0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (610)
  • R500+ (5,089)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Dynamic Secrets in Communication Security (Hardcover, 2014 ed.): Sheng Xiao, Weibo Gong, Don Towsley Dynamic Secrets in Communication Security (Hardcover, 2014 ed.)
Sheng Xiao, Weibo Gong, Don Towsley
R2,823 R1,787 Discovery Miles 17 870 Save R1,036 (37%) Ships in 10 - 15 working days

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Cyber Situational Awareness - Issues and Research (Hardcover, 2010 ed.): Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang Cyber Situational Awareness - Issues and Research (Hardcover, 2010 ed.)
Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang
R2,790 Discovery Miles 27 900 Ships in 18 - 22 working days

Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: * Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. * Lack of capability to monitor certain microscopic system/attack behavior. * Limited capability to transform/fuse/distill information into cyber intelligence. * Limited capability to handle uncertainty. * Existing system designs are not very "friendly" to Cyber Situational Awareness.

Access Control Systems - Security, Identity Management and Trust Models (Hardcover, 2006 ed.): Messaoud Benantar Access Control Systems - Security, Identity Management and Trust Models (Hardcover, 2006 ed.)
Messaoud Benantar
R2,801 Discovery Miles 28 010 Ships in 18 - 22 working days

Access control is a method of allowing and disallowing certain operations on a computer or network system. This book details access control mechanisms that are emerging with the latest Internet programming technologies. It provides a thorough introduction to the foundations of programming systems security as well as the theory behind access control models. The author explores all models employed and describes how they work.

Recent Advances in Systems Safety and Security (Hardcover, 1st ed. 2016): Emil Pricop, Grigore Stamatescu Recent Advances in Systems Safety and Security (Hardcover, 1st ed. 2016)
Emil Pricop, Grigore Stamatescu
R3,376 Discovery Miles 33 760 Ships in 10 - 15 working days

This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security - IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.

ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012,... ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012, Proceedings (Hardcover, 2012 ed.)
Magda David Hercheui, Diane Whitehouse, William McIver Jr, Jackie Phahlamohlaka
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on national and international policies, sustainable and responsible innovation, ICT for peace and war, and citizens' involvement, citizens' rights and ICT.

Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.): Adrian Perrig, J. D. Tygar Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.)
Adrian Perrig, J. D. Tygar
R2,779 Discovery Miles 27 790 Ships in 18 - 22 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Cryptography and Network Security (Hardcover): Marcelo Sampaio De Alencar Cryptography and Network Security (Hardcover)
Marcelo Sampaio De Alencar
R3,456 Discovery Miles 34 560 Ships in 9 - 17 working days
Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES)... Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES) (Hardcover, 2005 ed.)
Charles A. Shoniregun
R2,763 Discovery Miles 27 630 Ships in 18 - 22 working days

The explosive popularity of the Internet as a business tool has created a new type of economy, which is called Technology-Enabled Information Economy (TEI). Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) investigates TEI, discovering the opportunities and challenges presented by TEI to the new form of small medium enterprises (SME). This emerging economy is bringing with it new forms of TEI intermediation, online businesses, virtual supply chains, rapidly changing internet-electronic commerce technologies, increasing knowledge intensity, and unprecedented sensitivity of the time-to-market by customers. Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) also identifies ways of minimizing risk liability of TEISME business operations as a result of their dependence on TEI (Internet-eC). The rapid evolution and spread of information technology (IT) during the last few years is challenging SMEs, governments and internet security professionals to rethink the very nature of risk exposure. Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) is designed for a professional audience of researchers and practitioners in industry. This book is also suitable for graduate-level students in computer science.

Security and Privacy in Biometrics (Hardcover, 2013 ed.): Patrizio Campisi Security and Privacy in Biometrics (Hardcover, 2013 ed.)
Patrizio Campisi
R4,632 R3,561 Discovery Miles 35 610 Save R1,071 (23%) Ships in 10 - 15 working days

Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to personal data protection.

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues.

Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardization; describes real-world applications, from face and fingerprint-based user recognition, to biometrics-based electronic documents, and biometric systems employing smart cards; reviews the ethical implications of the ubiquity of biometrics in everyday life, and its impact on human dignity; provides guidance on best practices for the processing of biometric data within a legal framework.

This timely and authoritative volume is essential reading for all practitioners and researchers involved in biometrics-based automatic human recognition. Graduate students of computer science and electrical engineering will also find the text to be an invaluable practical reference.

Synchronizing E-Security (Hardcover, 2004 ed.): Godfried B. Williams Synchronizing E-Security (Hardcover, 2004 ed.)
Godfried B. Williams
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.

Wireless Ad-Hoc Networks (Hardcover): Timothy Kolaya Wireless Ad-Hoc Networks (Hardcover)
Timothy Kolaya
R1,803 Discovery Miles 18 030 Ships in 10 - 15 working days
Wireless Network Security (Hardcover, 2007 ed.): Yang Xiao, Xuemin Shen, Dingzhu Du Wireless Network Security (Hardcover, 2007 ed.)
Yang Xiao, Xuemin Shen, Dingzhu Du
R4,076 Discovery Miles 40 760 Ships in 18 - 22 working days

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

Introduction to Computer Security - Pearson New International Edition (Paperback, Pearson New International Edition): Michael... Introduction to Computer Security - Pearson New International Edition (Paperback, Pearson New International Edition)
Michael Goodrich, Roberto Tamassia
R2,403 Discovery Miles 24 030 Ships in 10 - 15 working days

For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with "just-enough" background in computer science. The result is a presentation of the material that is accessible to students of all levels.

Global Perspectives on Cybersecurity Risk in Contemporary Business Systems (Hardcover): Festus Fatai Adedoyin, Bryan... Global Perspectives on Cybersecurity Risk in Contemporary Business Systems (Hardcover)
Festus Fatai Adedoyin, Bryan Christiansen
R7,997 Discovery Miles 79 970 Ships in 18 - 22 working days

The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and wi-fi, and the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. Global Perspectives on Cybersecurity Risk in Contemporary Business Systems examines current risks involved in the cybersecurity of various business systems today from a global perspective and investigates critical business systems. Covering key topics such as artificial intelligence, hacking, and software, this reference work is ideal for computer scientists, industry professionals, policymakers, researchers, academicians, scholars, instructors, and students.

Trusted Computing (Hardcover, illustrated edition): Chris Mitchell Trusted Computing (Hardcover, illustrated edition)
Chris Mitchell
R2,841 Discovery Miles 28 410 Ships in 10 - 15 working days

As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules. This new text introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. It also includes application examples based on recent and ongoing research. The core of the book is based on an open workshop on Trusted Computing, held at Royal Holloway, University of London, UK.

Security in E-Learning (Hardcover, 2005 ed.): Edgar R. Weippl Security in E-Learning (Hardcover, 2005 ed.)
Edgar R. Weippl
R2,657 Discovery Miles 26 570 Ships in 18 - 22 working days

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. 'Security for E-Learning' discusses typical threats to e-learning projects and will introduce how these issues have been and should be addressed.

Insider Threats in Cyber Security (Hardcover, 2010 ed.): Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann Insider Threats in Cyber Security (Hardcover, 2010 ed.)
Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann
R2,990 Discovery Miles 29 900 Ships in 18 - 22 working days

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I'll need a copy."

Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies.

Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,442 Discovery Miles 94 420 Ships in 18 - 22 working days
Network Security Policies and Procedures (Hardcover, 2007 ed.): Douglas W. Frye Network Security Policies and Procedures (Hardcover, 2007 ed.)
Douglas W. Frye
R2,786 Discovery Miles 27 860 Ships in 18 - 22 working days

Company network administrators are compelled today to aggressively pursue a robust network security regime. This book aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view the company 's security and will thus be better equipped to act in a way that forwards the company 's goals.

Network Security First-Step (Paperback, 2nd edition): Thomas Thomas, Donald Stoddard Network Security First-Step (Paperback, 2nd edition)
Thomas Thomas, Donald Stoddard
R788 Discovery Miles 7 880 Ships in 10 - 15 working days

Network Security first-stepSecond Edition Tom Thomas and Donald Stoddard Your first step into the world of network security

  • No security experience required
  • Includes clear and easily understood explanations
  • Makes learning easy
Your first step to network security begins here
  • Learn how hacker attacks work, from start to finish
  • Choose the right security solution for each type of risk
  • Create clear and enforceable security policies, and keep them up to date
  • Establish reliable processes for responding to security advisories
  • Use encryption effectively, and recognize its limitations
  • Secure your network with firewalls, routers, and other devices
  • Prevent attacks aimed at wireless networks
No security experience required Computer networks are indispensible, but they also are not secure. With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them.Network Security First-Step, Second Edition explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or simply are interested in gaining knowledge of the technology, this book is for you
Secure and Resilient Software - Requirements, Test Cases, and Testing Methods (Hardcover): Mark S. Merkow, Lakshmikanth Raghavan Secure and Resilient Software - Requirements, Test Cases, and Testing Methods (Hardcover)
Mark S. Merkow, Lakshmikanth Raghavan
R2,473 Discovery Miles 24 730 Ships in 10 - 15 working days

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:

  • Pre-developed nonfunctional requirements that can be reused for any software development project
  • Documented test cases that go along with the requirements and can be used to develop a Test Plan for the software
  • Testing methods that can be applied to the test cases provided
  • A CD with all security requirements and test cases as well as MS Word versions of the checklists, requirements, and test cases covered in the book

Offering ground-level, already-developed software nonfunctional requirements and corresponding test cases and methods, this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying CD filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis, design, and testing phases of your software development lifecycle.

Some Praise for the Book:

This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation ... .
Doug Cavit, Chief Security Strategist, Microsoft Corporation

...provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC).
Jeff Weekes, Sr. Security Architect at Terra Verde Services
... full of useful insights and practical advice from two authors who have lived this process. What you get is a tactical application security roadmap that cuts through the noise and is immediately applicable to your projects.
Jeff Williams, Aspect Security CEO and Volunteer Chair of the OWASP Foundation

Fundamentals of Secure System Modelling (Hardcover, 1st ed. 2017): Raimundas Matulevicius Fundamentals of Secure System Modelling (Hardcover, 1st ed. 2017)
Raimundas Matulevicius
R2,370 Discovery Miles 23 700 Ships in 10 - 15 working days

This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational. The book addresses three main topics: (1) security requirements engineering, including security risk management, major activities, asset identification, security risk analysis and defining security requirements; (2) secure software system modelling, including modelling of context and protected assets, security risks, and decisions regarding security risk treatment using various modelling languages; and (3) secure system development, including effective approaches, pattern-driven development, and model-driven security. The primary target audience of this book is graduate students studying cyber security, software engineering and system security engineering. The book will also benefit practitioners interested in learning about the need to consider the decisions behind secure software systems. Overall it offers the ideal basis for educating future generations of security experts.

Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Hardcover): Padmavathi Ganapathi, D.... Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Hardcover)
Padmavathi Ganapathi, D. Shanmugapriya
R8,059 Discovery Miles 80 590 Ships in 18 - 22 working days

As the advancement of technology continues, cyber security continues to play a significant role in today's world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security. The Handbook of Research on Machine and Deep Learning Applications for Cyber Security is a pivotal reference source that provides vital research on the application of machine learning techniques for network security research. While highlighting topics such as web security, malware detection, and secure information sharing, this publication explores recent research findings in the area of electronic security as well as challenges and countermeasures in cyber security research. It is ideally designed for software engineers, IT specialists, cybersecurity analysts, industrial experts, academicians, researchers, and post-graduate students.

Cyber Persistence Theory - Redefining National Security in Cyberspace (Hardcover): Michael P. Fischerkeller, Emily O. Goldman,... Cyber Persistence Theory - Redefining National Security in Cyberspace (Hardcover)
Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett; Foreword by Paul M. Nakasone
R2,484 Discovery Miles 24 840 Ships in 10 - 15 working days

A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace. Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result. The authors show how the paradigm of deterrence theory can neither explain nor manage the preponderance of state cyber activity. They present a new theory that illuminates the exploitive, rather than coercive, dynamics of cyber competition and an analytical framework that can serve as the basis for new strategies of persistence. Drawing on their policy experience, they offer a new set of prescriptions to guide policymakers toward a more stable, secure cyberspace.

Computer Viruses and Malware (Hardcover, 2006 ed.): John Aycock Computer Viruses and Malware (Hardcover, 2006 ed.)
John Aycock
R3,458 Discovery Miles 34 580 Ships in 18 - 22 working days

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.

Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Anthology on Convergence of…
Information R Management Association Hardcover R11,891 Discovery Miles 118 910
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R5,931 Discovery Miles 59 310
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R7,962 Discovery Miles 79 620
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,589 Discovery Miles 85 890
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,288 Discovery Miles 12 880
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270

 

Partners