0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (126)
  • R250 - R500 (241)
  • R500+ (796)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Security in the Digital World (Paperback): IT Governance Security in the Digital World (Paperback)
IT Governance
R515 Discovery Miles 5 150 Ships in 10 - 15 working days
Privacy in Dynamical Systems (Hardcover, 1st ed. 2020): Farhad Farokhi Privacy in Dynamical Systems (Hardcover, 1st ed. 2020)
Farhad Farokhi
R2,683 Discovery Miles 26 830 Ships in 18 - 22 working days

This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.

Handbook of Research on Cyber Crime and Information Privacy, VOL 1 (Hardcover): Maria Manuela Cruz Cunha, Nuno Ricardo... Handbook of Research on Cyber Crime and Information Privacy, VOL 1 (Hardcover)
Maria Manuela Cruz Cunha, Nuno Ricardo Mateus-Coelho
R7,081 Discovery Miles 70 810 Ships in 18 - 22 working days
Mindf*ck - Inside Cambridge Analytica's Plot to Break the World (Paperback): Christopher Wylie Mindf*ck - Inside Cambridge Analytica's Plot to Break the World (Paperback)
Christopher Wylie 1
R330 Discovery Miles 3 300 Ships in 10 - 15 working days

What if you could peer into the minds of an entire population? What if you could target the weakest with rumours that only they saw?

In 2016, an obscure British military contractor turned the world upside down. Funded by a billionaire on a crusade to start his own far-right insurgency, Cambridge Analytica combined psychological research with private Facebook data to make an invisible weapon with the power to change what voters perceived as real.

The firm was created to launch the then unknown Steve Bannon's ideological assault on America. But as it honed its dark arts in elections from Trinidad to Nigeria, 24-year-old research director Christopher Wylie began to see what he and his colleagues were unleashing.

He had heard the disturbing visions of the investors. He saw what CEO Alexander Nix did behind closed doors. When Britain shocked the world by voting to leave the EU, Wylie realised it was time to expose his old associates. The political crime of the century had just taken place - the weapon had been tested - and nobody knew.

Authentication Systems for Secure Networks (Hardcover): Rolf Oppliger Authentication Systems for Secure Networks (Hardcover)
Rolf Oppliger
R2,562 Discovery Miles 25 620 Ships in 18 - 22 working days

As information processing continues to move toward an open systems environment, the advantages of authentication and key distribution systems over traditional passwords are becoming more and more evident. In this timely guide for computer scientists, electrical engineers, and networking specialists, author Rolf Oppliger explains and compares the various authentication and key distribution systems available today, including Kerberos, NetSP, SPX, TESS, and SESAME. The book explores the cryptographic techniques used for these systems - and shows how to use them to provide the best security for your network.

Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition): Rob Wilson Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition)
Rob Wilson
R1,359 R1,258 Discovery Miles 12 580 Save R101 (7%) Ships in 10 - 15 working days

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.

Perceived Privacy in Location-Based Mobile System (Hardcover, 1st ed. 2020): Maija Elina Poikela Perceived Privacy in Location-Based Mobile System (Hardcover, 1st ed. 2020)
Maija Elina Poikela
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way. This book explores privacy in the context of location data, and answers questions such as what are the privacy related behaviors in this context, and what are the factors influencing such behaviors. The book gives an overview to what privacy means for users in terms of understandings, attitudes and valuations. This book discusses reasons for why research around this topic is challenging, and presents various methods for diving into the topic through empirical studies. The work is relevant for professionals, researchers, and users of technology.

Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017): Keith Mayes, Konstantinos Markantonakis Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017)
Keith Mayes, Konstantinos Markantonakis
R2,852 Discovery Miles 28 520 Ships in 10 - 15 working days

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.

Artificial Intelligence for Disease Diagnosis and Prognosis in Smart Healthcare (Hardcover): S. M. Riazul Islam, Faisal Tariq,... Artificial Intelligence for Disease Diagnosis and Prognosis in Smart Healthcare (Hardcover)
S. M. Riazul Islam, Faisal Tariq, Ghita Kouadri Mostefaoui
R2,795 Discovery Miles 27 950 Ships in 10 - 15 working days

Features In-depth coverage of the role of AI in smart healthcare. Research guideline for AI and data science researchers/practitioners interested in the healthcare sector. Comprehensive coverage on security and privacy issues for AI in smart healthcare.

Situational Privacy and Self-Disclosure - Communication Processes in Online Environments (Hardcover, 1st ed. 2019): Philipp K.... Situational Privacy and Self-Disclosure - Communication Processes in Online Environments (Hardcover, 1st ed. 2019)
Philipp K. Masur
R3,424 Discovery Miles 34 240 Ships in 10 - 15 working days

Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people's privacy perceptions and behaviors, a situational perspective needs to be adopted. To this end, the book is divided into three parts. Part I advances the theory of situational privacy and self-disclosure by discussing impacts of new information and communication technologies on traditional theories of privacy and self-disclosure. Based on five basic suppositions, it describes three major processes of the theory: pre-situational privacy regulations processes, situational privacy perception and self-disclosure processes, and post-situational evaluation processes. Next, Part II presents the application of the theory to smartphone-based communication. It first analyses how people choose certain communication environments on their smartphones, how they manipulate them, and how these external factors affect self-disclosure within these environments. It then details a multi-method study conducted to test the derived assumptions and discusses the obtained results. Part III reflects on the overall implications of the theory, summarizes the major findings and lastly considers possible extensions and perspectives on future research. Intended mainly for researchers in privacy and communication studies, the book offers privacy scholars a systematic review of both classic and contemporary theories of privacy and self-disclosure. At the same time, communication scholars benefit from an additional methodological discussion of the mobile experience sampling method, which provides an invaluable approach to measuring situational communication processes.

Software Security - Concepts & Practices (Hardcover): Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan Software Security - Concepts & Practices (Hardcover)
Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan
R3,806 Discovery Miles 38 060 Ships in 10 - 15 working days

Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.

Technology-Augmented Perception and Cognition (Hardcover, 1st ed. 2021): Tilman Dingler, Evangelos Niforatos Technology-Augmented Perception and Cognition (Hardcover, 1st ed. 2021)
Tilman Dingler, Evangelos Niforatos
R4,041 Discovery Miles 40 410 Ships in 18 - 22 working days

Tools and technologies have long complemented and extended our physical abilities: from pre-historic spearheads to steam-propelled ploughs and high-tech prosthetics. While the development of lenses granted us insights into the micro and macrocosms, new sensors and technologies increasingly augment our cognitive abilities, including memory and perception. This book integrates current research efforts, results, and visions from the fields of computer science, neuroscience, and psychology. It provides a comprehensive overview of the state-of-the-art and future applications of how technologies assist and augment human perception and cognition. Experts in the field share their research and findings on: Working memory enhancements Digitization of memories through lifelog archives The consequences of technology-induced disruptions and forgetting The creation and utilization of new human senses Ethical and security concerns that arise with augmentation technologies. As technology weaves itself ever deeper into our lives, careful examination of its capabilities, risks and benefits is warranted. While this book focuses on the complementation and augmentation of human capabilities, it serves as a foundation for students, researchers and designers of technologies that push the boundaries of perception and cognition.

200+ Ways to Protect Your Privacy - Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline (Paperback): Jeni... 200+ Ways to Protect Your Privacy - Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline (Paperback)
Jeni Rogers 2
R380 R359 Discovery Miles 3 590 Save R21 (6%) Ships in 18 - 22 working days

Discover simple strategies for protecting your personal and confidential information on and offline with this essential and easy-to-understand guide. We all know that the internet can serve as a hotbed for identity theft. But it isn't the only place where your privacy can be breached. In fact, there are lots of ways you can protect your privacy (or diminish it) that have little or nothing to do with access to the internet. Your home, your photos, your trash can, your kids, your favorite restaurant or store-and even you have the ability to unknowingly reveal your private information to everyone from thieves to busybodies. But you don't need to hire a specialist to keep your information safe-you can do it yourself with these 200+ easy-to-implement tactics, some of which include: -Shredding hard copies of bills - Turning off Bluetooth when not in use - Using a firewall - Hiding spare keys in an unusual place Keeping your information secure lies in your hands-make sure you're not putting yourself at risk in your daily habits with this essential guide.

Perspectives on Digital Humanism (Hardcover, 1st ed. 2022): Hannes Werthner, Erich Prem, Edward A. Lee, Carlo Ghezzi Perspectives on Digital Humanism (Hardcover, 1st ed. 2022)
Hannes Werthner, Erich Prem, Edward A. Lee, Carlo Ghezzi
R1,567 Discovery Miles 15 670 Ships in 18 - 22 working days

This open access book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by selected thinkers from a variety of disciplines, including computer science, philosophy, education, law, economics, history, anthropology, political science, and sociology. This initiative emerged from the Vienna Manifesto on Digital Humanism and the associated lecture series. Digital Humanism deals with the complex relationships between people and machines in digital times. It acknowledges the potential of information technology. At the same time, it points to societal threats such as privacy violations and ethical concerns around artificial intelligence, automation and loss of jobs, ongoing monopolization on the Web, and sovereignty. Digital Humanism aims to address these topics with a sense of urgency but with a constructive mindset. The book argues for a Digital Humanism that analyses and, most importantly, influences the complex interplay of technology and humankind toward a better society and life while fully respecting universal human rights. It is a call to shaping technologies in accordance with human values and needs.

Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Hardcover): Jack M Wedam Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Hardcover)
Jack M Wedam
R702 Discovery Miles 7 020 Ships in 10 - 15 working days
Security, Privacy and User Interaction (Hardcover, 1st ed. 2020): Markus Jakobsson Security, Privacy and User Interaction (Hardcover, 1st ed. 2020)
Markus Jakobsson
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users - including malicious users, aiming to corrupt the system - this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.

Advance Metadata Fair - The Retention and Disclosure of 4G, 5G and  Social Media Location Information,  for Law Enforcement and... Advance Metadata Fair - The Retention and Disclosure of 4G, 5G and Social Media Location Information, for Law Enforcement and National Security, and the Impact on Privacy in Australia (Hardcover, 1st ed. 2020)
Stanley Shanapinda
R3,799 Discovery Miles 37 990 Ships in 18 - 22 working days

This book outlines the legal powers of a major Western nation - Australia - to collect and use location information. Mobile service and social media service providers now have the ability to track, record and store more precise location information. Unlike 4G, 5G mobile communications require that cell towers and antennas be in much closer proximity; as a result, the location data can reveal more personal and sensitive information about individual citizens. Despite this aspect, service providers are required to disclose the data to the authorities, without the need for a judicial warrant. This book was written from the perspective of big location data software analytics, a capability that makes it possible to combine various location data points to create a profile on a given individual's movements, habits, and political, religious and ideological orientation. In this regard, privacy is poorly protected. The rationale used to justify the powers was enforcing serious crimes - terrorism offences. Location data can now be retained for at least two years and be collected to investigate even minor offences. This can be done without the person being reasonably suspected of a criminal offence - when the individual is simply determined to be a person of interest. This poses legal risks to vulnerable communities. And yet, such investigative techniques are deemed lawful and reasonable. At a time when national security is so broadly defined to include economic issues, which in turn overlap with climate change and environmental protection, these legal powers should be reassessed. The book clarifies the complex rules that every citizen must know in order to have agency. Further, it calls upon authorities to reflect and to self-regulate, by making the conscious decision to surrender some of their powers to review by the independent judiciary. Without the requirement for a judicial warrant or judicial review, the powers are unfairly broad. The book pursues an interdisciplinary approach to assess the functionality of mobile telecommunications in direct relation to law enforcement powers and existing judicial precedents. Further, it offers a unifying techno-legal perspective on a complex issue touching on modern privacy law and communications technologies.

What Every Engineer Should Know About Cyber Security and Digital Forensics (Hardcover, 2nd edition): Joanna F Defranco, Bob... What Every Engineer Should Know About Cyber Security and Digital Forensics (Hardcover, 2nd edition)
Joanna F Defranco, Bob Maley
R3,506 Discovery Miles 35 060 Ships in 10 - 15 working days

Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.

What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Hardcover): Shimon... What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Hardcover)
Shimon Brathwaite
R1,938 Discovery Miles 19 380 Ships in 18 - 22 working days

1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses

Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023): Tuomo Sipola, Tero Kokkonen,... Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023)
Tuomo Sipola, Tero Kokkonen, Mika Karjalainen
R4,271 Discovery Miles 42 710 Ships in 18 - 22 working days

This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.

Handbook of Big Data Privacy (Hardcover, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha Handbook of Big Data Privacy (Hardcover, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha
R4,749 Discovery Miles 47 490 Ships in 18 - 22 working days

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.

Secure, Resilient, and Agile Software Development (Paperback): Mark Merkow Secure, Resilient, and Agile Software Development (Paperback)
Mark Merkow
R1,383 Discovery Miles 13 830 Ships in 10 - 15 working days

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.

The Home in the Digital Age (Paperback): Antonio Argandona, Joy Malala, Richard Peatfield The Home in the Digital Age (Paperback)
Antonio Argandona, Joy Malala, Richard Peatfield
R1,239 Discovery Miles 12 390 Ships in 10 - 15 working days

The Home in the Digital Age is a set of multidisciplinary studies exploring the impact of digital technologies in the home, with a shift of emphasis from technology to the people living and using this in their homes. The book covers a wide variety of topics on the design, introduction and use of digital technologies in the home, combining the technological dimension with the cognitive, emotional, cultural and symbolic dimensions of the objects that incorporate digital technologies and project them onto people's lives. It offers a coherent approach, that of the home, which gives unity to the discussion. Scholars of the home, the house and the family will find here the connection with the problems derived from the use of domestic robots and connected devices. Students of artificial intelligence, machine learning, robotics, big data and other branches of digital technologies will find ideas and arguments to apply their disciplines to the home and participate fruitfully in forums where digital technologies are built and negotiated in the home. Experts from various disciplines psychologists and sociologists; philosophers, epistemologists and ethicists; economists; engineers, architects, urban planners and designers and so on and also those interested in developing policies for the home and family will find this book contains well-founded and useful ideas to focus their work.

The Encrypted Book of Passwords (Hardcover): Raef Meeuwisse The Encrypted Book of Passwords (Hardcover)
Raef Meeuwisse
R614 Discovery Miles 6 140 Ships in 10 - 15 working days
The Usage and Impact of ICTs during the Covid-19 Pandemic (Hardcover): Shengnan Yang, Xiaohua Zhu, Pnina Fichman The Usage and Impact of ICTs during the Covid-19 Pandemic (Hardcover)
Shengnan Yang, Xiaohua Zhu, Pnina Fichman
R3,643 Discovery Miles 36 430 Ships in 10 - 15 working days

This book takes a holistic view of the roles of ICTs during the pandemic through the lens of social informatics, as it is critical to our understanding of the relations between society and technology. Specific attention is given to various stakeholders and social contexts, with analysis at the individual, group, community, and society levels. Pushing the boundaries of information science research with timely and critical research questions, this edited volume showcases information science research in the context of COVID-19, by specifically accentuating sociotechnical practices, activities, and ICT interventions during the pandemic. Its social informatics focus appeals to a broad audience, and its global and international orientation provides a timely, innovative, and much-needed perspective to information science. This book is unique in its interdisciplinary nature as it consists of research studies on the intersections between ICTs and health, culture, social interaction, civic engagement, information dissemination, work, and education. Chapters apply a range of research methods, including questionnaire surveys, content analyses, and case studies from countries in Asia, Europe, and America, as well as global and international comparisons. The book's primary target audience includes scholars and students in information and library science, particularly those interested in the social aspect of the information society. It may be of interest to information professionals, library practitioners, educators, and information policymakers, as well as scholars and students in science and technology studies, cultural studies, political science, public administration, sociology, and communication studies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Behavioral Intervals in Embedded…
Fabian Wolf Hardcover R2,763 Discovery Miles 27 630
'n Lewe Naby God - 366 Oordenkings
Nina Smit Hardcover R279 R257 Discovery Miles 2 570
Knowing Who You Are Because of Who God…
Demi-Leigh Tebow Paperback R280 R200 Discovery Miles 2 000
Communication Network Systems and…
Pascal Formann Hardcover R2,808 R2,554 Discovery Miles 25 540
Koeke en Terte - Aanvaar Mekaar se…
Susan Coetzer Paperback R285 R255 Discovery Miles 2 550
The All Red Line [microform] - the…
George 1837-1911 Johnson Hardcover R1,045 Discovery Miles 10 450
Releasing Resurrection And Revival From…
Robert Henderson Paperback R642 Discovery Miles 6 420
40 Lives In 40 Days - Experiencing God's…
John MacArthur Hardcover R169 R156 Discovery Miles 1 560
The Complete Verilog Book
Vivek Sagdeo Hardcover R4,273 Discovery Miles 42 730
Fasting Journal
Jentezen Franklin Hardcover R434 R406 Discovery Miles 4 060

 

Partners