0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (134)
  • R250 - R500 (490)
  • R500+ (1,444)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Smart Contracts and Comparative Law - A Western Perspective (Hardcover, 1st ed. 2021): Andrea Stazi Smart Contracts and Comparative Law - A Western Perspective (Hardcover, 1st ed. 2021)
Andrea Stazi
R3,324 Discovery Miles 33 240 Ships in 18 - 22 working days

The book analyzes the most relevant developments in the relation between contracts and technology, from automatically concluded contracts to today's revolutionary "smart contracts" developed through blockchain, which are beginning to and will increasingly disrupt many economic and social relations. First of all, the author offers a broad analysis of the peculiarities and evolution of the relation between contracts and technology. The main features and elements of electronic contracts are then examined in depth to highlight the specific rules applicable to them in the international comparative legal framework. In turn, the book provides a detailed explanation of the technology, economic and social dynamics, and legal issues concerning blockchain and smart contracts. The analysis focuses on the question of the legal nature of smart contracts, the issues posed by their development and the first legal solutions adopted in some countries. The comparative approach pursued makes it possible to focus attention on the first solutions adopted until now in various systems, with particular regard to the circulation of models and ideas and to the specificities of their local variations, in terms of e.g. applicable law and jurisdiction. In reviewing the characteristics of distributed ledger technologies, and in particular of the blockchain technology on which smart contracts are based, above all the peculiarities of the latter are taken into consideration, especially automatic execution and resistance to tampering, which simultaneously present significant opportunities and complex legal issues. A comprehensive framework is then provided to reconcile smart contracts with comparative contract law, in order to define the scope and specificities of their binding force, legal effectiveness and regulation in various legal systems. Lastly, with specific reference to the elements, pathologies and contractual remedies for smart contracts, the book examines the peculiarities of their application and the main issues that emerge in comparative contract law in order to promote their harmonized use, in keeping with the transnational nature of such a revolutionary tool.

Countering the Cloud - Thinking With and Against Data Infrastructures (Hardcover): Luke Munn Countering the Cloud - Thinking With and Against Data Infrastructures (Hardcover)
Luke Munn
R1,460 Discovery Miles 14 600 Ships in 10 - 15 working days

How do cables and data centers think? This book investigates how information infrastructures enact particular forms of knowledge. It juxtaposes the pervasive logics of speed, efficiency, and resilience with more communal and ecological ways of thinking and being, turning technical "solutions" back into open questions about what society wants and what infrastructures should do. Moving from data centers in Hong Kong to undersea cables in Singapore and server clusters in China, Munn combines rich empirical material with insights drawn from media and cultural studies, sociology, and philosophy. This critical analysis stresses that infrastructures are not just technical but deeply epistemological, privileging some actions and actors while sidelining others. This innovative exploration of the values and visions at the heart of our technologies will interest students, scholars, and researchers in the areas of communication studies, digital media, technology studies, sociology, philosophy of technology, information studies, and geography.

Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback): Andrew Jenkinson Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback)
Andrew Jenkinson
R898 Discovery Miles 8 980 Ships in 10 - 15 working days

- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.

Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover): Edward M. Rafalski, Ross M. Mullner Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover)
Edward M. Rafalski, Ross M. Mullner
R3,232 Discovery Miles 32 320 Ships in 10 - 15 working days

The first COVID-19 case in the US was reported on January 20, 2020. As the first cases were being reported in the US, Washington State became a reliable source not just for hospital bed demand based on incidence and community spread but also for modeling the impact of skilled nursing facilities and assisted living facilities on hospital bed demand. Various hospital bed demand modeling efforts began in earnest across the United States in university settings, private consulting and health systems. Nationally, the University of Washington Institute of Health Metrics and Evaluation seemed to gain a footing and was adopted as a source for many states for its ability to predict the epidemiological curve by state, including the peak. This book therefore addresses a compelling need for documenting what has been learned by the academic and professional healthcare communities in healthcare analytics and disaster preparedness to this point in the pandemic. What is clear, at least from the US perspective, is that the healthcare system was unprepared and uncoordinated from an analytics perspective. Learning from this experience will only better prepare all healthcare systems and leaders for future crisis. Both prospectively, from a modeling perspective and retrospectively from a root cause analysis perspective, analytics provide clarity and help explain causation and data relationships. A more structured approach to teaching healthcare analytics to students, using the pandemic and the rich dataset that has been developed, provides a ready-made case study from which to learn and inform disaster planning and preparedness. The pandemic has strained the healthcare and public health systems. Researchers and practitioners must learn from this crisis to better prepare our processes for future pandemics, at minimum. Finally, government officials and policy makers can use this data to decide how best to assist the healthcare and public health systems in crisis.

Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback): Nikki. Robinson Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback)
Nikki. Robinson
R1,069 Discovery Miles 10 690 Ships in 10 - 15 working days

1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed

A New Framework for Intermediary Liability - Copyright, Causation and Control on the Internet (Hardcover): Kylie Pappalardo A New Framework for Intermediary Liability - Copyright, Causation and Control on the Internet (Hardcover)
Kylie Pappalardo
R3,175 Discovery Miles 31 750 Ships in 10 - 15 working days

A New Framework for Intermediary Liability presents a step-by-step framework for determining when internet intermediaries ought to have a duty to act to prevent copyright infringement on their platforms and services. This timely book argues that intermediary liability for copyright infringement should be focused on an intermediary's actual responsibility for primary infringement and not simply its capacity to assist copyright owners in challenging infringement. Drawing on long-standing principles in the law of negligence, Kylie Pappalardo argues for a brand-new way to understand intermediary copyright liability and offers a means to distinguish innocent and responsible intermediaries at an early stage. Pappalardo reasons that a duty to act should only arise where the intermediary has causally contributed to the risk of infringement or where they have real and actual control over the actions of primary infringers. With astute consideration of the links between tort law and copyright, this book will be a compelling read for copyright scholars and researchers interested in intellectual property and technology law. Judges, lawyers and policymakers looking for guidance on how to define intermediary liability for copyright infringement will also find helpful direction in this book.

Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover): Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram... Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover)
Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram Janghel
R3,368 Discovery Miles 33 680 Ships in 10 - 15 working days

This book presents soft computing techniques and applications used in healthcare systems, along with the latest advancements. Written as a guide for assessing the roles that these techniques play, the book also highlights implementation strategies, lists problem-solving solutions, and paves the way for future research endeavors in smart and next-generation healthcare systems. This book provides applications of soft computing techniques related to healthcare systems and can be used as a reference guide for assessing the roles that various techniques, such as machine learning, fuzzy logic, and statical mathematics, play in the advancements of smart healthcare systems. The book presents the basics as well as the advanced concepts to help beginners, as well as industry professionals, get up to speed on the latest developments in healthcare systems. The book examines descriptive, predictive, and social network techniques and discusses analytical tools and the important role they play in finding solutions to problems in healthcare systems. A framework of robust and novel healthcare techniques is highlighted, as well as implementation strategies and a setup for future research endeavors. Healthcare Systems Using Soft Computing Techniques is a valuable resource for researchers and postgraduate students in healthcare systems engineering, computer science, information technology, and applied mathematics. The book introduces beginners to-and at the same time brings industry professionals up to speed with-the important role soft computing techniques play in smart healthcare systems.

Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover): Tan Yigitcanlar, Nayomi Kankanamge Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover)
Tan Yigitcanlar, Nayomi Kankanamge
R2,959 Discovery Miles 29 590 Ships in 10 - 15 working days

The use of data science and urban analytics has become a defining feature of smart cities. This timely book is a clear guide to the use of social media data for urban analytics. The book presents the foundations of urban analytics with social media data, along with real-world applications and insights on the platforms we use today. It looks at social media analytics platforms, cyberphysical data analytics platforms, crowd detection platforms, City-as-a-Platform, and city-as-a-sensor for platform urbanism. The book provides examples to illustrate how we apply and analyse social media data to determine disaster severity, assist authorities with pandemic policy, and capture public perception of smart cities. This will be a useful reference for those involved with and researching social, data, and urban analytics and informatics.

Real World AI Ethics for Data Scientists - Practical Case Studies (Paperback): Nachshon (Sean) Goltz, Tracey Dowdeswell Real World AI Ethics for Data Scientists - Practical Case Studies (Paperback)
Nachshon (Sean) Goltz, Tracey Dowdeswell
R1,285 Discovery Miles 12 850 Ships in 10 - 15 working days

Designed to offer an accessible set of case studies and analyses of ethical dilemmas in data science. This book will be suitable for technical readers in data science who want to understand diverse ethical approaches to AI.

Information System Audit - How to Control the Digital Disruption (Hardcover): Philippe Peret Information System Audit - How to Control the Digital Disruption (Hardcover)
Philippe Peret
R1,729 Discovery Miles 17 290 Ships in 10 - 15 working days

* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.

Legal Analytics - The Future of Analytics in Law (Hardcover): Namita Singh Malik, Smita Gupta, Balamurugan Balusamy, Elizaveta... Legal Analytics - The Future of Analytics in Law (Hardcover)
Namita Singh Malik, Smita Gupta, Balamurugan Balusamy, Elizaveta A Gromova
R3,939 Discovery Miles 39 390 Ships in 10 - 15 working days

Legal Analytics: The Future of Analytics in Law navigates the crisscrossing of intelligent technology and the legal field in building up a new landscape of transformation. Legal automation navigation is multidimensional, wherein it intends to construct streamline communication, approval, and management of legal tasks. The evolving environment of technology has emphasized the need for better automation in the legal field from time to time, although legal scholars took long to embrace information revolution of the legal field. * Describes the historical development of law and automation. * Analyzes the challenges and opportunities in law and automation. * Studies the current research and development in the convergence of law, artificial intelligence, and legal analytics. * Explores the recent emerging trends and technologies that are used by various legal systems globally for crime prediction and prevention. * Examines the applicability of legal analytics in forensic investigation. * Investigates the impact of legal analytics tools and techniques in judicial decision making. * Analyzes deep learning techniques and their scope in accelerating legal analytics in developed and developing countries. * Provides an in-depth analysis of implementation, challenges, and issues in society related to legal analytics. This book is primarily aimed at graduates and postgraduates in law and technology, computer science, and information technology. Legal practitioners and academicians will also find this book helpful.

The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Paperback): Shaun Aghili The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Paperback)
Shaun Aghili
R1,140 Discovery Miles 11 400 Ships in 10 - 15 working days

Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues

Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Hardcover): Andrew Jenkinson Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Hardcover)
Andrew Jenkinson
R3,083 Discovery Miles 30 830 Ships in 10 - 15 working days

- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.

Losing the Cybersecurity War - And What We Can Do to Stop It (Paperback): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Paperback)
Steve King; Edited by Kiren Chaudry
R922 Discovery Miles 9 220 Ships in 10 - 15 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover)
Steve King; Edited by Kiren Chaudry
R3,079 Discovery Miles 30 790 Ships in 10 - 15 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

Ransomware and Cybercrime (Hardcover): Andrew Jenkinson Ransomware and Cybercrime (Hardcover)
Andrew Jenkinson
R3,216 Discovery Miles 32 160 Ships in 10 - 15 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition)
Nick Catrantzos
R1,745 Discovery Miles 17 450 Ships in 10 - 15 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Social Media Marketing 2021 - The Ultimate Mastery to use the secrets of digital Business and become an Influencer This book... Social Media Marketing 2021 - The Ultimate Mastery to use the secrets of digital Business and become an Influencer This book includes Instagram, YouTube, Twitter, and Facebook Marketing 2021 (Hardcover)
Andrew Proctor
R966 R845 Discovery Miles 8 450 Save R121 (13%) Ships in 18 - 22 working days
Cryptography (Hardcover): William Buchanan Cryptography (Hardcover)
William Buchanan
R1,988 Discovery Miles 19 880 Ships in 9 - 17 working days

Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including: - full provision of Web-based material on almost every topic covered - provision of additional on-line material, such as videos, source code, and labs - coverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs) Key areas covered include: - Fundamentals of Encryption - Public Key Encryption - Symmetric Key Encryption - Hashing Methods - Key Exchange Methods - Digital Certificates and Authentication - Tunneling - Crypto Cracking - Light-weight Cryptography - Blockchain - Zero-knowledge Proofs This book provides extensive support through the associated website of: http://asecuritysite.com/encryption

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,502 Discovery Miles 35 020 Ships in 10 - 15 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

The Evolution of Global Internet Governance - Principles and Policies in the Making (Hardcover, 2014 ed.): Roxana Radu,... The Evolution of Global Internet Governance - Principles and Policies in the Making (Hardcover, 2014 ed.)
Roxana Radu, Jean-Marie Chenou, Rolf H. Weber
R3,885 R3,354 Discovery Miles 33 540 Save R531 (14%) Ships in 10 - 15 working days

The volume explores the consequences of recent events in global Internet policy and possible ways forward following the 2012 World Conference on International Telecommunications (WCIT-12). It offers expert views on transformations in governance, the future of multistakeholderism and the salience of cybersecurity. Based on the varied backgrounds of the contributors, the book provides an interdisciplinary perspective drawing on international relations, international law and communication studies. It addresses not only researchers interested in the evolution of new forms of transnational networked governance, but also practitioners who wish to get a scholarly reflection on current regulatory developments. It notably provides firsthand accounts on the role of the WCIT-12 in the future of Internet governance.

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,493 Discovery Miles 54 930 Ships in 10 - 15 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Cyber Security Threats and Challenges Facing Human Life (Hardcover): Hari Vasudevan, Surya S Durbha, Antonis Michalas,... Cyber Security Threats and Challenges Facing Human Life (Hardcover)
Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, …
R2,943 Discovery Miles 29 430 Ships in 10 - 15 working days

Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Paperback): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Paperback)
Gulizar Haciyakupoglu, Yasmine Wong
R1,180 Discovery Miles 11 800 Ships in 10 - 15 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

Work and Labor in the Digital Age (Hardcover): Steven Vallas, Anne Kovalainen Work and Labor in the Digital Age (Hardcover)
Steven Vallas, Anne Kovalainen
R2,682 Discovery Miles 26 820 Ships in 10 - 15 working days

This volume presents the most recent studies of work and labor in the digital age as it unfolds in both Europe and the United States. One of the critical questions facing modernity concerns the reconfiguration of paid employment, which has been subject to wholesale changes that have widespread consequences for workers, their families, and the institutional structure that characterizes capitalist societies. A key driver of these changes has been the digital revolution and the rapid proliferation of the gig economy. Together with social network sites for hiring, the spread of robotics, and the rise of artificial intelligence and machine learning, they leave virtually no occupation untouched.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay Hardcover R3,900 Discovery Miles 39 000
Life and the Law in the Era of…
Mireille Hildebrandt, Kieron O'Hara Paperback R1,074 Discovery Miles 10 740
Artificial Intelligence - Law and…
Charles Kerrigan Hardcover R6,534 Discovery Miles 65 340
Social Media Marketing - A Quickstudy…
Edwards Poster R232 Discovery Miles 2 320
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R498 R473 Discovery Miles 4 730
Financial Regulation and Technology - A…
Iain Sheridan Paperback R2,668 Discovery Miles 26 680
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo Paperback R1,539 Discovery Miles 15 390
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R303 Discovery Miles 3 030
HealthTech - Law and Regulation
Jelena Madir Hardcover R6,348 Discovery Miles 63 480
Facebuddha - Transcendence in the Age of…
Ravi Chandra Hardcover R747 Discovery Miles 7 470

 

Partners