0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (272)
  • R250 - R500 (607)
  • R500+ (5,288)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover): Suhasini Verma, Vidhisha Vyas, Keshav Kaushik Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover)
Suhasini Verma, Vidhisha Vyas, Keshav Kaushik
R6,925 Discovery Miles 69 250 Ships in 12 - 17 working days

Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.

Safety and Security Engineering VIII (Hardcover): M Guarascio, G. Passerini, F. Garzia, M. Lombardi Safety and Security Engineering VIII (Hardcover)
M Guarascio, G. Passerini, F. Garzia, M. Lombardi
R2,220 Discovery Miles 22 200 Ships in 10 - 15 working days

In its 8th edition the SAFE conference continues to publish important research contributing to the development of the field. The papers included in this volume are the work of engineers, scientists, field researchers, managers and other specialists involved in one or more of the theoretical and practical aspects of safety and security. Safety and Security Engineering, due to its special nature, is an interdisciplinary area of research and application that brings together in a systematic way, many disciplines of engineering, from the traditional to the most technologically advanced. This volume covers topics such as crisis management, security engineering, natural and man-made disasters and emergencies, risk management, and control, protection and mitigation issues. Specific themes include: Risk analysis, assessment and management; System safety engineering; Incident monitoring; Information and communication security; Disaster management; Emergency response; Critical infrastructure protection; Counter terrorism issues; Human factors; Transportation safety and security; Modelling and experiments; Security surveillance systems; Loss prevention; BIM in Safety and Security.

Advances in Wireless Communications and Applications - Smart Communications: Interactive Methods and Intelligent Algorithms,... Advances in Wireless Communications and Applications - Smart Communications: Interactive Methods and Intelligent Algorithms, Proceedings of 3rd ICWCA 2019 (Hardcover, 1st ed. 2021)
Roumen Kountchev, Aniket Mahanti, Shen Chong, Srikanta Patnaik, Margarita Favorskaya
R4,250 Discovery Miles 42 500 Ships in 10 - 15 working days

This book features selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. Focusing on applications of the latest smart theories and approaches, and recent advances in the field, it covers topics such as OFDM and multi-carrier techniques; smart antenna and space-time signal processing; MIMO, multi-user MIMO, and massive MIMO; modulation, coding, and diversity techniques; dynamic spectrum access and cognitive radio; interference management and radio resource allocation; equalization techniques; synchronization, estimation, and detection techniques; and wireless multiple access (e.g. CDMA, OFDMA, NOMA, ).

Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity (Hardcover): Victor Lobo, Anacleto Correia Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity (Hardcover)
Victor Lobo, Anacleto Correia
R6,511 Discovery Miles 65 110 Ships in 12 - 17 working days

The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for analysis and characterization of events regarding privacy and anomaly detection as well as for establishing predictive models for cyber attacks or privacy violations. It provides case studies of the use of these techniques and discusses the expected future developments on privacy and cybersecurity applications. Covering topics such as behavior-based authentication, machine learning attacks, and privacy preservation, this book is a crucial resource for IT specialists, computer engineers, industry professionals, privacy specialists, security professionals, consultants, researchers, academicians, and students and educators of higher education.

Network Security Essentials: Applications and Standards, Global Edition (Paperback, 6th edition): William Stallings Network Security Essentials: Applications and Standards, Global Edition (Paperback, 6th edition)
William Stallings
R1,994 Discovery Miles 19 940 Ships in 12 - 17 working days

For courses in Corporate, Computer and Network Security . Network Securities Essentials: Applications and Standards introduces students to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organisations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks. The 6th Edition covers the expanding developments in the cryptography and network security disciplines, giving students a practical survey of applications and standards. The text places emphasis on applications widely used for Internet and corporate networks, as well as extensively deployed internet standards.

Enabling Blockchain Technology for Secure Networking and Communications (Hardcover): Adel Ben Mnaouer, Lamia Chaari Fourati Enabling Blockchain Technology for Secure Networking and Communications (Hardcover)
Adel Ben Mnaouer, Lamia Chaari Fourati
R6,256 Discovery Miles 62 560 Ships in 12 - 17 working days

In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover)
Information R Management Association
R12,599 Discovery Miles 125 990 Ships in 10 - 15 working days
Proceedings of International Conference on Smart Computing and Cyber Security - Strategic Foresight, Security Challenges and... Proceedings of International Conference on Smart Computing and Cyber Security - Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) (Hardcover, 1st ed. 2021)
Prasant Kumar Pattnaik, Mangal Sain, Ahmed A. Al-Absi, Pardeep Kumar
R7,406 Discovery Miles 74 060 Ships in 10 - 15 working days

This book presents high-quality research papers presented at the International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) held during July 7-8, 2020, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea. The book includes selected works from academics and industrial experts in the field of computer science, information technology, and electronics and telecommunication. The content addresses challenges of cyber security.

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Hardcover, 1st ed. 2021): Matthew Ryan Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Hardcover, 1st ed. 2021)
Matthew Ryan
R4,897 Discovery Miles 48 970 Ships in 12 - 17 working days

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the 'ransomware revolution' after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.

Security and Privacy - Select Proceedings of ICSP 2020 (Hardcover, 1st ed. 2021): Pantelimon Stanica, Sugata Gangopadhyay,... Security and Privacy - Select Proceedings of ICSP 2020 (Hardcover, 1st ed. 2021)
Pantelimon Stanica, Sugata Gangopadhyay, Sumit Kumar Debnath
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.

International Symposium on Mathematics, Quantum Theory, and Cryptography - Proceedings of MQC 2019 (Hardcover, 1st ed. 2021):... International Symposium on Mathematics, Quantum Theory, and Cryptography - Proceedings of MQC 2019 (Hardcover, 1st ed. 2021)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R1,546 Discovery Miles 15 460 Ships in 12 - 17 working days

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.

Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover)
Rebecca Slayton
R3,096 Discovery Miles 30 960 Ships in 10 - 15 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Advanced Security and Privacy for RFID Technologies (Hardcover, New): Ali Miri Advanced Security and Privacy for RFID Technologies (Hardcover, New)
Ali Miri
R5,121 Discovery Miles 51 210 Ships in 12 - 17 working days

While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with security models and everyday threats and vulnerabilities. This informative publication not only addresses the security risks involved with RFID technologies, but also gives insight on some possible solutions and preventions. Researchers, professionals, and practitioners aiming to better understand the risks involved with these developing technologies will benefit from this book s expansive coverage on the topic.

HCI Challenges and Privacy Preservation in Big Data Security (Hardcover): Daphne Lopez, M.A. Saleem Durai HCI Challenges and Privacy Preservation in Big Data Security (Hardcover)
Daphne Lopez, M.A. Saleem Durai
R5,579 Discovery Miles 55 790 Ships in 10 - 15 working days

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.

Reversible Steganography and Authentication via Transform Encoding (Hardcover, 1st ed. 2020): Jyotsna Kumar Mandal Reversible Steganography and Authentication via Transform Encoding (Hardcover, 1st ed. 2020)
Jyotsna Kumar Mandal
R4,513 Discovery Miles 45 130 Ships in 10 - 15 working days

This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication. The book also describes algorithmic approaches based on all transformations along with implementation details and results. Further topics include embedding and extraction into the spatial domain, tuning using GA-based approaches and embedding into imaginary coefficients of the Z domain. Featuring detailed algorithms for encryption and descriptions of all techniques, including embedding techniques for all transform-based steganographic processes, the book also explores the adjustment of pixel values after embedding and presents numerical examples of reversible computations. In the context of chaos-based authentication, it also describes testing the quality of generator is using Monobit, Serial and Poker tests. The book then outlines 15 test cases recommended by NIST fifteen test cases, along with their implementation on six evolutionary algorithms for neural cryptographic systems in the context of wireless computations - TPM, KSOMSCT, DHLPSCT, CHDLPSCT, CTHLPSCT and CGTHLPSCT - and verifies their satisfiability based on the implementations of these six techniques. Lastly it presents various metrics of image processing systems. This book is a valuable reference resource for research scholars, PG/UG students and practicing engineers

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover)
Information R Management Association
R12,592 Discovery Miles 125 920 Ships in 10 - 15 working days
Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover)
Information R Management Association
R6,098 Discovery Miles 60 980 Ships in 10 - 15 working days
Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor,... Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21-23, 2020, Proceedings (Hardcover, 1st ed. 2020)
Lynette Drevin, Sune Von Solms, Marianthi Theocharidou
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.

Data Governance and Compliance - Evolving to Our Current High Stakes Environment (Hardcover, 1st ed. 2021): Rupa Mahanti Data Governance and Compliance - Evolving to Our Current High Stakes Environment (Hardcover, 1st ed. 2021)
Rupa Mahanti
R2,340 Discovery Miles 23 400 Ships in 12 - 17 working days

This book sets the stage of the evolution of corporate governance, laws and regulations, other forms of governance, and the interaction between data governance and other corporate governance sub-disciplines. Given the continuously evolving and complex regulatory landscape and the growing number of laws and regulations, compliance is a widely discussed issue in the field of data. This book considers the cost of non-compliance bringing in examples from different industries of instances in which companies failed to comply with rules, regulations, and other legal obligations, and goes on to explain how data governance helps in avoiding such pitfalls. The first in a three-volume series on data governance, this book does not assume any prior or specialist knowledge in data governance and will be highly beneficial for IT, management and law students, academics, information management and business professionals, and researchers to enhance their knowledge and get guidance in managing their own data governance projects from a governance and compliance perspective.

Certification and Security in Health-Related Web Applications - Concepts and Solutions (Hardcover): Anargyros Chryssanthou,... Certification and Security in Health-Related Web Applications - Concepts and Solutions (Hardcover)
Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis
R6,420 Discovery Miles 64 200 Ships in 12 - 17 working days

Certification and Security in Health-Related Web Applications: Concepts and Solutions aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications.

Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 1 (Hardcover, 1st ed. 2021): Sabu M.... Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 1 (Hardcover, 1st ed. 2021)
Sabu M. Thampi, Erol Gelenbe, Mohammed Atiquzzaman, Vipin Chaudhary, Kuan-Ching Li
R8,161 Discovery Miles 81 610 Ships in 12 - 17 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.

Applied Approach to Privacy and Security for the Internet of Things (Hardcover): Parag Chatterjee, Emmanuel Benoist, Asoke Nath Applied Approach to Privacy and Security for the Internet of Things (Hardcover)
Parag Chatterjee, Emmanuel Benoist, Asoke Nath
R6,767 Discovery Miles 67 670 Ships in 12 - 17 working days

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

Tor and the Deep Web - Bitcoin, DarkNet & Cryptocurrency (2 in 1 Book) 2017-18: NSA Spying Defeated (Paperback): Lance Henderson Tor and the Deep Web - Bitcoin, DarkNet & Cryptocurrency (2 in 1 Book) 2017-18: NSA Spying Defeated (Paperback)
Lance Henderson
R405 Discovery Miles 4 050 Ships in 12 - 17 working days
Multimedia Security Using Chaotic Maps: Principles and Methodologies (Hardcover, 1st ed. 2020): Khalid M. Hosny Multimedia Security Using Chaotic Maps: Principles and Methodologies (Hardcover, 1st ed. 2020)
Khalid M. Hosny
R2,815 Discovery Miles 28 150 Ships in 10 - 15 working days

This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields. It is also a valuable reference resource for postgraduate and senior undergraduate students who are studying multimedia, multimedia security, and information security, as well as for professionals in the IT industry.

Malware Analysis Using Artificial Intelligence and Deep Learning (Hardcover, 1st ed. 2021): Mark Stamp, Mamoun Alazab, Andrii... Malware Analysis Using Artificial Intelligence and Deep Learning (Hardcover, 1st ed. 2021)
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
R4,951 Discovery Miles 49 510 Ships in 12 - 17 working days

This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,190 Discovery Miles 81 900
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,616 Discovery Miles 56 160
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,256 Discovery Miles 62 560
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R619 Discovery Miles 6 190
Ethical Hacking for Beginners - How to…
Attila Kovacs Hardcover R844 R699 Discovery Miles 6 990
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R996 Discovery Miles 9 960
Handbook of Research on Advancing…
Kamaljeet Sandhu Hardcover R7,909 Discovery Miles 79 090
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,949 R6,257 Discovery Miles 62 570
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,256 Discovery Miles 62 560

 

Partners