0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (182)
  • R250 - R500 (603)
  • R500+ (5,304)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Sustainable Logistics and Production in Industry 4.0 - New Opportunities and Challenges (Hardcover, 1st ed. 2020): Katarzyna... Sustainable Logistics and Production in Industry 4.0 - New Opportunities and Challenges (Hardcover, 1st ed. 2020)
Katarzyna Grzybowska, Anjali Awasthi, Rapinder Sawhney
R4,589 Discovery Miles 45 890 Ships in 10 - 15 working days

This book proposes essential methods, models, and case studies for Sustainable Logistics and Production in Industry 4.0. In addition to identifying and discussing various challenges and future prospects, it also features numerous case studies and quantitative research from different sectors. The authors (which include academics and managers) present insightful tips on the technical, organizational and social aspects of implementing Sustainable Logistics and Production in Industry 4.0. In today's world, changes are coming faster and more unpredictably. Production is becoming more automated, computerized and complex. In short, Industry 4.0 is creating many new opportunities, but at the same time several new challenges. This book offers a valuable resource for all academics and practitioners who want to deepen their knowledge of Sustainable Logistics and Production in Industry 4.0.

Critical Infrastructure Security - Assessment, Prevention, Detection, Response (Hardcover): Francesco Flammini Critical Infrastructure Security - Assessment, Prevention, Detection, Response (Hardcover)
Francesco Flammini
R5,483 Discovery Miles 54 830 Ships in 10 - 15 working days

This book provides a comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, addressing both logical and physical aspects from an engineering point of view. Recently developed methodologies and tools for CI analysis as well as strategies and technologies for CI protection are investigated in the following strongly interrelated and multidisciplinary main fields: - Vulnerability analysis and risk assessment - Threat prevention, detection and response - Emergency planning and management Each of the aforementioned topics is addressed considering both theoretical aspects and practical applications. Emphasis is given to model-based holistic evaluation approaches as well as to emerging protection technologies, including smart surveillance through networks of intelligent sensing devices. Critical Infrastructure Security can be used as a self-contained reference handbook for both practitioners and researchers or even as a textbook for master/doctoral degree students in engineering or related disciplines.More specifically, the topic coverage of the book includes: - Historical background on threats to critical infrastructures - Model-based risk evaluation and management approaches - Security surveys and game-theoretic vulnerability assessment - Federated simulation for interdependency analysis - Security operator training and emergency preparedness - Intelligent multimedia (audio-video) surveillance - Terahertz body scanners for weapon and explosive detection - Security system design (intrusion detection / access control) - Dependability and resilience of computer networks (SCADA / cyber-security) - Wireless smart-sensor networks and structural health monitoring - Information systems for crisis response and emergency management - Early warning, situation awareness and decision support software

Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,234 Discovery Miles 102 340 Ships in 10 - 15 working days
Cyber Threat Intelligence for the Internet of Things (Hardcover, 1st ed. 2020): Elias Bou-Harb, Nataliia Neshenko Cyber Threat Intelligence for the Internet of Things (Hardcover, 1st ed. 2020)
Elias Bou-Harb, Nataliia Neshenko
R4,233 Discovery Miles 42 330 Ships in 10 - 15 working days

This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.

Fundamentals and Applications of Hardcopy Communication - Conveying Side Information by Printed Media (Hardcover, 1st ed.... Fundamentals and Applications of Hardcopy Communication - Conveying Side Information by Printed Media (Hardcover, 1st ed. 2018)
Joceli Mayer, Paulo V.K. Borges, Steven J. Simske
R2,140 R1,895 Discovery Miles 18 950 Save R245 (11%) Ships in 10 - 15 working days

This book presents covert, semi-covert and overt techniques for communication over printed media by modifying images, texts or barcodes within the document. Basic and advanced techniques are discussed aimed to modulate information into images, texts and barcodes. Conveying information over printed media can be useful for content authentication, author copyright, information and piracy product deterrent, side information for marketing, among other applications. Practical issues are discussed and experiments are provided to evaluate competitive approaches for hard-copy communication. This book is a useful resource for researchers, practitioners and graduate students in the field of hard-copy communication by providing the fundamentals, basic and advanced techniques as examples of approaches to address the hard-copy media distortions and particularities.

Trusted Digital Circuits - Hardware Trojan Vulnerabilities, Prevention and Detection (Hardcover, 1st ed. 2018): Hassan Salmani Trusted Digital Circuits - Hardware Trojan Vulnerabilities, Prevention and Detection (Hardcover, 1st ed. 2018)
Hassan Salmani
R3,119 Discovery Miles 31 190 Ships in 10 - 15 working days

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.

Automotive Cyber Security - Introduction, Challenges, and Standardization (Hardcover, 1st ed. 2020): Shiho Kim, Rakesh Shrestha Automotive Cyber Security - Introduction, Challenges, and Standardization (Hardcover, 1st ed. 2020)
Shiho Kim, Rakesh Shrestha
R4,238 Discovery Miles 42 380 Ships in 10 - 15 working days

This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles' intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.

Crime Prevention Technologies and Applications for Advancing Criminal Investigation (Hardcover, New): Chang-Tsun Li, Anthony... Crime Prevention Technologies and Applications for Advancing Criminal Investigation (Hardcover, New)
Chang-Tsun Li, Anthony T.S. Ho
R5,356 Discovery Miles 53 560 Ships in 10 - 15 working days

The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the most complete evidence is brought to trial. Paramount also the need for investigators to ensure that evidence adheres to the boundaries of the legal system, a place where policy often lags behind new innovations. Crime Prevention Technologies and Applications for Advancing Criminal Investigation addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer questions of interest to the legal system. This book fosters a forum for advancing research and development of the theory and practice of digital crime prevention and forensics.

Building an Effective IoT Ecosystem for Your Business (Hardcover, 1st ed. 2017): Sudhi R. Sinha, Youngchoon Park Building an Effective IoT Ecosystem for Your Business (Hardcover, 1st ed. 2017)
Sudhi R. Sinha, Youngchoon Park
R4,295 Discovery Miles 42 950 Ships in 10 - 15 working days

This descriptive, practical guide explains how to build a commercially impactful, operationally effective and technically robust IoT ecosystem that takes advantage of the IoT revolution and drives business growth in the consumer IoT as well as industrial internet spaces. With this book, executives, business managers, developers and decision-makers are given the tools to make more informed decisions about IoT solution development, partner eco-system design, and the monetization of products and services. Security and privacy issues are also addressed. Readers will explore the design guidelines and technology choices required to build commercially viable IoT solutions, but also uncover the various monetization and business modeling for connected products.

Multibiometric Watermarking with Compressive Sensing Theory - Techniques and Applications (Hardcover, 1st ed. 2018): Rohit M.... Multibiometric Watermarking with Compressive Sensing Theory - Techniques and Applications (Hardcover, 1st ed. 2018)
Rohit M. Thanki, Vedvyas J. Dwivedi, Komal R. Borisagar
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.

Blockchain for 5G Healthcare Applications - Security and privacy solutions (Hardcover): Sudeep Tanwar Blockchain for 5G Healthcare Applications - Security and privacy solutions (Hardcover)
Sudeep Tanwar
R3,979 R3,581 Discovery Miles 35 810 Save R398 (10%) Ships in 10 - 15 working days

A secured system for Healthcare 4.0 is vital to all stakeholders, including patients and caregivers. Using the new Blockchain system of trusted ledgers would help guarantee authenticity in the multi-access system that is Healthcare 4.0. This is the first comprehensive book that explores how to achieve secure systems for Healthcare 4.0 using Blockchain, with emphasis on the key challenges of privacy and security. The book is organized into four sections. The first section is focused on 5G healthcare privacy and security concerns. The second section discusses healthcare architecture and emerging technologies. The third section covers the role of artificial intelligence for data security and privacy in 5G healthcare services. Finally, the last section systematically illustrates the adoption of blockchain in various applications of 5G healthcare. The book is essential reading for all involved in setting up, running, and maintaining healthcare information systems. Engineers, scientists, technologists, developers, designers, and researchers in healthcare technologies, health informatics, security, and information technology will find the content particularly useful.

Proceedings of the International Conference on Signal, Networks, Computing, and Systems - ICSNCS 2016, Volume 1 (Hardcover, 1st... Proceedings of the International Conference on Signal, Networks, Computing, and Systems - ICSNCS 2016, Volume 1 (Hardcover, 1st ed. 2017)
Daya K. Lobiyal, Durga Prasad Mohapatra, Atulya Nagar, Manmath N. Sahoo
R8,047 R6,780 Discovery Miles 67 800 Save R1,267 (16%) Ships in 10 - 15 working days

The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25-27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.

International Cybersecurity and Privacy Law in Practice (Hardcover, New edition): Charlotte A Tschider International Cybersecurity and Privacy Law in Practice (Hardcover, New edition)
Charlotte A Tschider
R5,663 Discovery Miles 56 630 Ships in 10 - 15 working days
Glass Houses - Privacy, Secrecy, and Cyber Insecurity in a Transparent World (Paperback): Joel Brenner Glass Houses - Privacy, Secrecy, and Cyber Insecurity in a Transparent World (Paperback)
Joel Brenner
R557 Discovery Miles 5 570 Ships in 10 - 15 working days

A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Like the rest of us, governments and corporations inhabit "glass houses," all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can--and cannot--do to prevent cyber spies and hackers from compromising our security and stealing our latest technology.

Cyber Security for Cyber Physical Systems (Hardcover, 1st ed. 2018): Saqib Ali, Taiseera Al Balushi, Zia Nadir, Omar Khadeer... Cyber Security for Cyber Physical Systems (Hardcover, 1st ed. 2018)
Saqib Ali, Taiseera Al Balushi, Zia Nadir, Omar Khadeer Hussain
R5,553 Discovery Miles 55 530 Ships in 10 - 15 working days

This book is a pioneering yet primary general reference resource on cyber physical systems and their security concerns. Providing a fundamental theoretical background, and a clear and comprehensive overview of security issues in the domain of cyber physical systems, it is useful for students in the fields of information technology, computer science, or computer engineering where this topic is a substantial emerging area of study.

Research Anthology on Artificial Intelligence Applications in Security, VOL 4 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 4 (Hardcover)
Information Reso Management Association
R10,652 Discovery Miles 106 520 Ships in 10 - 15 working days
Innovative Data Communication Technologies and Application - Proceedings of ICIDCA 2020 (Hardcover, 1st ed. 2021): Jennifer S.... Innovative Data Communication Technologies and Application - Proceedings of ICIDCA 2020 (Hardcover, 1st ed. 2021)
Jennifer S. Raj, Abdullah M. Iliyasu, Robert Bestak, Zubair A. Baig
R8,777 Discovery Miles 87 770 Ships in 10 - 15 working days

This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communication Technologies and Application (ICIDCA 2020), are included in the book. The book focuses on the theory, design, analysis, implementation and applications of distributed systems and networks.

Enterprise Level Security 1 & 2 (Paperback): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Paperback)
Kevin Foltz, William R. Simpson
R1,504 Discovery Miles 15 040 Ships in 10 - 15 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

De-mystifying the IPsec Puzzle (Hardcover): Shiela Frankel De-mystifying the IPsec Puzzle (Hardcover)
Shiela Frankel
R2,634 Discovery Miles 26 340 Ships in 10 - 15 working days

Now that the Internet has blossomed into the "Information Superhighway" with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This book offers the reader a global, integrated approach to providing internet security at the network layer. The author gives a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself. The book addresses IPsec's major aspects and components to help the reader evaluate and compare features of different implementations. It provides a detailed understanding of this cutting-edge technology from the inside, which enables the reader to more effectively troubleshoot problems with specific products. Based on standards documents, discussion list archives, and practitioners' lore, this resource collects all the current knowledge of IPsec and describes it in a literate, clear manner.

Emerging Topics in Hardware Security (Hardcover, 1st ed. 2021): Mark Tehranipoor Emerging Topics in Hardware Security (Hardcover, 1st ed. 2021)
Mark Tehranipoor
R3,247 Discovery Miles 32 470 Ships in 10 - 15 working days

This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware.

Face Recognition (Hardcover): Milos Oravec Face Recognition (Hardcover)
Milos Oravec
R3,916 Discovery Miles 39 160 Ships in 10 - 15 working days
Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International... Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers (Hardcover, 1st ed. 2016)
Anja Lehmann, Diane Whitehouse, Simone Fischer-Hubner, Lothar Fritsch, Charles Raab
R2,412 Discovery Miles 24 120 Ships in 10 - 15 working days

This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016. The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.

Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017): Nilanjan Dey, V. Santhi Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017)
Nilanjan Dey, V. Santhi
R5,211 Discovery Miles 52 110 Ships in 10 - 15 working days

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.

Cross-Layer Design for Secure and Resilient Cyber-Physical Systems - A Decision and Game Theoretic Approach (Hardcover, 1st ed.... Cross-Layer Design for Secure and Resilient Cyber-Physical Systems - A Decision and Game Theoretic Approach (Hardcover, 1st ed. 2020)
Quanyan Zhu, Zhiheng Xu
R5,098 Discovery Miles 50 980 Ships in 10 - 15 working days

This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book bridges the gap between cryptography and control-theoretic tools. It develops a bespoke crypto-control framework to address security and resiliency in control and estimation problems where the outsourcing of computations is possible. Part III of this book bridges the gap between game theory and control theory and develops interdependent impact-aware security defense strategies and cyber-aware resilient control strategies. With the rapid development of smart cities, there is a growing need to integrate the physical systems, ranging from large-scale infrastructures to small embedded systems, with networked communications. The integration of the physical and cyber systems forms Cyber-Physical Systems (CPSs), enabling the use of digital information and control technologies to improve the monitoring, operation, and planning of the systems. Despite these advantages, they are vulnerable to cyber-physical attacks, which aim to damage the physical layer through the cyber network. This book also uses case studies from autonomous systems, communication-based train control systems, cyber manufacturing, and robotic systems to illustrate the proposed methodologies. These case studies aim to motivate readers to adopt a cross-layer system perspective toward security and resilience issues of large and complex systems and develop domain-specific solutions to address CPS challenges. A comprehensive suite of solutions to a broad range of technical challenges in secure and resilient control systems are described in this book (many of the findings in this book are useful to anyone working in cybersecurity). Researchers, professors, and advanced-level students working in computer science and engineering will find this book useful as a reference or secondary text. Industry professionals and military workers interested in cybersecurity will also want to purchase this book.

Cybersecurity Breaches and Issues Surrounding Online Threat Protection (Hardcover): Michelle Moore Cybersecurity Breaches and Issues Surrounding Online Threat Protection (Hardcover)
Michelle Moore
R5,330 Discovery Miles 53 300 Ships in 10 - 15 working days

Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats. Cybersecurity Breaches and Issues Surrounding Online Threat Protection is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Investing in Frontier Markets…
Gavin Graham, Al Emid, … Hardcover R2,200 R1,635 Discovery Miles 16 350
The Circle of Our Vision - Dante's…
Ralph Pite Hardcover R1,587 Discovery Miles 15 870
Turbulence and Interactions…
Michel Deville, Christophe Calvin, … Hardcover R5,589 Discovery Miles 55 890
Trade Credit and Temporary Employment…
Sebastian Nielen Hardcover R1,521 Discovery Miles 15 210
Book of Fortune and Prudence (Llibre de…
Bernat Metge Paperback R658 Discovery Miles 6 580
Transition Location Effect on Shock Wave…
Piotr Doerffer, Pawel Flaszynski, … Hardcover R4,452 Discovery Miles 44 520
What The Fat? - How To Live The Ultimate…
Grant Schofield, Dr. Caryn Zinn, … Paperback  (1)
R200 R185 Discovery Miles 1 850
Exergy and Its Application - Toward…
Muhammad Aziz Hardcover R3,306 Discovery Miles 33 060
Financial Mathematics - A Computational…
K. Pereira, N. Modhien, … Paperback R326 Discovery Miles 3 260
Clean Maids, True Wives, Steadfast…
Margaret Hallissy Hardcover R2,787 Discovery Miles 27 870

 

Partners