![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
Security Manual provides practical guidance on all aspects of security work and is a ready made source of information for all members of the security profession, including managers, supervisors and trainers. This eighth edition has been fully restructured to better reflect recent changes in the criminal law, fire protection and security practices. New chapters on powers of arrest, industrial disputes, conflict resolution, dealing with emergencies, cultural awareness and door supervising have been added, including the latest information and procedures that should be adopted in relation to an act of terrorism. The manual continues to pay attention to the law of theft, other criminal offences affecting security and the basics of security practice, and can rightly be regarded as the standard overall work on the subject and a practical reference for existing security practitioners and those who are aspiring to enter the security profession. Security Manual is also ideal for those seeking professional qualifications such as: NVQ Levels 1, 2 and 3 in Security Guarding and for Supervisors; NVQ Level 3 in Investigations; C&G, BIIAB and NCFE qualifications in Door Supervision. Security Manual is the essential guide to this subject, and has been described as 'standard issue for every security officer, along with the uniform'.
In the battle against bioterrorism, one of the greatest challenges is finding the ideal balance between complacency and overreaction. The goal is to be so well prepared that we can prevent catastrophic outcomes in the event of a bioterrorist attack, while strengthening our ability to prevent and treat naturally-occurring infectious diseases. Bioterrorism: A Guide for Hospital Preparedness provides critical guidelines for health providers on effectively preparing for bioterrorism. The book presents information on all aspects of dealing with bioterrorism including the likeliest biological agents to be used, means of determining that an attack is taking place, diagnosis and management of specific diseases, and mechanisms of reporting to public health authorities. The text reviews cooperative planning for private practitioners, methods for protecting hospital and office staff and other patients in the event of an attack, approaches to handling the psychological effects of terrorism, special considerations concerning the care of children, and strategies for answering questions posed by the public and the media. It also includes data from national and regional exercises in assessing preparedness, with suggestions for implementing lessons learned from these exercises. With bioterrorism on the fine line between risk and reality, it is essential for health care providers to be properly equipped for every situation. This comprehensive guide features solid strategies for establishing and maintaining an attainable level of preparation in the ever-present risk of bioterrorism.
Headlines of public service corruption scandals are painful reminders of the need for continuing education in the subjects of ethics and integrity. Public service professionals employed as government officials, forensic scientists, investigators, first responders, and those within the legal and justice systems, face daily decisions that can mean the difference between life or death and freedom or imprisonment. Sometimes, such decisions can present ethical dilemmas even to the most seasoned of professionals. Building on the success of the first edition, Ethics for the Public Service Professional, Second Edition serves as a single-source resource for the topic of ethics and ethical decision making as it relates to government service. While incorporating an examination of the history of ethics, codes and legislation, the book exposes the reader to the challenges faced by today's public service professionals and administrators in incorporating ethics within daily decisions, procedures, and duties. Key features include: Current controversies in police, forensic, and other public service sectors including: racial profiling, evidence tampering, disaster response, and audits Important new mechanisms of accountability, including use-of-force reporting, citizen complaint procedures, and open government Contemporary news stories throughout the book introduce the reader to a broad range of ethical issues facing leaders within the public service workplace Chapter pedagogy including key terms, learning objectives, end-of-chapter questions, a variety of boxed ethical case examples, and references Ripped from the Headlines current event examples demonstrate actual scenarios involving the issues discussed within each chapter This in-depth text will be essential for the foundational development and explanation of protocols used within a successful organization. As such, Ethics for the Public Service Professional, Second Edition will help introduce ethics and ethical decision-making to both those new to the realm of forensic science, criminal justice, and emergency services and those already working in the field.
Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author's work that set the standard. This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design.
When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.
A powerful personal testimony and an urgent call for Israel to change direction, from an unexpected source: the former director of the internal security service, Shin Bet. Raised on a kibbutz by parents who had fled the Holocaust, Ami Ayalon’s life exemplified the Zionist dream. His commitment to his country propelled a meteoric career, culminating in being named commander of the navy and receiving the Medal of Valour, Israel’s highest military decoration. All the time, he remained a staunch supporter of his country’s policies. Then he was appointed director of the Shin Bet, Israel’s internal security service, and the unexpected happened. Forced to try and understand the lives and motivations of Palestinians for the first time, he gained empathy for ‘the enemy’ and learned that when Israel carries out anti-terrorist operations in a political context of hopelessness, the Palestinian public will support violence, because they have nothing to lose. He came to understand that his patriotic life had blinded him to the self-defeating nature of policies that have undermined Israel’s civil society while heaping humiliation upon its neighbours. In this deeply personal journey of discovery, Ami Ayalon seeks input and perspectives from Palestinians and Israelis whose experiences differ from his own, and draws radical conclusions about what Israel must do to achieve relative peace and security.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." - Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
The Art of Investigation examines the qualities required to be a professional, thorough, and effective investigator. As the title suggests, it delves into more than the steps and procedures involved in managing an investigation, it also covers the "soft skills" necessary to effectively direct investigations and intuit along the way. The editors and contributing authors are the best in their field, and bring a wealth of real-world knowledge and experience to the subject. There are several publications available on the nuts-and-bolts of the process and stages of an investigation. That ground has been covered. However, little has been published on the investigative skills required, the traits necessary, and the qualities endemic to an inquisitive mind that can be cultivated to improve an investigator's professional skill-set. Each chapter discusses the applicability of the traits to the contributor's own work and experience as an investigator. In doing so, the contributors provide a story-or set of stories-from their personal experience, which demonstrates a given trait and its importance in the course of their investigative work and career. This will be first-hand experience that will serve to help any investigative professional in the course of their work. The case examples included throughout are sometimes surprising, but always engaging and insightful. An investigator must keep an open mind above all else, and this book will "lift the veil" on the inner workings of an investigation, in addition to the thought processes and inner monologues of an investigator as part of that process. Key Features * Chapters highlight the qualities and traits-the "soft skills"-that are required, and which can be improved over time, to be a thorough investigator. * A veritable "Who's Who" of renowned investigative experts lend their personal expertise and experience to this how-to manual for investigators. * A unique approach is applied and provides self-help advice for both new and experienced investigative and security professionals. * The book focuses on the learned, acquired, and intuitive skills of investigation-a nuanced but essential aspect of the investigative skill-set. The Art of Investigation will be a welcome addition to any investigator's toolkit and will also be of interest to students in criminal justice, security, and Homeland Security programs, security consultants, corporate and private security professionals, and the legal community.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as ‘target centric’ intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject.
Privatising Justice takes a broad historical view of the role of the private sector in the British state, from private policing and mercenaries in the eighteenth century to the modern rise of the private security industry in armed conflict, policing and the penal system. The development of the welfare state is seen as central to the decline of what the authors call 'old privatisation'. Its succession by neoliberalism has created the ground for the resurgence of the private sector. The growth of private military, policing and penal systems is located within the broader global changes brought about by neoliberalism and the dystopian future that it portends. The book is a powerful petition for the reversal of the increasing privatisation of the state and the neoliberalism that underlies it.
Unlike current books on the market that focus primarily on the technical aspects of surveillance and protection, Security Surveillance Centers: Design, Implementation, and Operation focuses on the operation of a security surveillance center. This text explains in detail the role of security surveillance, as well as the critical aspects of the design, implementation, and operation of security surveillance centers of all sizes. Step-by-step coverage of policy and procedures, as well as the inclusion of industry-specific operational forms, guarantee a practical, user-friendly text for all levels of readers. Intended for any individuals or organizations currently employing security surveillance systems, this book is an asset for all users, from trainees to supervisors, seeking to create a more secure environment for themselves and for others.
Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.
There is a Russian saying that "police mirror society." The gist of this is that every society is policed to the extent that it allows itself to be policed. Centralized in control but decentralized in their reach, the police are remarkably similar in structure, chain of command, and their relationships with the political elite across post-Soviet nations-they also remain one of the least reformed post-communist institutions. As a powerful state organ, the Soviet-style militarized police have resisted change despite democratic transformations in the overall political context, including rounds of competitive elections and growing civil society. While consensus between citizens and the state about reform may be possible in democratic nations, it is considerably more difficult to achieve in authoritarian states. Across post-Soviet countries, such discussions most often occur between political elites and powerful non-state actors, such as criminal syndicates and nationalistic ethnic groups, rather than the wider citizenry. Even in countries where one or more rounds of democratic elections have taken place since 1991, empowered citizens and politicians have not renegotiated the way states police and coerce society. On the contrary, in many post-Soviet countries, police functions have expanded to serve the interests of the ruling political elites. What does it take to reform a post-Soviet police force? This book explores the conditions in which a meaningful transformation of the police is likely to succeed and when it will fail. Departing from the conventional interpretation of the police as merely an institution of coercion, this book defines it as a medium for state-society consensus on the limits of the state's legitimate use of violence. It thus considers policing not as a way to measure the state's capacity to coerce society, but rather as a reflection of a complex society bound together by a web of casual interactions and political structures. The book compares reform efforts in Ukraine, Georgia, Kyrgyzstan, Kazakhstan, and Tajikistan, finding that bottom-up public mobilization is likely to emerge in the aftermath of transformative violence-an incident when the usual patterns of policing are interrupted with unprecedented brutality against vulnerable individuals. Ultimately, The Politics of Police Reform examines the various pathways to transforming how the state relates to society through policing.
Strategic Security will help security managers, and those aspiring to the position, to think strategically about their job, the culture of their workplace, and the nature of security planning and implementation. Security professionals tend to focus on the immediate (the urgent) rather than the important and essential-too often serving as "firefighters" rather than strategists. This book will help professionals consider their roles, and structure their tasks through a strategic approach without neglecting their career objectives. Few security management books for professionals in the field focus on corporate or industrial security from a strategic perspective. Books on the market normally provide "recipes," methods or guidelines to develop, plans, policies or procedures. However, many do so without taking into account the personal element that is supposed to apply these methods. In this book, the authors helps readers to consider their own career development in parallel with establishing their organisation security programme. This is fundamental to becoming, and serving as, a quality, effective manager. The element of considering career objectives as part-and-parcel to this is both unique to only this book and vital for long-term career success. The author delineates what makes strategic thinking different in a corporate and security environment. While strategy is crucial in the running of a company, the traditional attitude towards security is that it has to fix issues quickly and at low cost. This is an attitude that no other department would tolerate, but because of its image, security departments sometimes have major issues with buy-in and from top-management. The book covers the necessary level of strategic thinking to put their ideas into practice. Once this is achieved, the strategic process is explained, including the need to build the different steps into this process-and into the overarching business goals of the organisation-will be demonstrated. The book provides numerous hand-on examples of how to formulate and execute the strategic master plan for the organization. The authors draws on his extensive experience and successes to serve as a valuable resource to all security professionals looking to advance their careers in the field.
Private Security and the Investigative Process, Fourth Edition is fully updated and continues to provide complete coverage of the investigative process for private investigations by both individuals and in corporate security environments. This edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. Written by a recognized expert in security, criminal justice, ethics, and the law-with over three decades of experience-the updated edition of this popular text covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal. It details the collection and preservation of evidence, the handling of witnesses, surveillance techniques, background investigations, and report writing. The book reflects best practices and includes tips for ensuring accurate and reliable private sector security investigations. This new edition includes: A new section on career opportunities in paths in the investigative field A rundown of the leading security Industry associations and professional standards being published Added discussion of observational interviews include current protocols analyzing data Details of the current legal implications for security surveillance and practices Advances in technology to thwart crime and fraud in retail and other business settings An entirely new section on e-records from criminal and civil judgments Authoritative, yet accessible, this book is one of the only textbooks dedicated to the subject. It also serves as an important reference for private investigators and security professionals. Complete with numerous forms, checklists, and web exercises, it provides the tools and understanding required to conduct investigations that are professional, ethical, and effective.
The Art of Investigation examines the qualities required to be a professional, thorough, and effective investigator. As the title suggests, it delves into more than the steps and procedures involved in managing an investigation, it also covers the "soft skills" necessary to effectively direct investigations and intuit along the way. The editors and contributing authors are the best in their field, and bring a wealth of real-world knowledge and experience to the subject. There are several publications available on the nuts-and-bolts of the process and stages of an investigation. That ground has been covered. However, little has been published on the investigative skills required, the traits necessary, and the qualities endemic to an inquisitive mind that can be cultivated to improve an investigator's professional skill-set. Each chapter discusses the applicability of the traits to the contributor's own work and experience as an investigator. In doing so, the contributors provide a story-or set of stories-from their personal experience, which demonstrates a given trait and its importance in the course of their investigative work and career. This will be first-hand experience that will serve to help any investigative professional in the course of their work. The case examples included throughout are sometimes surprising, but always engaging and insightful. An investigator must keep an open mind above all else, and this book will "lift the veil" on the inner workings of an investigation, in addition to the thought processes and inner monologues of an investigator as part of that process. Key Features * Chapters highlight the qualities and traits-the "soft skills"-that are required, and which can be improved over time, to be a thorough investigator. * A veritable "Who's Who" of renowned investigative experts lend their personal expertise and experience to this how-to manual for investigators. * A unique approach is applied and provides self-help advice for both new and experienced investigative and security professionals. * The book focuses on the learned, acquired, and intuitive skills of investigation-a nuanced but essential aspect of the investigative skill-set. The Art of Investigation will be a welcome addition to any investigator's toolkit and will also be of interest to students in criminal justice, security, and Homeland Security programs, security consultants, corporate and private security professionals, and the legal community.
Sports Team Security examines the security needs for sports teams and events of all sizes. This groundbreaking book provides a fundamental model for sports team security that can be applied almost universally, from youth sports to the Super Bowl and World Cup. The book develops, compares, and contrasts current methodologies in sports security, for both amateur and professional athletes, examining which paradigms work best and under which circumstances. This valuable information is applicable to nearly anyone involved in the safety of athletes, including event managers, law enforcement, parents, school administrators and coaches, security practitioners, tourism industry professionals, and legal professionals. It explores areas rarely investigated, providing key advice for creating best practices and guidelines in sports team security.
For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.
This provocative book offers a probing account of the erosion of privacy in American society, that shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience. The author reveals that in today's "information society," the personal data that we make available to virtually any organization for virtually any purpose is apt to surface elsewhere, applied to utterly different purposes. The mass collection and processing of personal information produces such tremendous efficiencies that both the public and private sector feel justified in pushing as far as they can into our private lives. And there is no easy cure. Indeed, there are many cases where privacy invasion is both hurtful to the individual and indispensable to an organization's quest for efficiency. And as long as we willingly accept the pursuit of profit, or the reduction of crime, or cutting government costs as sufficient reason for intensified scrutiny over our lives, then privacy will remain endangered.
Workplace Violence: Issues in Threat Management defines what workplace violence is, delves into the myths and realities surrounding the topic and provides readers with the latest statistics, thinking, and strategies in the prevention of workplace violence. The authors, who themselves have implemented successful workplace violence protection programs, guide novice and experienced practitioners alike in the development of their own programs.
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
As evidenced by the anthrax attacks in 2001, the SARS outbreak in 2003, and the H1N1 influenza pandemic in 2009, a pathogen does not recognize geographic or national boundaries, often leading to devastating consequences. Automated biosurveillance systems have emerged as key solutions for mitigating current and future health-related events. Focusing on this promising public health innovation, Biosurveillance: Methods and Case Studies discusses how these systems churn through vast amounts of health-related data to support epidemiologists and public health officials in the early identification, situation awareness, and response management of natural and man-made health-related events. The book follows a natural sequence from theory to application. The initial chapters build a foundation while subsequent chapters present more applied case studies from around the world, including China, the United States, Denmark, and the Asia-Pacific region. The contributors share candid, first-hand insights on lessons learned and unresolved issues that will help chart the future of biosurveillance. As this book illustrates, biosurveillance operates in a complex, multidimensional problem space that incorporates varied data. Capturing the progress of modern-day pioneers who are walking in John Snow's footsteps, this volume shows how contemporary information technology can be applied to the age-old challenge of combating the spread of disease and illness. |
You may like...
Taking Stock of Delinquency - An…
Terence P. Thornberry, Marvin D. Krohn
Hardcover
R2,702
Discovery Miles 27 020
The Griekwastad Murders - The Crime That…
Jacques Steenkamp
Paperback
Female Serial Killers in Social Context…
Elizabeth Yardley, David Wilson
Hardcover
R1,027
Discovery Miles 10 270
|