0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (604)
  • R500+ (5,312)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New): Atilla Elci, Josef Pieprzyk,... Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New)
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, …
R5,473 Discovery Miles 54 730 Ships in 10 - 15 working days

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Building Robots With Lego Mindstorms (Paperback): Mario Ferrari, Guilio Ferrari Building Robots With Lego Mindstorms (Paperback)
Mario Ferrari, Guilio Ferrari
R1,118 Discovery Miles 11 180 Ships in 12 - 19 working days

Lego robots Mindstorms are sweeping the world and fans need to learn how to programme them
Lego Mindstorms are a new generation of Lego Robots that can be manipulated using microcomputers, light and touch sensors, an infrared transmitter and CD-ROMs. Since Lego launched Lego Mindstorms in late 1998 sales have skyrocketed - with no sign of slowing down. Mindstorms have captured the imagination of adults and children alike, creating a subculture of Mindstorm enthusiasts around the world. The kits are now a staple part of engineering and computer science classes at many high profile Universities.
Building Robots with Lego Mindstorms provides readers with a fundamental understanding of the geometry, electronics, engineering, and programming required to build your own robots. Mario and Giulio Ferrari are world-renowned experts in the field of Lego Mindstorms robotics, and in this book they share their unrivaled knowledge and expertise of robotics as well as provide a series of chapters detailing how to design and build the most exotic robots. Mario and Giulio also give detailed explanations of how to integrate Lego Mindstorms kits with other Lego programmable bricks such asScout and Cybermaster, as well as with non-robotic Lego Technics models.

Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover): Marcel Ohanga Odhiambo, Weston... Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover)
Marcel Ohanga Odhiambo, Weston Mwashita
R6,451 Discovery Miles 64 510 Ships in 10 - 15 working days

As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.

Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover): Manish Gupta, Raj Sharman Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover)
Manish Gupta, Raj Sharman
R5,390 Discovery Miles 53 900 Ships in 10 - 15 working days

"More often than not, it is becoming increasingly evident that the weakest links in the information-security chain are the people. Due an increase in information security threats, it is imperative for organizations and professionals to learn more on the human nature and social interactions behind those creating the problem. Social and Human Elements of Information Security: Emerging Trends and Countermeasures provides insightful, high-quality research into the social and human aspects of information security. A comprehensive source of the latest trends, issues, and findings in the field, this book fills the missing gap in existing literature by bringing together the most recent work from researchers in the fast and evolving field of information security."

Ten Laws for Security (Hardcover, 1st ed. 2016): Eric Diehl Ten Laws for Security (Hardcover, 1st ed. 2016)
Eric Diehl
R2,589 Discovery Miles 25 890 Ships in 12 - 19 working days

In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

Secure Key Establishment (Hardcover, 1st Edition.
2nd Printing. 2008): Kim-Kwang Raymond Choo Secure Key Establishment (Hardcover, 1st Edition. 2nd Printing. 2008)
Kim-Kwang Raymond Choo
R2,887 Discovery Miles 28 870 Ships in 10 - 15 working days

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare-Rogaway model and the Canetti-Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare-Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

IT Convergence and Security - Proceedings of ICITCS 2021 (Hardcover, 1st ed. 2021): Hyuncheol Kim, Kuinam J. Kim IT Convergence and Security - Proceedings of ICITCS 2021 (Hardcover, 1st ed. 2021)
Hyuncheol Kim, Kuinam J. Kim
R9,515 Discovery Miles 95 150 Ships in 10 - 15 working days

This book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security are core to most current research, industrial, and commercial activities. Topics covered in this book include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, health care and wellness, web technology and applications, Internet of things, and security & privacy. Through this book, readers gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book is of use to researchers in academia, industry, and other research institutes focusing on IT convergence and security.

Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R540 Discovery Miles 5 400 Ships in 10 - 15 working days
SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R968 R873 Discovery Miles 8 730 Save R95 (10%) Ships in 10 - 15 working days
Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019): Liang Xiao, Weihua Zhuang, Sheng Zhou,... Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019)
Liang Xiao, Weihua Zhuang, Sheng Zhou, Cailian Chen
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.

Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised... Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers (Hardcover, 1st ed. 2020)
Gilbert Peterson, Sujeet Shenoi
R2,913 Discovery Miles 29 130 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, in the winter of 2020. Advances in Digital Forensics XVI is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Online Business Security Systems (Hardcover, 2007 ed.): Godfried B. Williams Online Business Security Systems (Hardcover, 2007 ed.)
Godfried B. Williams
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016): Iosif I. Androulidakis Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016)
Iosif I. Androulidakis
R3,746 R2,563 Discovery Miles 25 630 Save R1,183 (32%) Ships in 12 - 19 working days

This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

Recent Advances in Face Recognition (Hardcover): Kresimir Delac, Mislav Grgic, Sonja Grgic Recent Advances in Face Recognition (Hardcover)
Kresimir Delac, Mislav Grgic, Sonja Grgic
R3,373 Discovery Miles 33 730 Ships in 10 - 15 working days
Research Anthology on Artificial Intelligence Applications in Security, VOL 1 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 1 (Hardcover)
Information Reso Management Association
R10,649 Discovery Miles 106 490 Ships in 10 - 15 working days
Recent Progress in Biometrics (Hardcover): Jose Mabry Recent Progress in Biometrics (Hardcover)
Jose Mabry
R3,291 R2,975 Discovery Miles 29 750 Save R316 (10%) Ships in 10 - 15 working days
Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017): H. R. Vishwakarma, Shyam Akashe Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017)
H. R. Vishwakarma, Shyam Akashe
R6,881 Discovery Miles 68 810 Ships in 12 - 19 working days

The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.): Clive Blackwell, Hong Zhu Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.)
Clive Blackwell, Hong Zhu
R3,642 R2,042 Discovery Miles 20 420 Save R1,600 (44%) Ships in 12 - 19 working days

Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R5,157 Discovery Miles 51 570 Ships in 12 - 19 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)
Sara Foresti
R2,983 Discovery Miles 29 830 Ships in 10 - 15 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Cyber Crime and the Victimization of Women - Laws, Rights and Regulations (Hardcover, New): Debarati Halder, K Jaishankar Cyber Crime and the Victimization of Women - Laws, Rights and Regulations (Hardcover, New)
Debarati Halder, K Jaishankar
R5,325 Discovery Miles 53 250 Ships in 10 - 15 working days

While women benefit from using new digital and Internet technologies for self-expression, networking, and professional activities, cyber victimization remains an underexplored barrier to their participation. Women often outnumber men in surveys on cyber victimization. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better understanding of cyber victimization and discover how to improve responses to cyber crimes against women.

Unimodal and Multimodal Biometric Data Indexing (Hardcover): Somnath Dey, Debasis, Samanta Unimodal and Multimodal Biometric Data Indexing (Hardcover)
Somnath Dey, Debasis, Samanta
R2,944 Discovery Miles 29 440 Ships in 12 - 19 working days

This work is on biometric data indexing for large-scale identification systems with a focus on different biometrics data indexing methods. It provides state-of-the-art coverage including different biometric traits, together with the pros and cons for each. Discussion of different multimodal fusion strategies are also included.

Networks and Network Analysis for Defence and Security (Hardcover, 2014): Anthony J. Masys Networks and Network Analysis for Defence and Security (Hardcover, 2014)
Anthony J. Masys
R3,623 Discovery Miles 36 230 Ships in 12 - 19 working days

Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of big data and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches."

Advances in Security, Networks, and Internet of Things - Proceedings from SAM'20, ICWN'20, ICOMP'20, and... Advances in Security, Networks, and Internet of Things - Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 (Hardcover, 1st ed. 2021)
Kevin Daimi, Hamid R Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti
R7,751 Discovery Miles 77 510 Ships in 10 - 15 working days

The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students. Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20); Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems; Features papers from SAM'20, ICWN'20, ICOMP'20 and ESCS'20.

Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March... Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers (Hardcover, 1st ed. 2016)
Mason Rice, Sujeet Shenoi
R3,101 R2,037 Discovery Miles 20 370 Save R1,064 (34%) Ships in 12 - 19 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: themes and issues; control systems security; infrastructure modeling and simulation; risk and impact assessment. This book is the tenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of fourteen edited papers from the Tenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2016. Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Prognostic Epigenetics, Volume 15
Shilpy Sharma Hardcover R4,215 Discovery Miles 42 150
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter Paperback R160 R143 Discovery Miles 1 430
Analyzing Security, Trust, and Crime in…
Hamid R. Nemati Hardcover R5,244 Discovery Miles 52 440
The Genesis of the New England Churches
Leonard Bacon Paperback R679 Discovery Miles 6 790
Power And Loss In South African…
Glenda Daniels Paperback R380 R351 Discovery Miles 3 510
Calvin and the Whigs - A Study in…
Ruben Alvarado Hardcover R765 Discovery Miles 7 650
100 Mandela Moments
Kate Sidley Paperback R260 R232 Discovery Miles 2 320
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
Non-heme Iron Enzymes: Structures and…
Tatyana Karabencheva-Christova, Christo Christov Hardcover R4,700 R3,935 Discovery Miles 39 350
Security Fundamentals for E-commerce
Vesna Hassler Hardcover  (1)
R2,835 Discovery Miles 28 350

 

Partners