![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
Terrorism is often mistakenly thought of as a modern phenomenon, but it goes back quite some time. A History of Terrorism charts the history of political terror from nineteenth-century Europe to the multinational operations of Arab and other groups today. The question is: What is its true impact today and in the future? Laqueur addresses long-neglected psychological issues concerning the origins of and motivations behind terrorism, and examines the sociology of terrorism in depth: funding, intelligence gathering, weapons and tactics, informers and countermeasures, and the crucial role of the media depiction of the "terrorist personality". Systematic terrorism and current interpretations of terrorism, its common patterns, motives, and aims, are unflinchingly faced and clearly explicated. Laqueur ultimately considers the effectiveness of terrorism and examines the ominous possibility of nuclear blackmail. Originally published in 1977, this book is one of the two most quoted works on terrorism. This expanded edition features a new preface and important contributions by distinguished security expert Bruce Hoffman that apply Laqueur's classic and seemingly timeless work to contemporary terrorism issues.
Sun Tzu, author of 'The Art of War', believed that the acme of leadership consists in figuring out how to subdue the enemy with the least amount of fighting-a fact that America's Founders also understood, and practiced with astonishing success. For it to work, however, a people must possess both the ability and the willingness to use all available instruments of power in peace as much as in war. US foreign policy has increasingly neglected the instruments of civilian power and become overly dependent on lethal solutions to conflict. The steep rise in unconventional conflict has increased the need for diplomatic and other non-hard power tools of statecraft. The United States can no longer afford to sit on the proverbial three-legged national security stool ("military, diplomacy, development"), where one leg is a lot longer than either of the other two, almost forgetting altogether the fourth leg-information, especially strategic communication and public diplomacy. The United States isn't so much becoming militarized as DE civilianized. According to Sun Tzu, self-knowledge is as important as knowledge of one's enemy: "if you know neither yourself nor the enemy, you will succumb in every battle." Alarmingly, the United States is deficient on both counts. And though we can stand to lose a few battles, the stakes of losing the war itself in this age of nuclear proliferation are too high to contemplate.
This book offers a reconceptualisation of conventional deterrence theory, and applies it to enduring rivalries in the Middle East. The work argues that many of the problems encountered in the development of deterrence theory lay in the fact that it was developed during the Cold War, when the immediate problem it had to address was how to prevent catastrophic nuclear wars. The logic of nuclear deterrence compelled a preoccupation with the problem of stability over credibility; however, because the logic of conventional deterrence is different, the solution of the tension between credibility and stability is achieved by deference to credibility, due to the requirements of reputation and costly signaling. This book aims to narrow the gap between theory and evidence. It explores how a reconceptualization of the theory as a process that culminates in the internalization of deterrence within enduring rivalries is better suited to account for its final success: a finding that has eluded deterrence theorists for long. This interdisciplinary book will be of much interest to students of deterrence theory, strategic studies, international security, Middle Eastern studies and IR in general.
In this volume, Fredrick Lister examines security confederations of the modern eras; America's confederal union during the winning of the Revolutionary War; Switzerland's in post-Napoleonic Europe; and Germany's during the turbulence of the Austro-Prussian Confrontation whose outcome transformed the European political scene. Lister concludes with an evaluation of the possibility that confederal-type ties might one day serve as a basis for global union. After setting forth the nature of confederal-type governance, Lister provides three case studies that follow on the evolution of confederal political institutions in the United States, Switzerland, and Germany. Each section ends with a series of conclusions on the confederation examined. A thorough examination of a long-neglected subject that will be of interest to scholars, students, and researchers involved with world government and international relations.
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologies that are part of a framework whose aim is to move from a simple collection and storage of information toward proactive systems that are able to fuse several information sources to detect relevant events in their early incipient phase. Part III, Technologies for Homeland Security, considers relevant applications of surveillance systems in the framework of homeland security. It presents real-world case studies of how innovative technologies can be used to effectively improve the security of sensitive areas without violating the rights of the people involved. Examining cutting-edge research topics, the book provides you with a comprehensive understanding of the technological, legislative, organizational, and management issues related to surveillance. With a specific focus on privacy, it presents innovative solutions to many of the issues that remain in the quest to balance security with the preservation of privacy that society demands.
The world was standing at the crossroads in 2015 as globalization propelled human beings into an increasingly integrated community of common destiny. In the meantime, the world witnessed the strategic competition among major powers. This annual publication offers views, opinions and predictions on global political and security issues, and China's strategic choices by Chinese scholars. It covers almost all the significant issues that took place in the international security arena in 2015. Besides the relations among major powers, it studies the international community's fight against Islamic State (IS), the strategic situation in the Korean Peninsula, political situation in Myanmar, the Joint Comprehensive Plan of Action on the Iranian nuclear issue, free navigation in the South China Sea, China's Belt and Road Initiative and its grand diplomacy.This book argues that the strategic competition among major powers is heightening, and smaller countries as well as extremist forces like the IS are seeking strategic space by taking advantage of the conflicts among major powers. The book concludes that to address this major historic challenge in international politics, it is essential that some major powers drop the hostile stance towards each other and enhance partnership to foster international cooperation.
The world was standing at the crossroads in 2015 as globalization propelled human beings into an increasingly integrated community of common destiny. In the meantime, the world witnessed the strategic competition among major powers. This annual publication offers views, opinions and predictions on global political and security issues, and China's strategic choices by Chinese scholars. It covers almost all the significant issues that took place in the international security arena in 2015. Besides the relations among major powers, it studies the international community's fight against Islamic State (IS), the strategic situation in the Korean Peninsula, political situation in Myanmar, the Joint Comprehensive Plan of Action on the Iranian nuclear issue, free navigation in the South China Sea, China's Belt and Road Initiative and its grand diplomacy.This book argues that the strategic competition among major powers is heightening, and smaller countries as well as extremist forces like the IS are seeking strategic space by taking advantage of the conflicts among major powers. The book concludes that to address this major historic challenge in international politics, it is essential that some major powers drop the hostile stance towards each other and enhance partnership to foster international cooperation.
The decision to go to war in Iraq has had historic repercussions throughout the world. The editors of this volume bring together scholarly analysis of the decision-making in the U.S and U.K. that led to the war, inside accounts of CIA decision-making, and key speeches and documents related to going to war. The book presents a fascinating case study of decision-making at the highest levels in the United States and Britain as their leaders planned to go to war in Iraq. Just as the Cuban Missile Crisis has been used for decades as a case study in good decision-making, the decision to go to war in Iraq will be analysed for years to come for lessons about what can go wrong in decisions about war. The book presents a fascinating and truly comparative perspective on how President Bush and Prime Minister Blair took their countries to war in Iraq. Each had to convince his legislature and public that war was necessary, and both used intelligence in questionable ways to do so. This book brings together some of the best scholarship and most relevant documents on these important decisions that will reverberate for decades to come. -- .
The intertwined issues of Japanese `identity' and `normality' are at the centre of the tension between internal and external pressures on Japanese defence and security policies. With chapters on peace thought, the militarisation and demilitarisation of language as well as the `hard' aspects of the Japanese military build up in the 1980s and the response to the Gulf War in the 1990s, this study challenges many of the preconceived notions on Japanese defence and security policies and the policy making process in Japan.
This book applies the concept of mediatization to the contemporary dynamic between war, media and society, with a focus on the Israel Defence Forces (IDF). Since the beginning of the 21st century the IDF has undergone an intensive process of mediatization that has transformed the media into an interpretative grid for many of its military activities and increasingly utilized media to garner public support and construct civilian perceptions of conflict and security through media activity and strategy. This process can be divided into four distinct chronological phases in accordance with the operational challenges confronted by the IDF during this period, from the Al-Aqsa Intifada of 2000, through Israeli unilateral disengagement from Gaza in 2005, and the second Lebanon war of 2006, to the series of Gaza confrontations of 2008-2014. The work shows how the IDF's media policy evolved from a narrow perception of its role, and separation between operational and media actions to a cohesive and coherently articulated media strategy that is increasingly intertwined with military action and operational strategy and a vital component of strategic military aims and objectives. This strategic stance has led the IDF to adopt a global media perspective using the most advanced new media platforms, designed to influence public opinion and improve national narratives, both in Israel and the international community. By applying the concept of mediatization to the Israeli case, this book fills a research lacuna and offers a new prism for the study of media-military relations in contemporary conflicts. The book will be of much interest to students of civil-military relations, strategic studies, Middle Eastern Studies, media and communication studies, sociology and IR, in general.
This book examines the normative debates around the American use of targeted killings. It questions whether the Obama administration's defence of its use of targeted killings is cohesive or hypocritical. In doing so, the book departs from the disciplinary purpose of international law, constitutional law and the just war tradition and instead examines discipline-specific defences of targeted killings to identify their requisite normative principles in order to compare these norms across disciplines. The methodology used in this book means that it argues that targeted killings are only defensible as acts of war, but it also highlights the normative role of accountability and responsibility in this defence. In doing so, it offers an argument that the use of 'pattern of life' killings by the CIA falls outside the defence offered by the Obama administration, but that this same type of targeting could be used by the military due to differing standards/mechanisms of responsibility assignment in these organisations. The book thus provides a way of investigating contemporary wars where the conduct of war lacks the traditional hallmarks of conventional warfare. Furthermore, by drawing attention to differing normative concepts that underpin competing interpretations of law and morality, it provides a way of analysing contemporary political violence in an interdisciplinary fashion without seeking to displace single disciplinary study. This book will be of much interest to students of military studies, ethics of war, foreign policy, international security and IR.
Adopting a multidisciplinary perspective, this book explores the key challenges associated with the proliferation of cyber capabilities. Over the past two decades, a new man-made domain of conflict has materialized. Alongside armed conflict in the domains of land, sea, air, and space, hostilities between different types of political actors are now taking place in cyberspace. This volume addresses the challenges posed by cyberspace hostility from theoretical, political, strategic and legal perspectives. In doing so, and in contrast to current literature, cyber-security is analysed through a multidimensional lens, as opposed to being treated solely as a military or criminal issues, for example. The individual chapters map out the different scholarly and political positions associated with various key aspects of cyber conflict and seek to answer the following questions: do existing theories provide sufficient answers to the current challenges posed by conflict in cyberspace, and, if not, could alternative approaches be developed?; how do states and non-state actors make use of cyber-weapons when pursuing strategic and political aims?; and, how does the advent of conflict in cyberspace challenge our established legal framework? By asking important strategic questions on the theoretical, strategic, ethical and legal implications and challenges of the proliferation of cyber warfare capabilities, the book seeks to stimulate research into an area that has hitherto been neglected. This book will be of much interest to students of cyber-conflict and cyber-warfare, war and conflict studies, international relations, and security studies.
The book The APPSMO Advantage: Strategic Opportunities is on the Asia Pacific Programme for Senior Military Officers (APPSMO). APPSMO is a series of conferences organised by the S. Rajaratnam School of International Studies and its predecessor, the Institute of Defence and Strategic Studies, for senior military officers of Singapore and other countries of the Asia Pacific, consisting of an intensive week-long programme of lectures, forums, and discussion groups. Very senior speakers share their views on strategic matters, and defence and military issues. The programme brings together key people whose fingers are on the trigger to enable them to communicate with each other directly and informally, thereby enhancing networking among their defence forces, while benefitting from contacts and exchanges between the scholarly and policy communities.
How should NATO's military strategy and force posture in Western Europe be handled given today's changing relations between East and West? Five relatively senior U.S. military officers spent a year exploring this issue as National Security Fellows at the Kennedy School of Harvard University. "The Future of NATO" serves as a reference based upon their analyses of the changes in the Soviet security posture and the political response of Western Europe to the collapse of the Warsaw pact. It is an analytical tool that deals with the requirements that any new NATO strategy will have to meet to be relevant. It is a catalyst for discussion based on the proposal to replace forward defense strategy with resilient defense. Resilient defense articulates one way in which the United States and NATO can accommodate the pressures for reduced defense spending in the face of a reduced military threat. Resilient defense is evolutionary rather than revolutionary in nature. It takes advantage of increased warning time to permit a strategy that draws heavily on existing mobilization capabilities. The strategy assumes cuts in active forces, yet it is designed to maintain a conventional defense capability across even deeper cuts by making more efficient use of lower levels of forces. This volume deals with more than just the political elements of the NATO alliance or details of military strategies. It also studies the interrelationship among political, economic, and military requirements underpinning Alliance security. Those concerned with military strategy and international security affairs will find this work timely and relevant.
This book offers the first systematic, comparative analysis of military education and training in Europe within the context of the post-Cold War security environment. Based on an analysis of military education institutions in the UK, Germany, Finland, Romania and the Baltic States, this book demonstrates that the convergence of European military cultures since the end of the Cold War is linked to changes in military education. The process of convergence originates, at least in part, from the full or partial adoption of a new concept by post-commissioning professional military education institutions: the National Defence University. Officers are now educated alongside civilians and public servants, wherein they enjoy a socialization experience that is markedly different from that of previous generations of European officers, and is increasingly similar across national borders. In addition, this book argues that with the control over the curricula and graduation criteria increasingly set by civilian higher education authorities, the European armed forces, while continuing to exist, and hold significant (although declining) capabilities, stand to lose their status as a profession in the traditional sense. This book will be of much interest to students of military, European security policy, European politics, and IR in general.
Discover the spiritually incisive strategies for peacefully resolving conflict in this masterpiece of military strategy. Written 2,500 years ago by Chinese general Sun Tzu, The Art of War is a poetic and potent treatise on military strategy still in use in war colleges around the world. Yet its principles transcend warfare and have practical applications to all the conflicts and crises we face in our lives—in our workplaces, our families, even within ourselves. Thomas Huynh guides you through Sun Tzu's masterwork, highlighting principles that encourage a perceptive and spiritual approach to conflict, enabling you to: Prevent conflicts before they arise Peacefully and quickly resolve conflicts when they do arise Act with courage, intelligence and benevolence in adversarial situations Convert potential enemies into friends Control your emotions before they control you Now you can experience the effectiveness of Sun Tzu's teachings even if you have no previous knowledge of The Art of War. Insightful yet unobtrusive facing-page commentary explains the subtleties of the text, allowing you to unlock the power of its teachings and help prevent and resolve the conflicts in your own life.
This book examines the evolution of Russia's security policy under Putin in the 21st century, using a critical security studies approach. Drawing on critical approaches to security the book investigates the interrelationship between the internal-external nexus and the politics of (in)security and regime-building in Putin's Russia. In so doing, it evaluates the way that this evolving relationship between state identities and security discourses framed the construction of individual security policies, and how, in turn, individual issues can impact on the meta-discourses of state and security agendas. To this end, the (de)securitisation discourses and practices towards the issue of Chechnya are examined as a case study. In so doing, this study has wider implications for how we read Russia as a security actor through an approach that emphasises the importance of taking into account its security culture, the interconnection between internal/external security priorities and the dramatic changes that have taken place in Russia's conceptions of itself, national and security priorities and conceptualisation of key security issues, in this case Chechnya. These aspects of Russia's security agenda remain somewhat of a neglected area of research, but, as argued in this book, offer structuring and framing implications for how we understand Russia's position towards security issues, and perhaps those of rising powers more broadly. This book will be of much interest to students of Russian security, critical security studies and IR.
Uniting the best of Michael Fagel and Jennifer Hesterman's books in the fields of homeland security and emergency management, the editors of this volume present the prevailing issues affecting the homeland security community today. Many natural and man-made threats can impact our communities-but these well-known and highly respected authors create order from fear, guiding the reader through risk assessment, mitigation strategies, community EOC planning, and hardening measures based upon real-life examples, case studies, and current research in the practice. As terrorist attacks and natural disasters continue to rock the world, Soft Targets and Crisis Management emphasizes the vulnerability of soft targets like schools, churches, and hospitals, and presents the methodology necessary to respond and recover in the event of a crisis in those arenas. Features: Based on ASIS award-winning texts Provides a multi-faceted look at crisis management principles Offers community-specific examples for diverse locales and threat centers Includes up-to-date case studies on soft target attacks from around the world A must-read for security, emergency management, and criminal justice professionals, Soft Targets and Crisis Management: What Emergency Planners and Security Professionals Need to Know is a crucial text for practitioners seeking to make the world a safer place for others.
This new Handbook offers a wide-ranging overview of current scholarship on the Cold War, with essays from many leading scholars. The field of Cold War history has consistently been one of the most vibrant in the field of international studies. Recent scholarship has added to our understanding of familiar Cold War events, such as the Korean War, the Cuban Missile Crisis and superpower detente, and shed new light on the importance of ideology, race, modernization, and transnational movements. The Routledge Handbook of the Cold War draws on the wealth of new Cold War scholarship, bringing together essays on a diverse range of topics such as geopolitics, military power and technology and strategy. The chapters also address the importance of non-state actors, such as scientists, human rights activists and the Catholic Church, and examine the importance of development, foreign aid and overseas assistance. The volume is organised into nine parts: Part I: The Early Cold War Part II: Cracks in the Bloc Part III: Decolonization, Imperialism and its Consequences Part IV: The Cold War in the Third World Part V: The Era of Detente Part VI: Human Rights and Non-State Actors Part VII: Nuclear Weapons, Technology and Intelligence Part VIII: Psychological Warfare, Propaganda and Cold War Culture Part IX: The End of the Cold War This new Handbook will be of great interest to all students of Cold War history, international history, foreign policy, security studies and IR in general.
EU security governance assesses the effectiveness of the EU as a security actor. The book has two distinct features. Firstly, it is the first systematic study of the different economic, political and military instruments employed by the EU in the performance of four different security functions. The book demonstrates that the EU has emerged as an important security actor, not only in the non-traditional areas of security, but increasingly as an entity with force projection capabilities. Secondly, the book represents an important step towards redressing conceptual gaps in the study of security governance, particularly as it pertains to the European Union. The book links the challenges of governing Europe's security to the changing nature of the state, the evolutionary expansion of the security agenda, and the growing obsolescence of the traditional forms and concepts of security cooperation. -- .
Addressing the complexities of radicalisation, resilience, cyber, and homeland security, State, Society and National Security: Challenges and Opportunities in the 21st Century aims to shed light on what has changed in recent years security discourse, what has worked (as well as what has not), and what the potential further evolutions within each domain might be.The release of this book commemorates the 10th anniversary of the creation of the Centre of Excellence for National Security (CENS) - a policy-oriented security think tank within the S Rajaratnam School for International Studies, Nanyang Technological University, as well as the 10th edition of CENS' annual Asia-Pacific Programme for Senior National Security Officers (APPSNO), which has developed into a premier international security conference in Southeast Asia.Featuring contributions from practitioners, policy experts and academics closely linked to CENS, this volume is a reminder of the meaningful and impact-creating insights that 10 years' worth of thinking and talking about national security imperatives have generated.Contributors to this volume include Professor Sir David Omand, former director of the United Kingdom's Government Communication Headquarters (GCHQ), Steven R Corman, Professor in the Hugh Downs School of Human Communication, Marc Sageman, former operations officer at the United States Central Intelligence Agency, Ilan Mizrahi, former Head of Israel's National Security Council and John, Lord Alderdice, Liberal Democrat member of the House of Lords and Senior Research Fellow and Director of the Centre for the Resolution of Intractable Conflict at Harris Manchester College, Oxford.This book has been written in a manner that makes it accessible to policymakers, security practitioners and academics, as well as interested lay readers.
Addressing the complexities of radicalisation, resilience, cyber, and homeland security, State, Society and National Security: Challenges and Opportunities in the 21st Century aims to shed light on what has changed in recent years security discourse, what has worked (as well as what has not), and what the potential further evolutions within each domain might be.The release of this book commemorates the 10th anniversary of the creation of the Centre of Excellence for National Security (CENS) - a policy-oriented security think tank within the S Rajaratnam School for International Studies, Nanyang Technological University, as well as the 10th edition of CENS' annual Asia-Pacific Programme for Senior National Security Officers (APPSNO), which has developed into a premier international security conference in Southeast Asia.Featuring contributions from practitioners, policy experts and academics closely linked to CENS, this volume is a reminder of the meaningful and impact-creating insights that 10 years' worth of thinking and talking about national security imperatives have generated.Contributors to this volume include Professor Sir David Omand, former director of the United Kingdom's Government Communication Headquarters (GCHQ), Steven R Corman, Professor in the Hugh Downs School of Human Communication, Marc Sageman, former operations officer at the United States Central Intelligence Agency, Ilan Mizrahi, former Head of Israel's National Security Council and John, Lord Alderdice, Liberal Democrat member of the House of Lords and Senior Research Fellow and Director of the Centre for the Resolution of Intractable Conflict at Harris Manchester College, Oxford.This book has been written in a manner that makes it accessible to policymakers, security practitioners and academics, as well as interested lay readers.
At a time of grave ethical failure in global security affairs, this is the first book to bring together emerging theoretical debates on ethics and ethical reasoning within security studies. In this volume, working from a diverse range of perspectives-poststructuralism, liberalism, feminism, just war, securitization, and critical theory-leading scholars in the field of security studies consider the potential for ethical visions of security, and lay the ground for a new field: "ethical security studies". These ethical 'visions' of security engage directly with the meaning and value of security and security practice, and consider four key questions: * Who, or what, should be secured? * What are the fundamental grounds and commitments of different security ethics? * Who or what are the most legitimate agents, providers or speakers of security? * What do ethical security practices look like? What ethical principles, arguments, or procedures, will generate and guide ethical security practices? Informed by a rich understanding of the intellectual and historical experience of security, the contributors advance innovative methodological, analytical, political and ethical arguments that represent the cutting edge of the field. This book opens a new phase of collaboration and growth that promises to have great benefits for the more humane, effective and ethical practice of security politics. This book will be of much interest to students of critical security studies, ethics, philosophy, and international relations.
Making the right-wing Bharatiya Janata Party's nuclear tests in 1998 its starting point, this book examines how opinion amongst India's 'attentive' public shifted from supporting nuclear abstinence to accepting - and even feeling a need for - a more assertive policy, by examining the complexities of the debate in India on nuclear policy in the 1990s. The study seeks to account for the shift in opinion by looking at the parallel processes of how nuclear policy became an important part of the public discourse in India, and what it came to symbolise for the country's intelligentsia during this decade. It argues that the pressure on New Delhi in the early 1990s to fall in line with the non-proliferation regime, magnified by India's declining global influence at the time, caused the issue to cease being one of defence, making it a focus of nationalist pride instead. The country's nuclear programme thus emerged as a test of its ability to withstand external compulsions, guaranteeing not so much the sanctity of its borders as a certain political idea of it - that of a modern, scientific and, most importantly, 'sovereign' state able to defend its policies and set its goals.
The history of bourgeois modernity is a history of the Enemy. This book is a radical exploration of an Enemy that has recently emerged from within security documents released by the US security state: the Universal Adversary. The Universal Adversary is now central to emergency planning in general and, more specifically, to security preparations for future attacks. But an attack from who, or what? This book - the first to appear on the topic - shows how the concept of the Universal Adversary draws on several key figures in the history of ideas, said to pose a threat to state power and capital accumulation. Within the Universal Adversary there lies the problem not just of the 'terrorist' but, more generally, of the 'subversive', and what the emergency planning documents refer to as the 'disgruntled worker'. This reference reveals the conjoined power of the contemporary mobilisation of security and the defence of capital. But it also reveals much more. Taking the figure of the disgruntled worker as its starting point, the book introduces some of this worker's close cousins - figures often regarded not simply as a threat to security and capital but as nothing less than the Enemy of all Mankind: the Zombie, the Devil and the Pirate. In situating these figures of enmity within debates about security and capital, the book engages an extraordinary variety of issues that now comprise a contemporary politics of security. From crowd control to contagion, from the witch-hunt to the apocalypse, from pigs to intellectual property, this book provides a compelling analysis of the ways in which security and capital are organized against nothing less than the 'Enemies of all Mankind'. |
You may like...
Computational and Methodological…
Andriette Bekker, (Din) Ding-Geng Chen, …
Hardcover
R4,024
Discovery Miles 40 240
Bitcoin And Cryptocurrency - The…
Crypto Trader & Crypto Gladiator
Hardcover
Methods and Innovations for Multimedia…
Shu-Ching Chen, Mei-Ling Shyu
Hardcover
R4,825
Discovery Miles 48 250
Microelectronic Systems - Circuits…
Albert Heuberger, Gunter Elst, …
Hardcover
R2,706
Discovery Miles 27 060
Graph Data Management - Techniques and…
Sherif Sakr, Eric Pardede
Hardcover
R5,002
Discovery Miles 50 020
|