0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (176)
  • R250 - R500 (204)
  • R500+ (848)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Digital Forensics - Threatscape and Best Practices (Paperback): John Sammons Digital Forensics - Threatscape and Best Practices (Paperback)
John Sammons
R1,036 Discovery Miles 10 360 Ships in 12 - 17 working days

Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.

Shit I can't remember - Password manager book with alphabet tabs and discreet romantic watercolor design (5"x8") - a great... Shit I can't remember - Password manager book with alphabet tabs and discreet romantic watercolor design (5"x8") - a great gift for for kids, teenage girls, best friends, or mothers (Paperback)
Boss Girl Life
R201 Discovery Miles 2 010 Ships in 10 - 15 working days
Modern Day Surveillance Ecosystem and Impacts on Privacy (Hardcover): Ananda Mitra Modern Day Surveillance Ecosystem and Impacts on Privacy (Hardcover)
Ananda Mitra
R5,829 Discovery Miles 58 290 Ships in 10 - 15 working days

The notion of surveillance has become increasingly more crucial in public conversation as new tools of observation are obtained by many different players. The traditional notion of "overseeing" is being increasingly replaced by multi-level surveillance where many different actors, at different levels of hierarchy, from the child surveilling the parent to the state surveilling its citizens, are entering the surveillance theater. This creates a unique surveillance ecosystem where the individual is observed not only as an analog flesh-and-blood body moving through real spaces such as a shopping mall, but also tracked as a data point where the volume of data is perpetually and permanently expanding as the digital life story is inscribed in the digital spaces. The combined narrative of the individual is now under surveillance. Modern Day Surveillance Ecosystem and Impacts on Privacy navigates the reader through an understanding of the self as a narrative element that is open for observation and analysis. This book provides a broad-based and theoretically grounded look at the overall processes of surveillance in a global system. Covering topics including commodity, loss of privacy, and big data, this text is essential for researchers, government officials, policymakers, security analysts, lawmakers, teachers, professors, graduate and undergraduate students, practitioners, and academicians interested in communication, technology, surveillance, privacy, and more.

Don't You Dare Forget Me! - Discreet Internet Password Keeper - Store Websites, Usernames, Passwords - Funny Gift... Don't You Dare Forget Me! - Discreet Internet Password Keeper - Store Websites, Usernames, Passwords - Funny Gift Kitten/Cat Lovers (Paperback)
Cat & Dog Organizers
R196 Discovery Miles 1 960 Ships in 10 - 15 working days
How to Talk to Your Kids About Pornography (Paperback): Educate and Empower Kids, Dina Alexander How to Talk to Your Kids About Pornography (Paperback)
Educate and Empower Kids, Dina Alexander; Illustrated by Jera Mehrdad
R409 R336 Discovery Miles 3 360 Save R73 (18%) Ships in 10 - 15 working days
Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st... Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st ed.)
Abhijit Mohanta, Anoop Saldanha
R2,436 R1,917 Discovery Miles 19 170 Save R519 (21%) Ships in 10 - 15 working days

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. What You Will Learn Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS Who This Book Is For Security professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative

Locking the Cookie Jar - How to Protect Against Embezzlement, Identity Theft, and Hackers (Paperback): R. Scott Alvord Locking the Cookie Jar - How to Protect Against Embezzlement, Identity Theft, and Hackers (Paperback)
R. Scott Alvord; Edited by Kyler S Alvord
R500 R408 Discovery Miles 4 080 Save R92 (18%) Ships in 10 - 15 working days
Net Privacy - How We Can Be Free in an Age of Surveillance (Paperback): Sacha Molitorisz Net Privacy - How We Can Be Free in an Age of Surveillance (Paperback)
Sacha Molitorisz
R637 Discovery Miles 6 370 Ships in 12 - 17 working days

In our digital world, we are confused by privacy - what is public, what is private? We are also challenged by it, the conditions of privacy so uncertain we become unsure about our rights to it. We may choose to share personal information, but often do so on the assumption that it won't be re-shared, sold, or passed on to other parties without our knowing. In the eighteenth century, philosopher Jeremy Bentham wrote about a new model for a prison called a Panopticon, where inmates surrounded the jailers, always under watch. Have we built ourselves a digital Panopticon? Are we the guards or the prisoners, captive or free? Can we be both? When Kim Kardashian makes the minutiae of her life available online, which is she? With great rigour, this important book draws on a Kantian philosophy of ethics and legal frameworks to examine where we are and to suggest steps - conceptual and practical - to ensure the future is not dystopian. Privacy is one of the defining issues of our time; this lively book explains why this is so, and the ways in which we might protect it.

Glossary of Cyber Warfare, Cyber Crime and Cyber Security (Paperback): Dan Remenyi, Richard L. Wilson Glossary of Cyber Warfare, Cyber Crime and Cyber Security (Paperback)
Dan Remenyi, Richard L. Wilson
R773 Discovery Miles 7 730 Ships in 10 - 15 working days
Romance Scam Survivor - The Whole Sordid Story (Paperback, The Whole Sordid Story ed.): Jan Marshall Romance Scam Survivor - The Whole Sordid Story (Paperback, The Whole Sordid Story ed.)
Jan Marshall
R549 R463 Discovery Miles 4 630 Save R86 (16%) Ships in 10 - 15 working days
The Official (ISC)2 Guide to the CCSP CBK (Hardcover, 2nd Edition): Adam Gordon The Official (ISC)2 Guide to the CCSP CBK (Hardcover, 2nd Edition)
Adam Gordon
R1,907 R1,562 Discovery Miles 15 620 Save R345 (18%) Ships in 7 - 13 working days

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step guidance through real-life scenarios, illustrated examples, tables, best practices, and more. This Second Edition features clearer diagrams as well as refined explanations based on extensive expert feedback. Sample questions help you reinforce what you have learned and prepare smarter. Numerous illustrated examples and tables are included to demonstrate concepts, frameworks and real-life scenarios. The book offers step-by-step guidance through each of CCSP s domains, including best practices and techniques used by the world's most experienced practitioners. Developed by (ISC)^2, endorsed by the Cloud Security Alliance(R) (CSA) and compiled and reviewed by cloud security experts across the world, this book brings together a global, thorough perspective. The Official (ISC)^2 Guide to the CCSP CBK should be utilized as your fundamental study tool in preparation for the CCSP exam and provides a comprehensive reference that will serve you for years to come.

Secure Enough? - 20 Questions on Cybersecurity for Business Owners and Executives (Hardcover): Bryce Austin Secure Enough? - 20 Questions on Cybersecurity for Business Owners and Executives (Hardcover)
Bryce Austin
R1,038 Discovery Miles 10 380 Ships in 10 - 15 working days
Zero Day - China's Cyber Wars (Paperback): T.L. Williams Zero Day - China's Cyber Wars (Paperback)
T.L. Williams; Edited by Emily Carmain
R458 R391 Discovery Miles 3 910 Save R67 (15%) Ships in 10 - 15 working days
A Practical Guide to Privacy in Libraries (Paperback): Paul Pedley A Practical Guide to Privacy in Libraries (Paperback)
Paul Pedley
R1,971 Discovery Miles 19 710 Ships in 12 - 17 working days

Privacy is a core value of librarianship and yet as a concept, it is difficult to define and in practice, a challenge to uphold. This groundbreaking new book considers how privacy issues can arise in a library context and what library and information professionals can do to protect the privacy of their users. A Practical Guide to Privacy in Libraries features a wide range of practical examples of such issues, providing insights and practical steps which readers can follow. In-depth case studies and scenarios support the examples laid out in the book, while examples of data breaches which have occurred in a library setting, and the lessons we can learn from them, are also included. The book also covers the main legislation governing data protection - GDPR - which will be particularly relevant to European librarians, and international librarians offering services to EU citizens. The book provides a range of tools through which libraries can communicate how they handle the personal data of their users whilst ensuring that they are following best practice with their privacy policy statements, their privacy audits and data protection impact assessments. Privacy is not the same thing as data protection, and the book outlines the differences between these two concepts. Nevertheless, the book has been written with the requirements of data protection law very much in mind. Written in a highly practical manner, this book is essential reading for library and information professionals who need to understand and support privacy in the library setting and a useful reference for students and researchers in the field who need to understand this topic in practice.

Cybersecurity & Cyber-Information Sharing - Legal & Economic Analyses (Hardcover): Julia M Morgan Cybersecurity & Cyber-Information Sharing - Legal & Economic Analyses (Hardcover)
Julia M Morgan
R4,581 Discovery Miles 45 810 Ships in 12 - 17 working days

Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely exchange of cyber-threat intelligence both within the private sector and between the private sector and the government. This book examines the various legal issues that arise with respect to the sharing of cybersecurity intelligence, with a special focus on two distinct concepts: (1) sharing of cyber information within the government's possession and (2) sharing of cyber-information within the possession of the private sector. Furthermore, the authors analyse the incentives for companies to share information about cybersecurity breaches with other companies and the federal government, and conclude with a discussion on several bills passed on information sharing in cybersecurity.

Die Zukunft von Privatheit und Selbstbestimmung - Analysen und Empfehlungen zum Schutz der Grundrechte in der digitalen Welt... Die Zukunft von Privatheit und Selbstbestimmung - Analysen und Empfehlungen zum Schutz der Grundrechte in der digitalen Welt (German, Paperback, 1. Aufl. 2022)
Alexander Rossnagel, Michael Friedewald
R1,047 Discovery Miles 10 470 Ships in 12 - 17 working days

Die in diesem Open-Access-Buch zusammengefuhrten interdisziplinaren Untersuchungen des "Forums Privatheit" gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal andern. Nahezu jede Lebensregung hinterlasst Datenspuren, ermoeglicht vielfaltige und intensive Datensammlungen uber Menschen, unterstutzt Verhaltensbeeinflussungen und verstarkt Ungleichgewichte in der Informationsmacht. Es analysiert die Auswirkungen der Digitalisierung auf den rechtlichen und politischen Schutz der Grundrechte, die oekonomischen Beziehungen, die gesellschaftliche Integration und die individuelle Entfaltung. Das Buch zeigt aber auch auf, wie Digitalisierung und ihre gesellschaftlichen Rahmenbedingungen technisch, sozial, oekonomisch und rechtlich gestaltet werden koennen, um Privatheit und Selbstbestimmung zu schutzen.

IT Audit, Control, and Security (Hardcover, 2nd Ed): R Moeller IT Audit, Control, and Security (Hardcover, 2nd Ed)
R Moeller
R2,507 R2,036 Discovery Miles 20 360 Save R471 (19%) Ships in 7 - 13 working days

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the "IT Audit, Control, and Security" describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

Firewalls Don't Stop Dragons - A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (Paperback, 5th ed.):... Firewalls Don't Stop Dragons - A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (Paperback, 5th ed.)
Carey Parker
R1,119 R921 Discovery Miles 9 210 Save R198 (18%) Ships in 10 - 15 working days

Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes: Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. Updated recommendations for most secure and private products. Over 200 tips with complete step-by-step instructions and screenshots. What You Will Learn Maximize your computer and smartphone security. Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. Browse the web safely and confidently with a secure, private browser. Shop and bank online with maximum security and peace of mind. Defend against identity theft, ransomware and online scams. Safeguard your children online, at home and in school. Block online tracking, data mining and malicious online ads. Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. Create automated backups of all your devices. Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more!

Bulletproofing TCP/IP-based Windows NT/2000 Networks (Paperback): G. Held Bulletproofing TCP/IP-based Windows NT/2000 Networks (Paperback)
G. Held
R3,029 R2,431 Discovery Miles 24 310 Save R598 (20%) Ships in 7 - 13 working days

Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure.
Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.

  • Covers how TCP/IP operates and how TCP/IP attacks occur.
  • Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000 host on such networks against different attack methods.
  • Describes a new attack method, 'script-form attack', which could cause a company financial problems, and its prevention.
  • Uses practical real-world examples of methods used to block potential attacks.
Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.

Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover): Ahmed J. Obaid,... Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover)
Ahmed J. Obaid, Ghassan H Abdul-Majeed, Adriana Burlea-Schiopoiu, Parul Aggarwal
R8,001 Discovery Miles 80 010 Ships in 10 - 15 working days

In recent years, falsification and digital modification of video clips, images, as well as textual contents have become widespread and numerous, especially when deepfake technologies are adopted in many sources. Due to adopted deepfake techniques, a lot of content currently cannot be recognized from its original sources. As a result, the field of study previously devoted to general multimedia forensics has been revived. The Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications discusses the recent techniques and applications of illustration, generation, and detection of deepfake content in multimedia. It introduces the techniques and gives an overview of deepfake applications, types of deepfakes, the algorithms and applications used in deepfakes, recent challenges and problems, and practical applications to identify, generate, and detect deepfakes. Covering topics such as anomaly detection, intrusion detection, and security enhancement, this major reference work is a comprehensive resource for cyber security specialists, government officials, law enforcement, business leaders, students and faculty of higher education, librarians, researchers, and academicians.

Data Strategy - From definition to execution (Paperback): Ian Wallis Data Strategy - From definition to execution (Paperback)
Ian Wallis
R911 Discovery Miles 9 110 Ships in 9 - 15 working days

A well thought out, fit-for-purpose data strategy is vital to modern data-driven businesses. This book is your essential guide to planning, developing and implementing such a strategy, presenting a framework which takes you from data strategy definition to successful strategy delivery and execution with support and engagement from stakeholders. Key topics include data-driven business transformation, change enablers, benefits realisation and measurement.

Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback): John Pirc, David DeSanto, Iain Davison, Will... Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback)
John Pirc, David DeSanto, Iain Davison, Will Gragido
R988 Discovery Miles 9 880 Ships in 12 - 17 working days

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

Practical Deployment of Cisco Identity Services Engine (ISE) - Real-World Examples of AAA Deployments (Paperback): Andy... Practical Deployment of Cisco Identity Services Engine (ISE) - Real-World Examples of AAA Deployments (Paperback)
Andy Richter, Jeremy Wood
R1,510 Discovery Miles 15 100 Ships in 12 - 17 working days

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

Data Privacy - Principles and Practice (Hardcover): Nataraj Venkataramanan, Ashwin Shriram Data Privacy - Principles and Practice (Hardcover)
Nataraj Venkataramanan, Ashwin Shriram
R3,625 Discovery Miles 36 250 Ships in 12 - 17 working days

The book covers data privacy in depth with respect to data mining, test data management, synthetic data generation etc. It formalizes principles of data privacy that are essential for good anonymization design based on the data format and discipline. The principles outline best practices and reflect on the conflicting relationship between privacy and utility. From a practice standpoint, it provides practitioners and researchers with a definitive guide to approach anonymization of various data formats, including multidimensional, longitudinal, time-series, transaction, and graph data. In addition to helping CIOs protect confidential data, it also offers a guideline as to how this can be implemented for a wide range of data at the enterprise level.

Radical Secrecy - The Ends of Transparency in Datafied America (Paperback): Clare Birchall Radical Secrecy - The Ends of Transparency in Datafied America (Paperback)
Clare Birchall
R637 Discovery Miles 6 370 Ships in 12 - 17 working days

Reimagining transparency and secrecy in the era of digital data When total data surveillance delimits agency and revelations of political wrongdoing fail to have consequences, is transparency the social panacea liberal democracies purport it to be? This book sets forth the provocative argument that progressive social goals would be better served by a radical form of secrecy, at least while state and corporate forces hold an asymmetrical advantage over the less powerful in data control. Clare Birchall asks: How might transparency actually serve agendas that are far from transparent? Can we imagine a secrecy that could act in the service of, rather than against, a progressive politics? To move beyond atomizing calls for privacy and to interrupt the perennial tension between state security and the public's right to know, Birchall adapts Edouard Glissant's thinking to propose a digital "right to opacity." As a crucial element of radical secrecy, she argues, this would eventually give rise to a "postsecret" society, offering an understanding and experience of the political that is free from the false choice between secrecy and transparency. She grounds her arresting story in case studies including the varied presidential styles of George W. Bush, Barack Obama, and Donald Trump; the Snowden revelations; conspiracy theories espoused or endorsed by Trump; WikiLeaks and guerrilla transparency; and the opening of the state through data portals. Postsecrecy is the necessary condition for imagining, finally, an alternative vision of "the good," of equality, as neither shaped by neoliberal incarnations of transparency nor undermined by secret state surveillance. Not least, postsecrecy reimagines collective resistance in the era of digital data.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,381 Discovery Miles 63 810
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,995 Discovery Miles 29 950
Permanent Record - A Memoir of a…
Edward Snowden Hardcover  (1)
R619 R507 Discovery Miles 5 070
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,855 Discovery Miles 28 550
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R380 R297 Discovery Miles 2 970
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R741 Discovery Miles 7 410
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,222 Discovery Miles 22 220

 

Partners