0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (192)
  • R250 - R500 (614)
  • R500+ (5,204)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Security Solutions for Hyperconnectivity and the Internet of Things (Hardcover): Maurice Dawson, Mohamed Eltayeb, Marwan Omar Security Solutions for Hyperconnectivity and the Internet of Things (Hardcover)
Maurice Dawson, Mohamed Eltayeb, Marwan Omar
R5,374 Discovery Miles 53 740 Ships in 18 - 22 working days

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.

Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017): Nilanjan Dey, V. Santhi Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017)
Nilanjan Dey, V. Santhi
R4,903 Discovery Miles 49 030 Ships in 10 - 15 working days

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.

Cybersecurity Breaches and Issues Surrounding Online Threat Protection (Hardcover): Michelle Moore Cybersecurity Breaches and Issues Surrounding Online Threat Protection (Hardcover)
Michelle Moore
R4,916 Discovery Miles 49 160 Ships in 18 - 22 working days

Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats. Cybersecurity Breaches and Issues Surrounding Online Threat Protection is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology.

Fundamentals of Network Security (Hardcover): John E. Canavan Fundamentals of Network Security (Hardcover)
John E. Canavan
R2,425 Discovery Miles 24 250 Ships in 18 - 22 working days

Network security has quickly become an area of primary concern in the world of telecommunications. This easy-to-understand book introduces professionals to fundamental network security concepts, principles, and terms, while providing practical techniques that can be applied on the job. It helps identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.

Handbook of Software Engineering (Hardcover, 1st ed. 2019): Sungdeok Cha, Richard N. Taylor, Kyo-Chul Kang Handbook of Software Engineering (Hardcover, 1st ed. 2019)
Sungdeok Cha, Richard N. Taylor, Kyo-Chul Kang
R5,237 Discovery Miles 52 370 Ships in 18 - 22 working days

This handbook provides a unique and in-depth survey of the current state-of-the-art in software engineering, covering its major topics, the conceptual genealogy of each subfield, and discussing future research directions. Subjects include foundational areas of software engineering (e.g. software processes, requirements engineering, software architecture, software testing, formal methods, software maintenance) as well as emerging areas (e.g., self-adaptive systems, software engineering in the cloud, coordination technology). Each chapter includes an introduction to central concepts and principles, a guided tour of seminal papers and key contributions, and promising future research directions. The authors of the individual chapters are all acknowledged experts in their field and include many who have pioneered the techniques and technologies discussed. Readers will find an authoritative and concise review of each subject, and will also learn how software engineering technologies have evolved and are likely to develop in the years to come. This book will be especially useful for researchers who are new to software engineering, and for practitioners seeking to enhance their skills and knowledge.

Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020): Shishir K. Shandilya, Neal Wagner, Atulya... Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020)
Shishir K. Shandilya, Neal Wagner, Atulya K. Nagar
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.

Security and Privacy in Smart Sensor Networks (Hardcover): Yassine Maleh, Abdellah Ezzati, Mustapha Belaissaoui Security and Privacy in Smart Sensor Networks (Hardcover)
Yassine Maleh, Abdellah Ezzati, Mustapha Belaissaoui
R5,399 Discovery Miles 53 990 Ships in 18 - 22 working days

Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource that examines recent developments and emerging trends in smart sensor security and privacy by providing new models, practical solutions, and technological advances related to security. Featuring coverage on a broad range of topics such as cloud security, encryption, and intrusion detection systems, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on authentication and intrusion detection.

Python Passive Network Mapping - P2NMAP (Paperback): Chet Hosmer Python Passive Network Mapping - P2NMAP (Paperback)
Chet Hosmer
R1,359 Discovery Miles 13 590 Ships in 10 - 15 working days

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.

Critical Infrastructure Protection Research - Results of the First Critical Infrastructure Protection Research Project in... Critical Infrastructure Protection Research - Results of the First Critical Infrastructure Protection Research Project in Hungary (Hardcover, 1st ed. 2016)
Laszlo Nadai, Jozsef Padanyi
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TAMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatornics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Obuda University and the National University of Public Service.

Cloud Computing: Security and Management (Hardcover): Conor Suarez Cloud Computing: Security and Management (Hardcover)
Conor Suarez
R3,167 R2,870 Discovery Miles 28 700 Save R297 (9%) Ships in 18 - 22 working days
Reactor Core Monitoring - Background, Theory and Practical Applications (Hardcover, 1st ed. 2017): Mihaly Makai, Janos Vegh Reactor Core Monitoring - Background, Theory and Practical Applications (Hardcover, 1st ed. 2017)
Mihaly Makai, Janos Vegh
R4,641 R3,570 Discovery Miles 35 700 Save R1,071 (23%) Ships in 10 - 15 working days

This book presents a comprehensive overview of the computerized core monitoring techniques currently employed at pressurized water reactor (PWR) and boiling water reactor (BWR) nuclear power plants. It also offers a brief overview of the corresponding techniques at research and materials testing reactors. The book combines detailed descriptions of the theoretical background and fundamental underlying principles as well as the practical applications of core surveillance. It not only provides numerous industrial examples to illustrate how complex computerized systems are able to support the safe operation of nuclear reactors, but also outlines some new application areas that were made possible only by state-of-the-art computing resources. Thanks to its practical approach, it serves as a valuable and practical reference book for readers interested in the surveillance of nuclear reactors, ranging from undergraduate and postgraduate students to researchers and experts working at research reactors and nuclear power plants, as well as at nuclear regulatory authorities.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover)
George Mansour
R623 Discovery Miles 6 230 Ships in 18 - 22 working days
Privacy Solutions and Security Frameworks in Information Protection (Hardcover): Hamid R. Nemati Privacy Solutions and Security Frameworks in Information Protection (Hardcover)
Hamid R. Nemati
R4,922 Discovery Miles 49 220 Ships in 18 - 22 working days

While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.

Computer and Intrusion Forensics (Hardcover): George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish Computer and Intrusion Forensics (Hardcover)
George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish
R2,583 Discovery Miles 25 830 Ships in 18 - 22 working days

A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.

Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,193 Discovery Miles 31 930 Ships in 18 - 22 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

HCISPP Study Guide (Paperback): Timothy Virtue, Justin Rainey HCISPP Study Guide (Paperback)
Timothy Virtue, Justin Rainey
R1,205 Discovery Miles 12 050 Ships in 10 - 15 working days

The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC(2). The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted to the special demands of health care information security. Tim Virtue and Justin Rainey have created the HCISPP Study Guide to walk you through all the material covered in the exam's Common Body of Knowledge. The six domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the six domains has its own chapter that includes material to aid the test-taker in passing the exam, as well as a chapter devoted entirely to test-taking skills, sample exam questions, and everything you need to schedule a test and get certified. Put yourself on the forefront of health care information privacy and security with the HCISPP Study Guide and this valuable certification.

Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019): N. Jeyanthi, Ajith Abraham, Hamid Mcheick Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019)
N. Jeyanthi, Ajith Abraham, Hamid Mcheick
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Security in Smart Cities: Models, Applications, and Challenges (Hardcover, 1st ed. 2019): Aboul Ella Hassanien, Mohamed... Security in Smart Cities: Models, Applications, and Challenges (Hardcover, 1st ed. 2019)
Aboul Ella Hassanien, Mohamed Elhoseny, Syed Hassan Ahmed, Amit Kumar Singh
R2,702 Discovery Miles 27 020 Ships in 18 - 22 working days

This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges. Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications.

Managing Online Risk - Apps, Mobile, and Social Media Security (Paperback): Deborah Gonzalez Managing Online Risk - Apps, Mobile, and Social Media Security (Paperback)
Deborah Gonzalez
R813 Discovery Miles 8 130 Ships in 10 - 15 working days

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book.

Cyber-Physical Systems: Architecture, Security and Application (Hardcover, 1st ed. 2019): Song Guo, Deze Zeng Cyber-Physical Systems: Architecture, Security and Application (Hardcover, 1st ed. 2019)
Song Guo, Deze Zeng
R3,805 Discovery Miles 38 050 Ships in 18 - 22 working days

This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements. Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy

How to Attack and Defend Your Website (Paperback): Henry Dalziel How to Attack and Defend Your Website (Paperback)
Henry Dalziel; Edited by Alejandro Caceres
R826 Discovery Miles 8 260 Ships in 10 - 15 working days

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools - most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

Hacking and Penetration Testing with Low Power Devices (Paperback): Philip Polstra Hacking and Penetration Testing with Low Power Devices (Paperback)
Philip Polstra
R1,141 Discovery Miles 11 410 Ships in 10 - 15 working days

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!

Information Security - A Manager's Guide to Thwarting Data Thieves and Hackers (Hardcover): Philip Alexander Information Security - A Manager's Guide to Thwarting Data Thieves and Hackers (Hardcover)
Philip Alexander
R2,048 Discovery Miles 20 480 Ships in 18 - 22 working days

Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by a practicing information security officer, Philip Alexander, the book contains the latest information and arms readers with the knowledge they need to make better business decisions. Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers covers the following technical issues in a nontechnical manner: -The concept of "defense in depth" -Network design -Business-continuity planning -Authentication and authorization -Providing security for your mobile work force -Hackers and the challenges they can present -Viruses, Trojans, and worms But it doesn't stop there. The book goes beyond the technical and covers highly important topics related to data security like outsourcing, contractual considerations with vendors, data privacy laws, and hiring practices. In short, Alexander gives the reader a 360-degree look at data security: What to be worried about; what to look for; the tradeoffs among cost, efficiency, and speed; what different technologies can and can't do; and how to make sure technical professionals are keeping their eyes on the right ball. Best of all, it conveys informationin an understandable way, meaning managers won't need to rely solely on the IT people in their own company--who may speak an entirely different language and have entirely different concerns. Hackers and data thieves are getting smarter and bolder every day. Information Security is your first line of defense.

Introduction to US Cybersecurity Careers (Paperback): Henry Dalziel Introduction to US Cybersecurity Careers (Paperback)
Henry Dalziel
R838 Discovery Miles 8 380 Ships in 10 - 15 working days

Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.

How to Defeat Advanced Malware - New Tools for Protection and Forensics (Paperback): Henry Dalziel How to Defeat Advanced Malware - New Tools for Protection and Forensics (Paperback)
Henry Dalziel; Edited by Simon Crosby
R777 Discovery Miles 7 770 Ships in 10 - 15 working days

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Everyday Making of EU Foreign and…
Niklas Bremberg, August Danielson, … Hardcover R3,172 Discovery Miles 31 720
Medical Professionals - Conflicts and…
Kathleen Montgomery, Wendy Lipworth Paperback R1,289 Discovery Miles 12 890
The Ambassador's Club - The Indian…
K. V. Rajan Hardcover R505 Discovery Miles 5 050
Handbook of Research on Digital…
Ana Pego Hardcover R7,723 Discovery Miles 77 230
Focus On Operational Management - A…
Andreas de Beer, Dirk Roussow Paperback R521 Discovery Miles 5 210
Unanticipated Gains - Origins of Network…
Mario Luis Small Hardcover R1,233 Discovery Miles 12 330
Leadership Strategies for the Hybrid…
Matthew Ohlson, Lakshmi Goel Hardcover R6,182 Discovery Miles 61 820
Blood and Sand - Suez, Hungary, and…
Alex von Tunzelmann Paperback R455 Discovery Miles 4 550
Japanese Historiography and the Gold…
Joshua A. Fogel Hardcover R4,979 Discovery Miles 49 790
Places in Motion - The Fluid Identities…
Jacob N. Kinnard Hardcover R3,839 Discovery Miles 38 390

 

Partners