytime) paradigm, using the 5G access technologies.

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover): Gianluca Cornetta, Abdellah... Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover)
Gianluca Cornetta, Abdellah Touhafi, Gabriel-Miro Muntean
R6,868 Discovery Miles 68 680 Ships in 10 - 15 working days

The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.

Steiner Trees in Industry (Hardcover, 2001 ed.): Xiuzhen Cheng, Dingzhu Du Steiner Trees in Industry (Hardcover, 2001 ed.)
Xiuzhen Cheng, Dingzhu Du
R6,187 Discovery Miles 61 870 Ships in 10 - 15 working days

This book is a collection of articles studying various Steiner tree prob lems with applications in industries, such as the design of electronic cir cuits, computer networking, telecommunication, and perfect phylogeny. The Steiner tree problem was initiated in the Euclidean plane. Given a set of points in the Euclidean plane, the shortest network interconnect ing the points in the set is called the Steiner minimum tree. The Steiner minimum tree may contain some vertices which are not the given points. Those vertices are called Steiner points while the given points are called terminals. The shortest network for three terminals was first studied by Fermat (1601-1665). Fermat proposed the problem of finding a point to minimize the total distance from it to three terminals in the Euclidean plane. The direct generalization is to find a point to minimize the total distance from it to n terminals, which is still called the Fermat problem today. The Steiner minimum tree problem is an indirect generalization. Schreiber in 1986 found that this generalization (i.e., the Steiner mini mum tree) was first proposed by Gauss."

Resource Allocation with Carrier Aggregation in Cellular Networks - Optimality and Spectrum Sharing using C++ and MATLAB... Resource Allocation with Carrier Aggregation in Cellular Networks - Optimality and Spectrum Sharing using C++ and MATLAB (Hardcover, 1st ed. 2018)
Haya Shajaiah, Ahmed Abdelhadi, Charles Clancy
R4,641 Discovery Miles 46 410 Ships in 12 - 17 working days

This book introduces an efficient resource management approach for future spectrum sharing systems. The book focuses on providing an optimal resource allocation framework based on carrier aggregation to allocate multiple carriers' resources efficiently among mobile users. Furthermore, it provides an optimal traffic dependent pricing mechanism that could be used by network providers to charge mobile users for the allocated resources. The book provides different resource allocation with carrier aggregation solutions, for different spectrum sharing scenarios, and compares them. The provided solutions consider the diverse quality of experience requirement of multiple applications running on the user's equipment since different applications require different application performance. In addition, the book addresses the resource allocation problem for spectrum sharing systems that require user discrimination when allocating the network resources.

E-Commerce Security and Privacy (Hardcover, 2001 ed.): Anup K. Ghosh E-Commerce Security and Privacy (Hardcover, 2001 ed.)
Anup K. Ghosh
R3,133 Discovery Miles 31 330 Ships in 10 - 15 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.

Securing Web Services - Practical Usage of Standards and Specifications (Hardcover): Panos Periorellis Securing Web Services - Practical Usage of Standards and Specifications (Hardcover)
Panos Periorellis
R5,220 Discovery Miles 52 200 Ships in 12 - 17 working days

'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.

Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover)
Harris Schwartz
R887 Discovery Miles 8 870 Ships in 10 - 15 working days
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (Hardcover, 1st ed. 2018):... Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (Hardcover, 1st ed. 2018)
Sergei Petrenko
R4,327 Discovery Miles 43 270 Ships in 12 - 17 working days

This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.

Optical Networks - Architecture and Survivability (Hardcover, 2003 ed.): Hussein T. Mouftah, Pin-Han Ho Optical Networks - Architecture and Survivability (Hardcover, 2003 ed.)
Hussein T. Mouftah, Pin-Han Ho
R4,614 Discovery Miles 46 140 Ships in 10 - 15 working days

Optical Networks - Architecture and Survivability, is a state-of-the-art work on survivable and cost-effective design of control and management for networks with IP directly over Wavelength Division Multiplexing (WDM) technology (or called Optical Internet). The authors address issues of signaling mechanisms, resource reservation, and survivable routing and wavelength assignment. Special emphasis has been given to the design of meshed, middle-sized, and wavelength-routed networks with dynamic traffic in the optical domain, such as the next-generation Metropolitan Area Network.

Research and development engineers, graduate students studying wavelength-routed WDM networks, and senior undergraduate students with a background in algorithms and networking will find this book interesting and useful. This work may also be used as supplemental readings for graduate courses on internetworking, routing, survivability, and network planning algorithms.

QoS in Packet Networks (Hardcover): Kun I. Park QoS in Packet Networks (Hardcover)
Kun I. Park
R3,039 Discovery Miles 30 390 Ships in 10 - 15 working days

QoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its analysis involves such mathematical disciplines as probability, random variables, stochastic processes and queuing. These mathematical subjects are abstract, not easy to grasp for uninitiated persons.

QoS in Packet Networks is written with two objectives. The first explains the fundamental mathematical concepts used in QoS analysis as plainly as possible, in layman's terms to afford the reader a better appreciation of the subject of QoS treated in this book. The second explains in plain language, the various parts of QoS in packet networks, to provide the reader with a complete view of this complex and dynamic area of communications networking technology. Discussion of the functional requirements of the packet networks to provide QoS is included.

AD HOC NETWORKS - Technologies and Protocols (Hardcover, 2005 ed.): Prasant Mohapatra, Srikanth Krishnamurthy AD HOC NETWORKS - Technologies and Protocols (Hardcover, 2005 ed.)
Prasant Mohapatra, Srikanth Krishnamurthy
R4,603 Discovery Miles 46 030 Ships in 10 - 15 working days

AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. Contributors to this volume include experts that have been active in ad hoc network research and have published in the premier conferences and journals in this subject area.

AD HOC NETWORKS: Protocols and Technologies will be immensely useful as a reference work to engineers and researchers as well as to advanced level students in the areas of wireless networks, and computer networks.

Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.): Enrico Nardelli, Sabina... Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.)
Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo
R3,202 Discovery Miles 32 020 Ships in 10 - 15 working days

This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme "An Architecture for Information Se curity Management," and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was "E-Government and Security" and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada)."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Routledge Library Editions: Occultism
Various Authors Hardcover R7,160 Discovery Miles 71 600
Essential EU Climate Law
Edwin Woerdman, Martha Roggenkamp, … Paperback R1,225 Discovery Miles 12 250
Giordano Bruno - His Life, Thought, and…
William Boulting Hardcover R4,734 Discovery Miles 47 340
Teaching Mathematics in the Foundation…
C. Meier, M Naude Paperback  (1)
R238 Discovery Miles 2 380
From Para To Dakar - Overcoming…
Joey Evans Paperback  (2)
R310 R277 Discovery Miles 2 770
Brat - An '80s Story
Andrew McCarthy Paperback R429 R397 Discovery Miles 3 970
Successfully Grow and Garden Citrus…
Madison Pierce Hardcover R866 R750 Discovery Miles 7 500
101 Corgis From Around The World In…
Bob Mather Hardcover R942 Discovery Miles 9 420
Exploring Pancreatic Metabolism and…
Ganji Purnachandra Nagaraju, Aramati Bm Reddy Hardcover R3,048 Discovery Miles 30 480
Flavour with Benefits - France
Cathy Connally, Charley Best Hardcover R1,692 Discovery Miles 16 920

 

Partners