![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
GRIPPING, MOVING AND INSPIRING: the remarkable life of a world-leading expert in chemical weapons defence. "Unlike any account of warfare I've read" - Billy Billingham For thirty years, Hamish has served and volunteered in conflict zones around the world. As the army's foremost chemical weapons expert, he built a unique first-hand understanding of how to prevent attacks and train doctors on the frontline - saving countless lives in the process. After suffering near-death experiences time and again, Hamish discovered he had a ticking time bomb in his own chest: a heart condition called Sudden Death Syndrome that could kill him at any time. But with a new awareness for the fragility of life, he fought harder to make his count. Despite facing extraordinary personal danger, Hamish has unearthed evidence of multiple chemical attacks in Syria and continues to advise the government at the highest level, including after the 2018 Novichok poisoning in Salisbury. Lifting the lid on Hamish's unique world of battlefield expertise and humanitarian work, Chemical Warrior is a thrilling story of bravery and compassion.
'The best book on codebreaking I have read', SIR DERMOT TURING 'Brings back the joy I felt when I first read about these things as a kid', PHIL ZIMMERMANN 'This is at last the single book on codebreaking that you must have. If you are not yet addicted to cryptography, this book will get you addicted. Read, enjoy, and test yourself on history's great still-unbroken messages!' JARED DIAMOND is the Pulitzer Prize-winning author of Guns, Germs, and Steel; Collapse; and other international bestsellers 'This is THE book about codebreaking. Very concise, very inclusive and easy to read', ED SCHEIDT 'Riveting', MIKE GODWIN 'Approachable and compelling', GLEN MIRANKER This practical guide to breaking codes and solving cryptograms by two world experts, Elonka Dunin and Klaus Schmeh, describes the most common encryption techniques along with methods to detect and break them. It fills a gap left by outdated or very basic-level books. This guide also covers many unsolved messages. The Zodiac Killer sent four encrypted messages to the police. One was solved; the other three were not. Beatrix Potter's diary and the Voynich Manuscript were both encrypted - to date, only one of the two has been deciphered. The breaking of the so-called Zimmerman Telegram during the First World War changed the course of history. Several encrypted wartime military messages remain unsolved to this day. Tens of thousands of other encrypted messages, ranging from simple notes created by children to encrypted postcards and diaries in people's attics, are known to exist. Breaking these cryptograms fascinates people all over the world, and often gives people insight into the lives of their ancestors. Geocachers, computer gamers and puzzle fans also require codebreaking skills. This is a book both for the growing number of enthusiasts obsessed with real-world mysteries, and also fans of more challenging puzzle books. Many people are obsessed with trying to solve famous crypto mysteries, including members of the Kryptos community (led by Elonka Dunin) trying to solve a decades-old cryptogram on a sculpture at the centre of CIA Headquarters; readers of the novels of Dan Brown as well as Elonka Dunin's The Mammoth Book of Secret Code Puzzles (UK)/The Mammoth Book of Secret Codes and Cryptograms (US); historians who regularly encounter encrypted documents; perplexed family members who discover an encrypted postcard or diary in an ancestor's effects; law-enforcement agents who are confronted by encrypted messages, which also happens more often than might be supposed; members of the American Cryptogram Association (ACA); geocachers (many caches involve a crypto puzzle); puzzle fans; and computer gamers (many games feature encryption puzzles). The book's focus is very much on breaking pencil-and-paper, or manual, encryption methods. Its focus is also largely on historical encryption. Although manual encryption has lost much of its importance due to computer technology, many people are still interested in deciphering messages of this kind.
The history of Special Operations Executive (SOE) seems to spring a never-ending run of surprises, and here are some more. This book explores the mysterious world of the tools SOE used for their missions of subversion and sabotage. An often grim reality is confronted that is more akin with the world of James Bond and Q's workshop than previously believed. Written by two scientists, one of whom served in the SOE and one who was tasked with clearing up after it was disbanded; their insider knowledge presents a clear account of the way in which SOE's inventors worked. From high explosive technology to chemical and biological devices; from the techniques of air supply to incendiarism; from camouflage to underwater warfare; and from radio communications to weaponry. SOE: The Scientific Secrets is a revelation about the tools that allowed the murky world of spying and spies to operate during wartime.
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures. Covering the apartheid period of 1948-90, the transition from apartheid to democracy of 1990-94, and the post-apartheid period of new intelligence dispensation from 1994-2005, this book examines not only the apartheid government's intelligence dispensation and operations, but also those of the African National Congress, and its partner, the South African Communist Party (ANC/SACP) - as well as those of other liberation movements and the 'independent homelands' under the apartheid system. Examining the civilian, military and police intelligence structures and operations in all periods, as well as the extraordinarily complicated apartheid government's security bureaucracy (or 'securocracy') and its structures and units, the book discusses how South Africa's Cold War 'position' influenced its relationships with various other world powers, especially where intelligence co-operation came to bear. It outlines South Africa's regional relationships and concerns - the foremost being its activities in South-West Africa (Namibia) and its relationship with Rhodesia through 1980. Finally, it examines the various legislative and other governance bases for the existence and operations of South Africa's intelligence structures - in all periods - and the influences that such activities as the Rivonia Trial (at one end of the history) or the Truth and Reconciliation Commission (at the other end) had on the evolution of these intelligence questions throughout South Africa's modern history. This book will be of great interest to all students of South African politics, intelligence studies and international politics in general.
Australia was born with its eyes wide open. Although politicians spoke publicly of loyalty to Britain and the empire, in secret they immediately set about protecting Australia's interests from the Germans, the Japanese - and from Britain itself. As an experienced intelligence officer, John Fahey knows how the security services disguise their activities within government files. He has combed the archives to compile the first account of Australia's intelligence operations in the years from Federation to World War II. He tells the stories of dedicated patriots who undertook dangerous operations to protect their new nation, despite a lack of training and support. He shows how the early adoption of advanced radio technology by Australia contributed to the war effort in Europe. He also exposes the bureaucratic mismanagement in World War II that cost many lives, and the leaks that compromised Australia's standing with its wartime allies so badly that Australia was nearly expelled from the Anglo-Saxon intelligence network. Australia's First Spies shows Australia always has been a far savvier operator in international affairs than much of the historical record suggests, and it offers a glimpse into the secret history of the nation.
The secret history of MI6 - from the Cold War to the present day. The British Secret Service has been cloaked in secrecy and shrouded in myth since it was created a hundred years ago. Our understanding of what it is to be a spy has been largely defined by the fictional worlds of James Bond and John le Carre. THE ART OF BETRAYAL provides a unique and unprecedented insight into this secret world and the reality that lies behind the fiction. It tells the story of how the secret service has changed since the end of World War II and by focusing on the people and the relationships that lie at the heart of espionage, revealing the danger, the drama, the intrigue, the moral ambiguities and the occasional comedy that comes with working for British intelligence. From the defining period of the early Cold War through to the modern day, MI6 has undergone a dramatic transformation from a gung-ho, amateurish organisation to its modern, no less controversial, incarnation. Gordon Corera reveals the triumphs and disasters along the way. The grand dramas of the Cold War and after - the rise and fall of the Berlin Wall, the Cuban Missile Crisis, the 11 September 2001 attacks and the Iraq war - are the backdrop for the human stories of the individual spies whose stories form the centrepiece of the narrative. But some of the individuals featured here, in turn, helped shape the course of those events. Corera draws on the first-hand accounts of those who have spied, lied and in some cases nearly died in service of the state. They range from the spymasters to the agents they ran to their sworn enemies. Many of these accounts are based on exclusive interviews and access. From Afghanistan to the Congo, from Moscow to the back streets of London, these are the voices of those who have worked on the front line of Britain's secret wars. And the truth is often more remarkable than the fiction.
Tony Brooks was unique. He was barely out of school when recruited in 1941 by the Special Operations Executive (SOE), the wartime secret service established by Churchill to 'set Europe ablaze'. After extensive training he was parachuted into France in July 1942 - being among the first (and youngest) British agents sent to support the nascent French Resistance. Brook's success was primarily due to his exceptional qualities as a secret agent, although he was aided by large and frequent slices of luck. Among much else, he survived brushes with a British traitor and a notorious double agent; the Gestapo's capture of his wireless operator and subsequent attempts to trap Brooks; brief incarceration in a Spanish concentration camp; injuries resulting from a parachute jump into France; and even capture and interrogation by the Gestapo - although his cover story held and he was released. In an age when we so often take our heroes from the worlds of sport, film, television, music, fashion, or just 'celebrity', it is perhaps salutary to be reminded of a young man who ended the war in command of a disparate force of some 10,000 armed resistance fighters, and decorated with two of this country's highest awards for gallantry, the DSO and MC. At the time, he was just twenty-three years old. This remarkable, detailed and intimate account of a clandestine agent's dangerous wartime career combines the historian's expert eye with the narrative colour of remembered events. As a study in courage, it has few, if any, equals.
Exactly a century ago, intelligence agencies across Europe first became aware of a fanatical German nationalist whose political party was rapidly gathering momentum. His name was Adolf Hitler. From 1933, these spy services watched with growing alarm as they tried to determine what sort of threat Hitler's regime would now pose to the rest of Europe. Would Germany rearm, either covertly or in open defiance of the outside world? Would Hitler turn his attention eastwards - or did he also pose a threat to the west? What were the feelings and attitudes of ordinary Germans, towards their own regime as well as the outside world? Despite intense rivalry and mistrust between them, these spy chiefs began to liaise and close ranks against Nazi Germany. At the heart of this loose, informal network were the British and French intelligence services, alongside the Poles and Czechs. Some other countries - Holland, Belgium, and the United States - stood at the periphery. Drawing on a wide range of previously unpublished British, French, German, Danish, and Czech archival sources, Spying on the Reich tells the story of Germany and its rearmament in the 1920s and 1930s; its relations with foreign governments and their intelligence services; and the relations and rivalries between Western governments, seen through the prism of the cooperation, or lack of it, between their spy agencies. Along the way, it addresses some of the most intriguing questions that still perplex historians of the period, such as how and why Britain defended Poland in September 1939, and what alternative policies could have been pursued?
Builds a revisionary theoretical framework for researching intelligence knowledge and applies it to the Swedish Military and Security DirectorateGunilla Eriksson revises our perception of intelligence as carefully collected data and objective truth, arguing that there are hidden aspects to intelligence analysis that need to be uncovered and critically examined. This twofold study investigates the character of intelligence knowledge and the social context in which it is produced, using the Swedish Military and Security Directorate (MUST) as a case study.Eriksson argues that there is an implicit framework that continuously influences knowledge production: what kind of data is considered relevant, how this data is interpreted and the specific social and linguistic context of the organisation, surrounded by unarticulated norms and specific procedures. She asks whether these conventions hamper or obstruct intelligence assessments; an essential analysis, given that history has shown us the grave consequences basing policy on intelligence's wrong conclusions.Sources includeThe annual Swedish Armed Forces Strategic Intelligence Estimates from 1998 2010Lengthy and highly valuable interviews with the analysts, including managers, working at MUST, giving insights into everyday life at the institution and leading to many important resultsParticipant observation carried out by the author at MUST working meetings and seminars during the production process of the 2010 estimate, and drawing on her experience from her years working as an active analyst
Aged nineteen, Alison McKelvie was a self-confessed romantic, immersed in books and poetry, and dreaming of beauty, truth and love. In 1940, whilst working as a secretary at MI6, Alison met Alexander Wilson. Thirty years her senior, Alexander was worldly and charismatic. An intense affair quickly led to marriage and two children. But the Wilsons' lives then spiralled into the depths of poverty. Alexander was sacked, imprisoned twice, and then declared bankrupt. His lack of reliability was a hefty emotional burden for Alison to bear. Nevertheless, she loved her husband unreservedly and stuck by him through thick and thin. In 1963, Alexander died suddenly of a heart attack. Alison's world imploded when she discovered that their life together had been built upon layer after layer of deception. Who was Alexander Wilson? How well had Alison really known him? Slowly the lies were unravelled: Alexander had been a novelist, spy and, devastatingly, a bigamist. Alison was the third of four wives, her children two of seven. The inspiration for critically-acclaimed drama Mrs Wilson, Before & After is the powerful and poignant memoir of Alison Wilson. 'Before' peels back the complex layers of a marriage steeped in lies, and the shattering heartbreak which followed. 'After' tells of an intensely-felt redemption through religion. Before & After is, first and foremost, a love story, but it is also an account of one extraordinarily strong woman's deep, unwavering faith.
Alongside the open conflict of World War II there were other, hidden wars - the wars of communication, in which success depended on a flow of concealed and closely-guarded information. Smuggled written messages, secretly transmitted wireless signals, or months of eavesdropping on radio traffic meant operatives could discover in advance what the enemy intended to do. This information was passed on to those who commanded the armies, the fleets and the bomber formations, as well as to the other secret agents throughout the world who were desperately trying to infiltrate enemy lines. Vital information that turned the tide of battle in North African desert and on the Pacific Ocean proved to have been obtained by the time-consuming and unglamorous work of cryptanalysts who deciphered the enemy's coded messages, and coded those for the Allies. From the stuffy huts of Bletchley Park to the battles in the Mediterranean, the French and Dutch Resistance movements and the unkempt radio operatives in Burma, the rarely-seen, outstanding stories collected here reveal the true extent of the 'secret war'. The ongoing need for secrecy for decades after the war meant that the outstanding achievements of wartime cryptanalysts could not be properly recognised. With vivid first-hand accounts and illuminating historical research, VOICES OF THE CODEBREAKERS reveals and finally celebrates the extraordinary accomplishments of these ordinary men and women.
Master of Deception is a biography of Peter Fleming, elder brother of Ian Fleming, creator of James Bond. Peter Fleming worked as a travel writer and journalist, serving with distinction throughout World War II and played a crucial role in British intelligence operations in the Far East. This biography ranges from the personal life of Fleming such as his marriage to Celia Johnson, a famous actor of the time, to his extensive military intelligence career which took him from Norway and Greece to the Far East. Framed through the life of Peter Fleming this book offers an in-depth study of British intelligence operations in the Far East during World War II.
It is, of course, no secret that undercover Special Forces and intelligence agencies operated in Northern Ireland and the Republic throughout the 'troubles', from 1969 to 2001 and beyond. What is less well known is how these units were recruited, how they operated, what their mandate was and what they actually did. This is the first account to reveal much of this hitherto unpublished information, providing a truly unique record of surveillance, reconnaissance, intelligence gathering, collusion and undercover combat. An astonishing number of agencies were active to combat the IRA murder squads ('the Provos'), among others the Military Reaction Force (MRF) and the Special Reconnaissance Unit, also known as the 14 Field Security and Intelligence Company ('The Det'), as well as MI5, Special Branch, the RUC, the UDR and the Force Research Unit (FRU), later the Joint Support Group (JSG)). It deals with still contentious and challenging issues as shoot-to-kill, murder squads, the Disappeared, and collusion with loyalists. It examines the findings of the Stevens, Cassel and De Silva reports and looks at operations Loughgall, Andersonstown, Gibraltar and others.
Sometime in the late fall/early winter of 1962, a document began circulating among members of the Communist Party USA based in the Chicago area, titled "Whither the Party of Lenin." It was signed "The Ad Hoc Committee for Scientific Socialist Line." This was not the work of factionally inclined CP comrades, but rather something springing from the counter-intelligence imagination of the FBI. A Threat of the First Magnitude tells the story of the FBI's fake Maoist organization and the informants they used to penetrate the highest levels of the Communist Party USA, the Black Panther Party, the Revolutionary Union and other groups labelled threats to the internal security of the United States in the 1960s and 1970s. As once again the FBI is thrust into the spotlight of US politics, A Threat of a First Magnitude offers a view of the historic inner-workings of the Bureau's counterintelligence operations - from generating "fake news" and the utilization of "sensitive intelligence methods" to the handling of "reliable sources" - that matches or exceeds the sophistication of any contenders.
The role of intelligence in US government operations has changed dramatically and is now more critical than ever to domestic security and foreign policy. This authoritative and highly researched book written by Jeffrey T. Richelson provides a detailed overview of America's vast intelligence empire, from its organizations and operations to its management structure. Drawing from a multitude of sources, including hundreds of official documents, The US Intelligence Community allows students to understand the full scope of intelligence organizations and activities, and gives valuable support to policymakers and military operations. The seventh edition has been fully revised to include a new chapter on the major issues confronting the intelligence community, including secrecy and leaks, domestic spying, and congressional oversight, as well as revamped chapters on signals intelligence and cyber collection, geospatial intelligence, and open sources. The inclusion of more maps, tables and photos, as well as electronic briefing books on the book's Web site, makes The US Intelligence Community an even more valuable and engaging resource for students.
This volume discusses the challenges the future holds for different aspects of the intelligence process and for organisations working in the field. The main focus of Western intelligence services is no longer on the intentions and capabilities of the Soviet Union and its allies. Instead, at present, there is a plethora of threats and problems that deserve attention. Some of these problems are short-term and potentially acute, such as terrorism. Others, such as the exhaustion of natural resources, are longer-term and by nature often more difficult to foresee in their implications. This book analyses the different activities that make up the intelligence process, or the 'intelligence cycle', with a focus on changes brought about by external developments in the international arena, such as technology and security threats. Drawing together a range of key thinkers in the field, The Future of Intelligence examines possible scenarios for future developments, including estimations about their plausibility, and the possible consequences for the functioning of intelligence and security services. This book will be of much interest to students of intelligence studies, strategic studies, foreign policy, security studies and IR in general.
This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process. The concept of the intelligence cycle has been central to the study of intelligence. As Intelligence Studies has established itself as a distinctive branch of Political Science, it has generated its own foundational literature, within which the intelligence cycle has constituted a vital thread - one running through all social-science approaches to the study of intelligence and constituting a staple of professional training courses. However, there is a growing acceptance that the concept neither accurately reflects the intelligence process nor accommodates important elements of it, such as covert action, counter-intelligence and oversight. Bringing together key authors in the field, the book considers these questions across a number of contexts: in relation to intelligence as a general concept, military intelligence, corporate/private sector intelligence and policing and criminal intelligence. A number of the contributions also go beyond discussion of the limitations of the cycle concept to propose alternative conceptualisations of the intelligence process. What emerges is a plurality of approaches that seek to advance the debate and, as a consequence, Intelligence Studies itself. This book will be of great interest to students of intelligence studies, strategic studies, criminology and policing, security studies and IR in general, as well as to practitioners in the field.
The conflict in Iraq is characterized by three faces of war: interstate conflict, civil war, and insurgency. The Coalition’s invasion of Iraq in March 2003 began as an interstate war. No sooner had Saddam Hussein been successfully deposed, however, than U.S.-led forces faced a lethal insurgency. After Sunni al Qaeda in Iraq bombed the Shia al-Askari Shrine in 2006, the burgeoning conflict took on the additional element of civil war with sectarian violence between the Sunni and the Shia. The most effective strategies in a war as complicated as the three-level conflict in Iraq are intertwined and complementary, according to the editors of this volume. For example, the “surge” in U.S. troops in 2007 went beyond an increase in manpower; the mission had changed, giving priority to public security. This new direction also simultaneously addressed the insurgency as well as the civil war by forging new, trusting relationships between Americans and Iraqis and between Sunni and Shia. This book has broad implications for future decisions about war and peace in the twenty-first century.
The author examines in detail the organization of the U.S. intelligence community, its attempts to monitor and predict the development of Soviet forces from the early days of the cold war, and how these attempts affected American policy and weapons production. Originally published in 1987. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These paperback editions preserve the original texts of these important books while presenting them in durable paperback editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
The World War II codebreaking station at Bletchley is well-known and its activities documented in detail. Its decryption capabilities were vital to the war effort, significantly aiding Allied victory. But where did the messages being deciphered come from in the first place? This is the extraordinary untold story of the Y-Service, a secret even more closely guarded than Bletchley Park. The Y-Service was the code for the chain of wireless intercept stations around Britain and all over the world. A few hundreds of wireless operators, many of them who were civilians, listened to German, Italian and Japanese radio networks and meticulously logged everything they heard. Some messages were then used tactically but most were sent on to Station X - Bletchley Park - where they were deciphered, translated and consolidated to build a comprehensive overview of the enemy's movements and intentions. Peter Hore delves into the fascinating history of the Y-service, with particular reference to the girls of the Women's Royal Naval Service: Wrens who escaped from Singapore to Colombo as the war raged, only to be torpedoed in the Atlantic on their way back to Britain; the woman who had a devastatingly true premonition that disaster would strike on her way to Gibraltar; the Australian who went from being captain of the English Women's Cricket team to a WWII Wren to the head of Abbotleigh girls school in Sydney; how the Y-service helped to hunt the German battleship Bismarck in the North Atlantic, and how it helped to torpedo a Japanese cruiser in the Indian Ocean. Together, these incredible stories build a picture of World War II as it has never been viewed before.
This book discusses the application of hypothesis testing to the practice of intelligence analysis. By drawing on longstanding procedures of scientific method, particularly hypothesis testing, this book strongly critiques standard intelligence analytic practices. It shows these practices to be inadequate, as they are illogical in terms of what formal philosophy says any intelligence analysts can realistically be expected to know, and for the future when analysts will face pressures to adapt to digital age modeling techniques. The methodology focuses on identifying and remedying analytic errors caused by analyst cognitive biases and by foreign denial and deception. To demonstrate that it is a practical tool, it walks analysts through a case study, step by step, to show how its hypothesis testing can be implemented. It also invites a comparative test in the real world with any other intelligence methodologies to assess its strengths and weaknesses in predicting the outcome of an actual "live" intelligence issue. This book will be of much interest to students of intelligence studies, public policy and national security, as well as practitioners.
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?
In 1974, the British government admitted that its WWII secret intelligence organization had read Germany's ciphers on a massive scale. The intelligence from these decrypts influenced the Atlantic, the Eastern Front and Normandy. Why did the Germans never realize the Allies had so thoroughly penetrated their communications? As German intelligence experts conducted numerous internal investigations that all certified their ciphers' security, the Allies continued to break more ciphers and plugged their own communication leaks. How were the Allies able to so thoroughly exploit Germany's secret messages? How did they keep their tremendous success a secret? What flaws in Germany's organization allowed this counterintelligence failure and how can today's organizations learn to avoid similar disasters? This book, the first comparative study of WWII SIGINT (Signals Intelligence), analyzes the characteristics that allowed the Allies SIGINT success and that fostered the German blindness to Enigma's compromise.
Most books about espionage in the American Revolutionary War tend to focus solely on General George Washington, but as noted historian Donald E. Markle explores in this fascinating account, there was an entire system of intelligence communication autonomous from his direction. General Washington and General Charles Cornwallis were engaged in a constant battle to outmaneuver each other, and Cornwallis seemed to always be one step behind Washington and his intelligence departments. As the war progressed, the Americans and British slowly learned one another's tactics, allowing the hunt between the fox (Washington) and the hound (Cornwallis). THE FOX AND THE HOUND walks readers through the early stages of the war, when gathering and distributing intelligence was a challenge without a centralized government to organize a network. Markle tells us how and why Washington created multiple intelligence-gathering departments within the colonies, which included most of the East Coast from Georgia to New Hampshire and even parts of Canada--all operating under a command structure unique to their surrounding geography. This book explores the many depths of the intelligence networks from civilian men and women who dedicated their lives to the American cause, to the introduction of code ciphers and the first spy equipment such as David Bushnell's turtle submarine and Benjamin Franklin's jet boat. Without the dedication of Washington and his innovative loyal supporters, it's quite possible that the outcome of the war may have been different. Military and American history enthusiasts will find this a valuable resource for their collections.
|
You may like...
Handbook of Theories for Purchasing…
Wendy L. Tate, Lisa M. Ellram, …
Hardcover
R7,938
Discovery Miles 79 380
Global Perspectives on Service Science…
Stephen K. Kwan, James C Spohrer, …
Hardcover
Supply Market Intelligence for…
Jeanette Jones, Kelly Barner
Hardcover
R1,645
Discovery Miles 16 450
Capital Equipment Purchasing…
Erik Hofmann, Daniel Maucher, …
Hardcover
R2,879
Discovery Miles 28 790
Detox Fashion - Case Studies
Subramanian Senthilkannan Muthu
Hardcover
R1,408
Discovery Miles 14 080
Strategic logistics management - A…
G. De Villiers, G. Nieman, …
Paperback
(1)R766 Discovery Miles 7 660
Fashion Supply Chain Management in Asia…
Bin Shen, Qingliang Gu, …
Hardcover
R3,332
Discovery Miles 33 320
|