![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
The Stasi were among the most successful security and intelligence services of the Cold War. Behind the Berlin Wall, colleagues, friends, husbands and wives, informed on each other. Stasi chief, General Mielke, prided himself on this situation. Under Marcus Wolf, Stasi agents were spectacularly successful in gaining entry into the West German Establishment and NATO. Some remain undiscovered. In this book two British experts reveal how the Stasi operated. Based on a wealth of sources, including interviews with former Stasi officers and their victims, the book tells a story of unbridled power, misguided idealism, treachery, widespread opportunism and lonely courage.
Known as "the Great War," the world's first truly global conflict is remarkable in what might now be termed modern espionage. World War I was witness to plenty of "firsts." Apart from the contribution made by aerial reconnaissance and the interception of wireless telegraphy, telephone and cable traffic, there was the scientific aspect, with new machines of war, such as the submarine, sea-mine, torpedo, airship, barbed wire, armored tank and mechanized cavalry in a military environment that included mustard gas, static trench warfare, the indiscriminate bombardment of civilian population centers and air-raids. Large-scale sabotage and propaganda, the manipulation of news and of radio broadcasts, and censorship, were all features of a new method of engaging in combat, and some ingenious techniques were developed to exploit the movement of motor and rail transport, and the transmission of wireless signals. The hitherto unknown disciplines of train-watching, bridge-watching, airborne reconnaissance and radio interception would become established as routine collection methods, and their impact on the conflict would prove to be profound. The Historical Dictionary of World War I Intelligence relates this history through a chronology, an introductory essay, an appendix, and an extensive bibliography. The dictionary section has over 400 hundred cross-referenced entries on intelligence organizations, the spies, and the major cases and events of World War I. This book is an excellent access point for students, researchers, and anyone wanting to know more about the world of intelligence in World War I.
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
This is a first-hand report by a top German intelligence agent sent to the still-neutral United States in World War I. Official German records, captured by British and American forces at the end of World War II, show the memoirs of the German naval officer to be accurate. Rintelen's orders in Berlin had called for measures to prevent the shipment of American war material to Germany's enemies. In the US, this meant buying arms to keep them from being purchased by the Allies, but it could also mean placing bombs in the hulls of ships sailing for Eurpoe and fomenting strikes among the labour force of American ammunition manufacturers.
Even paranoids have enemies. Hitler's most powerful foes were the Allied powers, but he also feared internal conspiracies bent on overthrowing his malevolent regime. In fact, there was a small but significant internal resistance to the Nazi regime, and it did receive help from the outside world. Through recently declassified intelligence documents, this book reveals for the first time the complete story of America's wartime knowledge about, encouragement of, and secret collaboration with the German resistance to Hitler?including the famous July 20th plot to assassinate the Fuehrer.The U.S. government's secret contacts with the anti-Nazi resistance were conducted by the OSS, the World War II predecessor to the CIA. Highly sensitive intelligence reports recently released by the CIA make it evident that the U.S. government had vast knowledge of what was going on inside the Third Reich. For example, a capitulation offer to the western Allies under consideration by Count von Moltke in 1943 was thoroughly discussed within the U.S. government. And Allen Dulles, who was later to become head of the CIA, was well informed about the legendary plot of July 20th. In fact, these secret reports from inside Germany provide a well-rounded picture of German society, revealing the pro- or anti-Nazi attitudes of different social groups (workers, churches, the military, etc.). The newly released documents also show that scholars in the OSS, many of them recruited from ivy-league universities, looked for anti-Nazi movements and leaders to help create a democratic Germany after the war.Such intelligence gathering was a major task of the OSS. However, OSS director ?Wild Bill? Donovan and others favored subversive operations, spreading disinformation, and issuing propaganda. Unorthodox and often dangerous schemes were developed, including bogus ?resistance newspapers,? anti-Nazi letters and postcards distributed through the German postal service, sabotage, and fake radio broadcasts from ?German generals? calling for uprisings against the regime.This is much more than a documentary collection. Explanatory footnotes supply a wealth of background information for the reader, and a comprehensive introduction puts the documents into their wider historical perspective. Arranged in chronological order, these intelligence reports provide a fascinating new perspective on the story of the German resistance to Hitler and reveal an intriguing and previously unexplored aspect of America's war with Hitler.
This book looks at political corruption in Latin American and Europe from both an historical and a contemporary angle. The approach is therefore comparative and interdisciplinary, bringing together scholars from history, political science, anthropology, sociology and economics. In addition to general essays, this book includes chapters analysing political corruption in individual countries: Italy, Spain, France, Great Britain, Chile, Brazil, Venezuela, Paraguay and Mexico.
Gwen Terasaki's Bridge to the Sun, an idealized memoir of her marriage in the 1930s and 1940s to a Japanese diplomat, Terasaki Hidenari, is still widely read as an inspiring tale of a 'bridge' between two cultures that waged savage war against each other from 1941 to 1945. However, neither this memoir nor charges that Terasaki was a master spy and a double agent are the whole historical truth. In Terasaki Hidenari, Pearl Harbor, and Occupied Japan, Roger B. Jeans reassesses Terasaki Hidenari's story, using the FBI's voluminous dossier on Terasaki, decoded Japanese Foreign Ministry cables (MAGIC), and the papers of an isolationist, a pacifist, and an FBI agent and chief investigator at the Tokyo war crimes trial. Jeans reveals that far from being simply a saint or villain, Terasaki, despite his opposition to an American-Japanese war, served as a Foreign Ministry intelligence officer, propaganda chief, and liaison with American isolationists and pacifists in 1941, while using all means to protect Hirohito during the postwar occupation.
The Man Who Rode the Tiger is the dramatic story of the biggest investigation of political corruption in American municipal history. The "Seabury Investigation" became a model for federal, state, and city investigations of major officeholders and minor rascals. Samuel Seabury was a patrician New Yorker who was called upon to ride the Tammany Tiger, longtime symbol of crooked politics and influence-peddling. Seabury and his staff of tough young lawyers toppled Mayor Jimmy Walker - the popular Beau James; struck a near-death blow to Tammany Hall; were directly responsible for selecting and electing Fiorello H. LaGuardia as the most popular Mayor in New York history; and helped Governor Franklin D. Roosevelt in his campaign for the presidency of the United States. The final confrontation between Judge Seabury and Jimmy Walker was before Governor Roosevelt in Albany. FDR surprised those who thought he was a lightweight - and Tammany instrument - by handling himself beautifully, disengaging himself from Tammany's grip, and gaining national attention.
In September 1940 a beautiful young woman arrived by seaplane and rubber dinghy on the shores of Scotland accompanied by two men - one of Germany's many attempt to penetrate British defences and infiltrate spies into the UK. This seems to be one of the few established facts in the otherwise mysterious tale of Vera Eriksen. Even the origins of the woman described as 'the most beautiful spy' remain hazy, as does her ultimate fate. David Tremain delves into the archives, and in doing so begins to reveal glimpses of her fascinating life story: her career as a dancer in Paris; a tumultuous and violent dalliance with a White Russian officer of uncertain identity; her time in England with the Duchesse de Chateau-Thierry, an Abwehr agent; the suspicious and untimely death of her husband, and a rumoured pregnancy. The Beautiful Spy also grapples with perhaps the biggest mystery of all: what happened to Vera after she was released by the British?
To what extent do cyberspace operations increase the risks of escalation between nation-state rivals? Scholars and practitioners have been concerned about cyber escalation for decades, but the question remains hotly debated. The issue is increasingly important for international politics as more states develop and employ offensive cyber capabilities, and as the international system is increasingly characterized by emergent multipolarity. In Escalation Dynamics in Cyberspace, Erica D. Lonergan and Shawn W. Lonergan tackle this question head-on, presenting a comprehensive theory that explains the conditions under which cyber operations may lead to escalation. In doing so, they challenge long-held assumptions about strategic interactions in cyberspace, arguing that cyberspace is not as dangerous as the conventional wisdom might suggest. In some cases, cyber operations could even facilitate the de-escalation of international crises. To support their claims, Lonergan and Lonergan test their theory against a range of in-depth case studies, including strategic interactions between the United States and key rivals; a series of case studies of the role of cyber operations in international crises; and plausible future scenarios involving cyber operations during conflict. They then apply their analytical insights to policymaking, making the case that skepticism is warranted about the overall efficacy of employing cyber power for strategic ends. By exploring the role of cyber operations in routine competition, crises, and warfighting, Escalation Dynamics in Cyberspace presents nuanced insights about how cyberspace affects international politics.
Security intelligence continues to be of central importance to the contemporary world: individuals, organizations and states all seek timely and actionable intelligence in order to increase their sense of security. But what exactly is intelligence? Who seeks to develop it and to what ends? How can we ensure that intelligence is not abused? In this third edition of their classic text, Peter Gill and Mark Phythian set out a comprehensive framework for the study of intelligence, discussing how states organize the collection and analysis of information in order to produce intelligence, how it is acted upon, why it may fail and how the process should be governed in order to uphold democratic rights. Fully revised and updated throughout, the book covers recent developments, including the impact of the Snowden leaks on the role of intelligence agencies in Internet and social media surveillance and in defensive and offensive cyber operations, and the legal and political arrangements for democratic control. The role of intelligence as part of 'hybrid' warfare in the case of Russia and Ukraine is also explored, and the problems facing intelligence in the realm of counterterrorism is considered in the context of the recent wave of attacks in Western Europe. Intelligence in an Insecure World is an authoritative and accessible guide to a rapidly expanding area of inquiry - one that everyone has an interest in understanding.
This book reveals the development, strategy and extraordinary success of Britains secret services in Francos Spain during the Second World War. The main claim of this study is that British pressure, exercised above all through their intelligence services, led Franco to distance himself from the Axis cause and eventually embrace that of the Allies. Starting from a virtually non-existent base, the British rapidly built up a complex intelligence network in Spain that stretched from Corunna to Barcelona and from Bilbao to Gibraltar. As Spain was a non-belligerent, spy networks including those of the Germans, Italians, Portuguese and British proliferated in the Iberian Peninsula. Double-agents abounded within these networks; each one knew what the others were up to. The British exploited this two-way traffic to let Franco know that if he did not accede to their demands, they would back a restoration of the Bourbon monarchy under Don Juan. This pressure culminated in the meeting of 1943 between Franco and the British Ambassador, Sir Samuel Hoare, at the dictators country retreat in Galicia, the British underlining their purpose by flying warplanes close by the estate. Following this meeting, Franco almost immediately began to move away from the Axis powers and towards the Allies. The British swiftly dismantled their intelligence networks given that they had achieved their aim. Francos expulsion of the German naval forces from Spanish ports and the denazification of the regime explains the benevolent attitude of the Allies towards the Spanish dictatorship after the war. Throughout this whole process, the British secret service, as this extensively researched study uncovers, played a crucial role.
The explosive new book from ex-MI5 surveillance officer Tom Marcus takes the reader on a non-stop, adrenalin-fuelled ride as he hunts down those who would do our country harm. Tom spent years working covertly to stop those who want to do us harm. In his bestselling memoir Soldier Spy, he told how he was recruited and described some of his top-secret operations. In his new book, he takes us deeper undercover as he puts his life on the line once more. I Spy plunges the reader straight into the action as Tom and his team race to prevent terrorists from causing carnage on our streets and outsmart Russian agents, blocking a daring plot that threatens the security of the nation. Relying on their quick wits, training and courage, the extraordinary men and women of MI5 are under intense pressure every day. Not everyone is suited for the work, and Tom shows how the incredibly tough challenges he faced growing up gave him the mental strength and skills to survive in a dangerous world. Gritty and eye-opening, this is a unique insight into a hidden war and the sacrifices made by those who fight it. You will never take your safety for granted again.
Andrew W. Neal argues that while 'security' was once an anti-political 'exception' in liberal democracies - a black box of secret intelligence and military decision-making at the dark heart of the state - it has now become normalised in professional political life. This represents a direct challenge to critical security studies debates and their core assumption that security is a kind of illiberal and undemocratic 'anti-politics'. Using archival research and interviews with politicians, Neal investigates security politics from the 1980s to the present day to show how its meaning and practice have changed over time. In doing so, he develops an original reassessment of the security/politics relationship.
In 2013, former U.S. National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking their movements and transactions with public and private institutions. The state is becoming like a one-way mirror, where it can see more of what its citizens do and say, while citizens see less and less of what the state does, owing to high levels of secrecy around surveillance. In this book, Jane Duncan assesses the relevance of Snowden’s revelations for South Africa. In doing so she questions the extent to which South Africa is becoming a surveillance society governed by a surveillance state. Duncan challenges members of civil society to be concerned about and to act on the ever-expanding surveillance capacities of the South African state. Is surveillance used for the democratic purpose of making people safer, or is it being used for the repressive purpose of social control, especially of those considered to be politically threatening to ruling interests? She explores the forms of collective action needed to ensure that unaccountable surveillance does not take place and examines what does and does not work when it comes to developing organised responses. This book is aimed at South African citizens, academics as well as the general reader, who care about our democracy and the direction it is taking.
James Lockhart blends Chilean, inter-American and transatlantic national, regional and world-historical trends into a century-long Cold War narrative. He argues that Chileans made their own history as highly engaged internationalists while reassessing American and other foreign-directed intelligence, surveillance and secret warfare operations in Chile and southern South America. The book transcends a well-known, US-centred historiography while offering a more equitable and global interpretation of Chile's Cold War experience than previously possible. This advances research that has progressively expanded the framework of Chile's Cold War experience since the arrest of General Augusto Pinochet in the UK for human rights violations more than 20 years ago.
By shifting American security policy away from maximizing military power for the United States and toward maximizing human security for all, policymakers and citizens can also maximize national security for the United States and sustainable peace for the world. Why do war and political violence persist? Political realists argue that violent conflict and the struggle for power are inherent in the international system, and there is little we can do but manage it. However, as Robert Johansen argues in this path-breaking work, there are other ways forward. In Where the Evidence Leads, Johansen develops an "empirical realist" theory to enable the United Sates to respond more effectively to rising security threats. Together, peace research and security studies show that more security benefits are likely to result from maximizing the "causes" or correlates of peace than from maximizing military power. Ironically, a global grand strategy for human security, with national security folded into it, is likely to produce more security for the United States than a national security strategy. Peace reigns when states implement peace correlates, which range from addressing all nations' security fears to making life more predictable through better global governance. This approach, respectful of forgotten insights from Hans Morgenthau and others, revolutionizes thinking about national security policy by bringing it into a human security framework. The analysis shows that the anarchic, militarized balance-of-power system can be gradually changed with help from enhanced lawmaking, enforcement, and governance capacities. This thought-provoking book builds bridges between past policies-many of which have failed-and more deft ways of handling new realities that focus on building peace. In a world of threats, this book opens doors onto a future of sustainable peace, security, and hope.
In this ambitious work a leading scholar undertakes a full-scale reconceptualization of international relations. Turbulence in World Politics is an entirely new formulation that accounts for the persistent turmoil of today's world, even as it also probes the impact of the microelectronic revolution, the postindustrial order, and the many other fundamental political, economic, and social changes under way since World War II. To develop this formulation, James N. Rosenau digs deep into the workings of communities and the orientations of individuals that culminate in collective action on the world stage. His concern is less with questions of epistemology and methodology and more with the development of a comprehensive theoryone that is different from other paradigms in the field by virtue of its focus on the tumult in contemporary international relations. The book depicts a bifurcation of global politics in which an autonomous multi-centric world has emerged as a competitor of the long established state-centric world. A central theme is that the analytic skills of people everywhere are expanding and thereby altering the context in which international processes unfold. Rosenau shows how the macro structures of global politics have undergone transformations linked to those at the micro level: long-standing structures of authority weaken, collectivities fragment, subgroups become more powerful at the expense of states and governments, national loyalties are redirected, and new issues crowd onto the global agenda. These turbulent dynamics foster the simultaneous centralizing and decentralizing tendencies that are now bifurcating global structures. "Rosenau's new work is an imaginative leap into world politics in the twenty-first century. There is much here to challenge traditional thought of every persuasion." --Michael Brecher, McGill University
As increasingly contentious politics in the United States raise concerns over the "politicization" of traditionally non-partisan institutions, many have turned their attention to how the American military has been-and will be-affected by this trend. Since a low point following the end of the Vietnam War, the U.S. military has experienced a dramatic reversal of public opinion, becoming one of the most trusted institutions in American society. However, this trend is more complicated than it appears: just as individuals have become fonder of their military, they have also become increasingly polarized from one another along partisan lines. The result is a new political environment rife with challenges to traditional civil-military norms. In a data-driven analysis of contemporary American attitudes, Dangerous Instrument examines the current state of U.S. civil-military affairs, probing how the public views their military and the effect that partisan tribalism may have on that relationship in the future. Michael A. Robinson studies the sources and potential limits of American trust in the armed services, focusing on the interplay of the public, political parties, media outlets, and the military itself on the prospect of politicization and its associated challenges. As democratic institutions face persistent pressure worldwide, Dangerous Instrument provides important insights into the contemporary arc of American civil-military affairs and delivers recommendations on ways to preserve a non-partisan military.
Intelligence and Espionage: Secrets and Spies provides a global introduction to the role of intelligence - a key, but sometimes controversial, aspect of ensuring national security. Separating fact from fiction, the book draws on past examples to explore the use and misuse of intelligence, examine why failures take place and address important ethical issues over its use. Divided into two parts, the book adopts a thematic approach to the topic, guiding the reader through the collection and analysis of information and its use by policymakers, before looking at intelligence sharing. Lomas and Murphy also explore the important associated activities of counterintelligence and the use of covert action, to influence foreign countries and individuals. Topics covered include human and signals intelligence, the Cuban Missile Crisis, intelligence and Stalin, Trump and the US intelligence community, and the Soviet Bloc. This analysis is supplemented by a comprehensive documents section, containing newly released documents, including material from Edward Snowden's leaks of classified material. Supported by images, a comprehensive chronology, glossary, and 'who's who' of key figures, Intelligence and Espionage is an invaluable resource for anyone interested in the role of intelligence in policymaking, international relations and diplomacy, warfighting and politics to the present day.
'The minister's nephew recounts an extraordinary life . . . a vivid account' HENRY DE QUETTEVILLE, Telegraph 'Completely absorbing and told with huge compassion, integrity and skill' CAROL ANN LEE, author of The Murders at White House Farm and A Passion For Poison 'What a book. I didn't have to turn the pages. They turned themselves I literally consumed the book in just a few hungry sittings . . . Julian Hayes is perfectly placed to tell this story, particularly it's captivating human side . . . most definitely a must read' DR SALEYHA AHSAN, filmmaker and journalist, Cambridge The shocking story behind the TV drama Stonehouse In November 1974, British MP and former cabinet minister John Stonehouse walked into the sea off a beach in Miami and disappeared, seemingly drowned. Then he was found - on the other side of the world, in Australia - and his extraordinary story began to come to light: a Labour cabinet minister and a devoted family man; also in a long-term affair with his secretary, and a spy for the Czech State Security agency, who had committed fraud and attempted to fake his own death to escape catastrophic business failures. Was it a mental breakdown as he later claimed? Or were there more sinister reasons for his dramatic disappearance? This is the definitive biography of Stonehouse, written by Julian Hayes, who, as the son of Stonehouse's nephew and lawyer, Michael Hayes, is uniquely placed to tell the story of this charismatic but deeply flawed politician. As a criminal lawyer in London, Hayes has used his in-depth knowledge and experience of the criminal courts, not least the Old Bailey, where the Stonehouse trial took place, to forensically examine Stonehouse's story, including Czech defector Josef Frolik's claim that he was a spy. Hayes has unearthed secret reports in the archives in Prague written by Stonehouse's former spymasters. He has also gleaned much from family members and lawyers involved in the trial and from the trial documents and other government papers held in archives in the UK and Australia.
Late in his life, former president Lyndon B. Johnson told a reporter that he didn't believe the Warren Commission's finding that Lee Harvey Oswald acted alone in killing President John F. Kennedy. Johnson thought Cuban president Fidel Castro was behind it. After all, Johnson said, Kennedy was running "a damned Murder, Inc., in the Caribbean," giving Castro reason to retaliate. Murder, Inc., tells the story of the CIA's assassination operations under Kennedy up to his own assassination and beyond. James H. Johnston was a lawyer for the Senate Intelligence Committee in 1975, which investigated and first reported on the Castro assassination plots and their relation to Kennedy's murder. Johnston examines how the CIA steered the Warren Commission and later investigations away from connecting its own assassination operations to Kennedy's murder. He also looks at the effect this strategy had on the Warren Commission's conclusions that assassin Lee Harvey Oswald acted alone and that there was no foreign conspiracy. Sourced from in-depth research into the "secret files" declassified by the JFK Records Act and now stored in the National Archives and Records Administration, Murder, Inc. is the first book to narrate in detail the CIA's plots against Castro and to delve into the question of why retaliation by Castro against Kennedy was not investigated.
An overarching exploration of the Indian state's approaches, laws, and organizations that maintain order and contain violence. Maintaining order and containing violence-the core constituents of internal security-are fundamental responsibilities of any government. Yet, developing countries find this task especially challenging. In Internal Security in India, Amit Ahuja, Devesh Kapur, and a cast of leading scholars on the subject focus on India's security and the threats it faces. Since Independence, the Indian state has grappled with a variety of internal security challenges, including insurgencies, terrorist attacks, caste and communal violence, riots, and electoral violence. Their toll has claimed more lives than all of India's five external wars put together. As the contributors in this volume analyze how the Indian State has managed the core concern of internal security over time, they address three broad questions: How well has India contained violence and preserved order? How have the approaches and capacity of the State evolved to attain these twin objectives? And what implications do the State's approach towards internal security have for civil liberties and the quality of democracy? A major reinterpretation of order and internal security in India, this book sheds light on an underanalyzed issue of global import given the changing nature of threats that states face.
Find the truth; risk everything. A gripping WWII spy novel full of intrigue and peril from a modern master.1942: A German spy comes ashore on a desolate stretch of Lincolnshire beach. But he is hunted down by a young detective, Richard Prince. The secret services have need of a man like him... In occupied Europe, Denmark is a hotbed of problems for British intelligence. Rumours of a war-ending weapon being developed by the Germans are rife. Sent to Copenhagen, Prince is soon caught in a deadly game of cat and mouse. Dodging Gestapo agents, SS muscle and the danger of betrayal, his survival - and the war effort - hangs in the balance. Gripping and intense, Prince of Spies is the first in a new espionage series that will delight fans of Alan Furst, Philip Kerr and John le Carre. |
![]() ![]() You may like...
Understanding GPS - Principles and…
Elliott Kaplan, Christopher Hegarty
Hardcover
R4,513
Discovery Miles 45 130
Housing: The Essential Foundations - The…
Paul Balchin, Maureen Rhoden
Paperback
R2,052
Discovery Miles 20 520
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, …
Paperback
Algebraic Monoids, Group Embeddings, and…
Mahir Can, Zhenheng Li, …
Hardcover
R3,738
Discovery Miles 37 380
China Satellite Navigation Conference…
Jiadong Sun, Jingnan Liu, …
Hardcover
R5,724
Discovery Miles 57 240
China Satellite Navigation Conference…
Jiadong Sun, Jingnan Liu, …
Hardcover
R5,716
Discovery Miles 57 160
|