![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
The Joy of Stats offers a reader-friendly introduction to applied statistics and quantitative analysis in the social sciences and public policy. Perfect as an undergraduate text or self-study manual, it emphasizes how to understand concepts, interpret algorithms and formulas, analyze data, and answer research questions. This brand new edition offers examples and visualizations using real-life data, a revised discussion of statistical inference, and introductory examples in R and SPSS. The third edition has been extensively reorganized with shorter chapters and closer links between concepts and formulas, while retaining useful pedagogical features including key terms, practice exercises, a math refresher, and playful inserts on "the mathematical imagination." The Joy of Stats also places a strong emphasis on learning how to write and speak clearly about data results. Supported by a companion website with data sets and additional resources, The Joy of Stats is a superb choice for introducing students to applied statistics and for refreshing and reviewing stats as a social scientist, public policy professional, or community activist.
The National Rifle Association (NRA) is an important actor in the American gun debate. While popular explanations for the group's influence often focus on the NRA's lobbying and campaign donations, it receives lesser attention for the mass mobilization efforts that make these political endeavours possible. On Target explores why the NRA is so influential and how we can understand the group's impact on firearms policy in the United States. The book looks at how the NRA both draws upon and shapes historical meta-narratives regarding the role of firearms in America's national identity and how this is part of a larger effort to expand the community of gun owners. Noah S. Schwartz demonstrates how the NRA portrays a vision of the past through events such as its annual meeting; communications such as American Rifleman magazine and NRA TV; and points of contact including the National Firearms Museum. Based on fieldwork in Indiana and Virginia, including participant observation at NRA events and firearm safety classes, thematic analysis of audio-visual material, and interviews with NRA executives and members, On Target sheds light on the ways in which the NRA tells stories to build and mobilize a politically motivated network of gun owners.
The Joy of Stats offers a reader-friendly introduction to applied statistics and quantitative analysis in the social sciences and public policy. Perfect as an undergraduate text or self-study manual, it emphasizes how to understand concepts, interpret algorithms and formulas, analyze data, and answer research questions. This brand new edition offers examples and visualizations using real-life data, a revised discussion of statistical inference, and introductory examples in R and SPSS. The third edition has been extensively reorganized with shorter chapters and closer links between concepts and formulas, while retaining useful pedagogical features including key terms, practice exercises, a math refresher, and playful inserts on "the mathematical imagination." The Joy of Stats also places a strong emphasis on learning how to write and speak clearly about data results. Supported by a companion website with data sets and additional resources, The Joy of Stats is a superb choice for introducing students to applied statistics and for refreshing and reviewing stats as a social scientist, public policy professional, or community activist.
There are two parts to every crime story: how they did it and why they got caught.This book is about the second part, and how it changes the way we catch serial killers. No two stories about the capture of a serial killer are the same. Sometimes, the killers make crucial mistakes; other times, investigators get lucky. And the process of profiling, hunting, and apprehending these predators has changed radically over time, particularly in the field of criminal forensics, which has exploded in the last ten to 15 years. Laser ablation, video spectral analysis, cyber-sleuthing, and even DNA-based genetic genealogy are now crucial tools in solving murders, including the recent capture of the so-called Golden State Killer. This book in the new Profiles in Crime series tells the history of forensics through the "capture stories" of some of the most notorious serial killers, going back almost a century. The killers include: Rodney Alcala, a serial rapist and murderer sometimes called "Dating Game killer" for his appearance on that TV show. No one knows the exact number of his victims. Takahiro Shiraishi, the suicide killer from Zama, Japan, who dismembered nine victims and stored their bodies in his refrigerator. Aileen Wuornos, one of the rare female serial killers. She shot seven men in Florida and was turned in by an accomplice. Jeffrey Dahmer, the "Milwaukee Cannibal," and Bobby Joe Long, both identified by survivors Ted Bundy and David Berkowitz ("Son of Sam"), who both made mistakes Ludwig Tessnow, who killed several children in Germany, and was caught through new methods in forensic investigation that could distinguish human from animal blood
Labour exploitation is a highly topical though complex issue that has international resonance for those concerned with social justice and social welfare, but there is a lack of research available about it. This book, part of the Studies in Social Harm series, is the first to look at labour exploitation from a social harm perspective, arguing that, as a global social problem, it should be located within the broader study of work-based harm. Written by an expert in policy orientated research, he critiques existing approaches to the study of workplace exploitation, abuse and forced labour. Mapping out a new sub-discipline, this innovative book aims to shift power from employers to workers to reduce levels of labour exploitation and work-based harm. It is relevant to academics from many fields as well as legislators, policy makers, politicians, employers, union officials, activists and consumers.
136,000 people in the UK are in some form of slavery. This is big business, generating more than GBP120 billion annually for criminal organisations across the world. Stolen Lives examines trafficking and slavery in Britain, hearing from those on the front line. Powerful and moving testimony from survivors reveals the individual stories behind the headlines and charts one young woman's terrifying and ultimately inspiring journey to freedom and independence. Finally, it shows us what we can do to make a difference.
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
This book discusses privatization of law enforcement in relation to suspected corporate crime and recommends guidelines for successful fraud examinations. There is a growing business for global auditing and local law firms to conduct internal investigations at client organizations when there is suspicion of white-collar misconduct and crime. This book reflects on the work by these private fraud examiners in terms of an evaluation of their investigation reports. The book brings an original theoretical and methodological approach to investigations of white-collar crime. It develops the theory of convenience as an explanation for motive, opportunity, and willingness to commit and conceal white-collar crime. This theory is then related to the case studies. Structured in such a way as to allow the reader to use the text as a nonsequential reference source or guide to a set of connected issues, the book illustrates the practice of privatization by cases and presents guidelines for successful fraud examination. As an investigation can lead to conviction and incarceration, this privatization of crime investigation feeds into the larger issue of privatization of policing. The work will be a valuable resource for students, academics, and practitioners working in the areas of Criminal Justice, Corporate Law, and Business.
Learning behind Bars is an oral history of former Irish republican prisoners in the Republic of Ireland and Northern Ireland between 1971, the year internment was introduced, and 2000, when the high-security Long Kesh Detention Centre/HM Prison Maze closed. Dieter Reinisch outlines the role of politically motivated prisoners in ending armed conflicts as well as the personal and political development of these radical activists during their imprisonment. Based on extensive life-story interviews with Irish Republican Army (IRA) ex-prisoners, the book examines how political prisoners developed their intellectual positions through the interplay of political education and resistance. It sheds light on how prisoners used this experience to initiate the debates that eventually led to acceptance of the peace process in Northern Ireland. Politically relevant and instructive, Learning behind Bars illuminates the value of education, politics, and resistance in the harshest of social environments.
Detection Avoidance in Homicides: Debates, Explanations and Responses presents theory and research on how offenders avoid detection and the challenges and opportunities these efforts pose to investigators. From a scholarly perspective, the book presents a continuing history of research on detection avoidance by offenders, discusses the features of complex death investigations involving detection avoidance, and critiques the current frameworks used for conceptualizing these behaviors. Dr. Ferguson focuses on the key debates in the literature, argues for collaborations between researchers and practitioners to remedy siloing, and explores the reality of detection avoidance in homicides as complex and multifaceted. While detection avoidance behaviors have the potential to negatively impact sudden death investigations and frustrate criminal investigations specifically, their use also creates broader problems. These include many problematic effects on family members of the deceased, police officers, police agencies and the communities they serve. Offenders choosing to use detection avoidance behaviors challenges the efficient use of public resources, puts at risk the successful adjudication of homicides, and creates a public safety issue. The book explains detection avoidance using learning, situational, individual and gender-based theories, including proposing whether it may be a form of coercive control used by intimate partner abusers. Finally, how detection avoidance by offenders is recognized and responded to in sudden death investigations is addressed, with specific reference to useful examples of policy reform implemented by various police agencies internationally. Providing research and theory to explain detection avoidance and best practice for responding to it, this book will be of great interest to students and scholars of criminology, forensic science and psychology. It will also be useful to professionals working with homicide offenders.
Enemy Of The People is the first definitive account of Zuma’s catastrophic misrule, offering eyewitness descriptions and cogent analysis of how South Africa was brought to its knees – and how a nation fought back. When Jacob Zuma took over the leadership of the ANC one muggy Polokwane evening in December 2007, he inherited a country where GDP was growing by more than 6% per annum, a party enjoying the support of two-thirds of the electorate, and a unified tripartite alliance. Today, South Africa is caught in the grip of a patronage network, the economy is floundering and the ANC is staring down the barrel of a defeat at the 2019 general elections. How did we get here? Zuma first brought to heel his party, Africa’s oldest and most revered liberation movement, subduing and isolating dissidents associated with his predecessor Thabo Mbeki. Then saw the emergence of the tenderpreneur and those attempting to capture the state, as well as a network of family, friends and business associates that has become so deeply embedded that it has, in effect, replaced many parts of government. Zuma opened up the state to industrial-scale levels of corruption, causing irreparable damage to state enterprises, institutions of democracy, and the ANC itself. But it hasn’t all gone Zuma’s way. Former allies have peeled away. A new era of activism has arisen and outspoken civil servants have stepped forward to join a cross-section of civil society and a robust media. As a divided ANC square off for the elective conference in December, where there is everything to gain or to lose, award-winning journalists Adriaan Basson and Pieter du Toit offer a brilliant and up-to-date account of the Zuma era.
Revised and expanded to reflect the most recent innovations in the field, The Scientific Examination of Documents, Fourth Edition is a handy, accessible volume detailing current best-practices for forensic document examination. Since the first edition published in 1989, there have been drastic changes in the field of forensic document examination-both from the use of the analytic techniques available to the professional examiner-and the changes to technology in office and printing equipment and inks. The purpose of analyzing any material used in the production of a questioned document, such as an ink or a piece of paper, is to compare it with another material elsewhere in the questioned document itself-or on another document-to determine whether or not they share a common origin. There may also be a need to provide information for the investigator about the possible origins of the document. This latest edition reflects the myriad changes and advances that have occurred in the last 10 to 15 years. Topics covered include: current thinking on handwriting interpretation; accidental and deliberate modification of handwriting; the proper collection of samples; a discussion of shredded documents; professional accreditation standards, qualifications, and training; and modern digital imaging and analysis of documents and handwriting utilizing software and imaging, including reconstruction of an image from erasures, obliteration and other document altering methods. A new section addresses cognitive bias and Chapter 8 is completely updated to cover the advances in print and photocopied documents, based on current technology, and analytical developments in the comparison of such documents. Key features: Discusses issues regarding handwritten, photocopied, and printed documents-including inkjet versus digital printing Presents the advances and capabilities modern office fax, photocopy, and printing technologies-and implications for document examination Details and reinforces the importance of ensuring proper scientific methods during an examination Addresses current Raman spectroscopy, UV-VIS, mass spectroscopy, and SEM analysis techniques Highlights the importance, and implications, of biological and fingerprint evidence from documents that can be collected, examined, and utilized in a case The Scientific Examination of Documents, Fourth Edition serves as an invaluable resource to established professionals, those just entering the field, and legal and investigative professionals outside the discipline who have a professional interest dealing with questioned documents in the course of their work.
In the summer of 1930, two federal prohibition agents were murdered. The first died in a hail of buckshot on a dark street in Aguilar, Colorado. Six weeks later, the second agent and his vehicle disappeared on a sunny afternoon along a New Mexico state highway south of Raton. These events occurred during the era when the government legislated a ban on alcohol manufacture, distribution, and sales within the United States. During their 50-year search, the authors sought answers to why no one was ever prosecuted for these crimes. This is the first book to correlate the two murders, identify how and why they occurred, name the parties involved and the roles they played. The authors interviewed many individuals associated with the events and discovered a trove of National Archives files containing incident reports, suspect interview notes, the dead agents' daily activity logs and their personnel files. Building upon this base, they located the remaining documents generated by state and local law enforcement officers and additionally data mined private and public contemporary newspaper collections. The shadows along the trail lift as the light of truth is shown upon this mystery. Two federal agents can now rest in peace.
The International People's Tribunal addressed the many forms of violence during the period of the massacres of 1965-1966 in Indonesia. It was held in The Hague, The Netherlands, in November 2015, to commemorate fifty years since the killings began. The Tribunal, as a people's court, holds no jurisdiction and was an attempt to achieve symbolic justice for the crimes of 1965. This book offers new and previously unpublished insights into the types of crimes committed in the 1965 genocide and how these crimes were prosecuted at the International People's Tribunal for 1965. Divided thematically, each chapter analyses a different crime - enslavement, sexual violence, torture - perpetrated during the Indonesian killings. The contributions consider either general patterns across Indonesia or a particular region of the archipelago. The book reflects on how crimes were charged at the International People's Tribunal for 1965 and focuses on questions relating to the place of people's tribunals in truth-seeking and justice claims, and the prospective for transitional justice in contemporary Indonesia. Positioning the events in Indonesia in 1965 within the broader scope of comparative genocide studies, the book is an original and timely contribution to knowledge about the dynamics of the Indonesian killings. It will be of interest to academics in the field of Asian studies, in particular Southeast Asia, Genocide Studies, Criminology and Criminal Justice and Transitional Justice Studies.
This book addresses the criminalisation of sexually explicit material depicting or describing fictitious characters who appear to be children. It is the first book of its kind to specifically examine the expansion of the law to include fictional representations of children, focusing on the law in Australia, Canada, the United Kingdom, and the United States. The author explores the potential criminalisation of comics and subgenres of manga that frequently depict childlike characters in a sexual context. Of course, the need to protect children from harm outweighs freedom of expression and the right to privacy; however, this argument is complicated by the material being purely fictional. Does prohibiting the fictional representation of minors interfere with individual freedoms? Based on a detailed socio-legal study, this book extensively analyses literature and pertinent theories of criminalisation, such as the Harm Principle, Offense Principle, and Legal Moralism. The book will be an invaluable resource for academics and students in various disciplines, including law, criminology, sociology, and psychology. It will also be of interest to fans of fantasy fiction.
Presenting an integrated approach to information exchange among law enforcement institutions within the EU, this book addresses the dilemma surrounding the need to balance the security of individuals and the need to protect their privacy and data. Providing the reader with a comprehensive analysis of information exchange tools, exploring their history, political background, the most recent legal modifications and the advantages and disadvantages of their use, it includes a comparison between different information exchange tools. Written by an author who has worked as a police officer, Home Affairs counsellor and academic, this is an important read for scholars working with EU Law, Criminal Procedure Law, and International Law as well as for practitioners who directly deal with international police cooperation or who perform criminal investigation both within and outside the EU.
Research has shown that the majority of crimes are committed by persistent or serial offenders, with as little as seven percent of offenders accounting for approximately 60 percent of all crimes. By focusing police efforts on these prolific offenders and learning to identify, analyze, and resolve the crimes they commit, the law enforcement community can protect and defend the public much more effectively. Tactical Crime Analysis: Research and Investigation provides a comprehensive discussion on both the theoretical and practical aspects of crime series analysis, making it a critical resource for those engaged in crime prevention and investigation. Appropriate for all levels Written by a distinctive team of authors, each of whom combine academic credibility, police experience, and years of analytical success, this manual is designed for the novice, the working professional, and the veteran crime analyst. It provides an introduction to the realities of tactical crime analysis, assists current analysts in further developing their professional skills, and offers advanced insight for experts. Covering all aspects of serial crime investigation, the book explores: Major problems and issues within serial crime Offender spatial behavior Linkage analysis Investigative techniques Geographic profiling Next event forecasting Supplemental materials to enhance the text This multi-faceted resource includes an interview with a serial offender, case studies of solved serial crimes, and an accompanying website with supplemental material. An important addition to the reference shelf of analytical professionals, this resource provides a revealing glimpse into the machinations of the serial offender.
Is it revenge or is it justice? DI Gravel is supposed to be on mandatory leave, but when a severed head washes up on the estuary beach his holiday is cut short. Back on the job, he's shocked when the case leads him to the victim from an old case Seventeen years ago, the system failed Rebecca. They let the abuser of a six-year-old girl walk free. But she's all grown up now and taking the law into her own hands. Is this one killer DI Gravel doesn't want to catch? This is the second book in the dark, edge-of-your-seat Carmarthen Crime thriller series set in the stunning West Wales countryside. *Previously published as Before I Met Him*
It is essential that those in the criminal justice system understand the tasks that police dogs perform and the evidence that their work produces. Police and Military Dogs: Criminal Detection, Forensic Evidence, and Judicial Admissibility examines the use of police and military dogs for a wide variety of functions and explores canine biology and behavior as it applies to police work. The book begins with an overview of the changes that have occurred in the field in the past four decades as discoveries have been made about canine capabilities. The author examines how a canine handler's work with a skilled police dog can affect the subsequent investigation and prosecution of the crime. He discusses optimal procedures for finding and processing evidence and describes the boundaries of admissibility of evidence produced by police dogs. The book examines the many diverse detection functions police dogs are being trained to perform, ranging from cadaver detection to the discovery of explosives. It also describes the use of dogs to apprehend criminals and in search and rescue operations. Written for a wide audience including canine handlers, forensic scientists, attorneys, and the judiciary, this volume covers topics pertinent to all aspects of the police dog in contemporary law enforcement.
Police interviews with suspects and witnesses provide some of the most significant evidence in criminal investigations. Frequently challenging, they require special training and skills. This interaction process is further complicated when the suspect or witness does not speak the same language as the interviewer. A professional reference that can be used in police training or in any venue where an interpreter is used, Police Investigative Interviews and Interpreting: Context, Challenges, and Strategies provides solutions for the range of interview demands found in today's multilingual environments. Topics include: What interpreting is, the skills required, and the role of interpreters in any job context Investigative interviewing in law enforcement Concerns about interpreter intervention and its impact on interview outcomes The value of word-based over meaning-based interpretation in police and legal contexts Nonlinguistic factors that can have an impact on the interpreting process The book explores the multi-faceted dynamics of conducting investigative interviews via interpreters and examines current investigative interviewing paradigms. It offers strategies to help interpreters and law enforcement officers and provides examples of interpreted interview excerpts to enable understanding. Although the subject matter and the examples in this book are largely limited to police interview settings, the underlying rationale applies to other professional areas that rely on interviews to collect information, including customs procedures, employer-employee interviews, and insurance claim investigations. This book is part of the CRC Press Advances in Police Theory and Practice Series.
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.
With the rise of surveillance technology in the last decade, police departments now have an array of sophisticated tools for tracking, monitoring, even predicting crime patterns. In particular crime mapping, a technique used by the police to monitor crime by the neighborhoods in their geographic regions, has become a regular and relied-upon feature of policing. Many claim that these technological developments played a role in the crime drop of the 1990s, and yet no study of these techniques and their relationship to everyday police work has been made available. Noted scholar Peter K. Manning spent six years observing three American police departments and two British constabularies in order to determine what effects these kinds of analytic tools have had on modern police management and practices. While modern technology allows the police to combat crime in sophisticated, detail-oriented ways, Manning discovers that police strategies and tactics have not been altogether transformed as perhaps would be expected. In The Technology of Policing, Manning untangles the varying kinds of complex crime-control rhetoric that underlie much of today's police department discussion and management, and provides valuable insight into which are the most effective and which may be harmful-in successfully tracking criminal behavior. The Technology of Policing offers a new understanding of the changing world of police departments and information technology's significant and undeniable influence on crime management.
Armed groups have played a predominant role in the violations of international humanitarian law and international human rights law committed in conflict settings. The increase in the number of non-international armed conflicts during the past decades has emphasised the need to address the multiple legal challenges posed by the actions of armed groups. In particular, there is considerable uncertainty regarding the framework of responsibility for armed groups in international law. While much has been written regarding their international (primary) obligations, the possibility of developing a responsibility framework for armed groups under international law has been underexplored. Consequently, the aim of this book is to examine how the principles of international responsibility could be developed and adjusted to account for armed groups as collective entities. This general aim has been divided into three specific objectives. First, the book analyses the concept of responsibility in international law and assesses the legal and practical reasons in favour of developing such a regime for armed groups. Second, it examines the viability of establishing a responsibility regime for armed groups based on rules of attribution. Third, it explores the possible legal consequences of responsibility applicable to armed groups, with a particular focus on the obligation to provide reparations to victims. In doing so, this book will argue that certain non-traditional sources of international law could be used to interpret and adapt international law to the current conditions of contemporary armed conflict.
For as long as we have been researching human memory, psychologists have been investigating how people remember and forget. This research is regularly drawn upon in our legal systems. Historically, we have relied upon eyewitness memory to help judge responsibility and adjudicate truth, but memory is malleable, prone to error, and susceptible to bias. Even confident eyewitnesses make mistakes, and even accurate witnesses sometimes find their testimony subjected to harsh scrutiny. Emerging from this environment, the Cognitive Interview (CI) became a means of assisting cooperative witnesses with recalling more information without sacrificing accuracy. First used by police interviewing adult witnesses, it is now used with many populations in many contexts, including public health, accident reconstruction, and the interrogation of terror suspects. Evidence-Based Investigative Interviewing reviews the application of cognitive research to investigative interviewing, revealing how principles of cognition, memory, and social dynamics may increase the accuracy of eyewitness testimony. It provides evidence-based applications for investigators beyond the forensic domain in areas such as eyewitness identification, detecting deception, and interviewing children. Drawing together the work of thirty-three authors across both the academic and practice communities, this comprehensive collection is essential reading for researchers in psychology, forensics, and disciplines such as epidemiology and gerontology.
'An absolutely fascinating read' - newsreader Emily Maitlis James Comey, former FBI Director and Sunday Times number one bestselling author of A Higher Loyalty, uses his long career in federal law enforcement to explore issues of justice and fairness in the US justice system. James Comey might best be known as the FBI director who Donald Trump fired in 2017, but he's had a long, varied career in the law and justice system. He knows better than most just what a force for good the US justice system can be, and how far afield it strayed during the Trump presidency. In his much-anticipated follow-up to A Higher Loyalty, Comey uses anecdotes and lessons from his career to show how the federal justice system works. From prosecuting mobsters as an assistant US attorney in the Southern District of New York in the 1980s to grappling with the legalities of anti-terrorism work as the deputy attorney general in the early 2000s to, of course, his tumultuous stint as FBI director beginning in 2013, Comey shows just how essential it is to pursue the primacy of truth for federal law enforcement. Saving Justice is gracefully written and honestly told, a clarion call for a return to fairness and equity in the law. |
![]() ![]() You may like...
Adolescent Substance Abuse - An…
John S Wodarski, Marvin D Feit
Hardcover
R3,294
Discovery Miles 32 940
A.J. Meerwald and New Jersey's Oyster…
Rachel Rodgers Dolhanczyk Ma, Constance McCart Ed D
Hardcover
R719
Discovery Miles 7 190
Metrological Infrastructure
Beat Jeckelmann, Robert Edelmaier
Hardcover
R4,191
Discovery Miles 41 910
|