0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (228)
  • R500+ (763)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Web Services - ICWS 2019 - 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San... Web Services - ICWS 2019 - 26th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings (Paperback, 1st ed. 2019)
John Miller, Eleni Stroulia, Kisung Lee, Liang-Jie Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 26th International Conference on Web Services, ICWS 2019, held as part of SCF 2019 in San Diego, CA, USA in June 2019. The 11 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 31 submissions. ICWS has been a prime international forum for both researchers and industry practitioners to exchange the latest fundamental advances in the state of the art and practice of Web-based services, to identify emerging research topics, and to define the future of Web-based services. Topics include Internet services modeling, discovery, composition, testing, adaptation, delivery, as well as standards.

The Ecosystem of e-Business: Technologies, Stakeholders, and Connections - 17th Workshop on e-Business, WeB 2018, Santa Clara,... The Ecosystem of e-Business: Technologies, Stakeholders, and Connections - 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Jennifer J. Xu, Bin Zhu, Xiao Liu, Michael J. Shaw, Han Zhang, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 17th Workshop on e-Business, WeB 2018, which took place in Santa Clara, CA, USA, in December 2018. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2018 theme was "The Ecosystem of e-Business: Technologies, Stakeholders, and Connections." There was a total of 47 submissions and 41 papers were presented at the conference. Of these, 19 revised papers are presented in this volume. These contributions are organized in the following topical sections: social, policy, and privacy issues; e-market; FinTech; and artificial intelligence.

IoT - Security and Privacy Paradigm (Hardcover): Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le IoT - Security and Privacy Paradigm (Hardcover)
Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le
R5,072 Discovery Miles 50 720 Ships in 10 - 15 working days

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.

Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa Basset - Portugues (Brasil) (Portuguese, Paperback):... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa Basset - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun,... Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II (Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
R2,847 Discovery Miles 28 470 Ships in 18 - 22 working days

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.

Cyber Strategy - Risk-Driven Security and Resiliency (Paperback): Carol A. Siegel, Mark Sweeney Cyber Strategy - Risk-Driven Security and Resiliency (Paperback)
Carol A. Siegel, Mark Sweeney
R1,295 Discovery Miles 12 950 Ships in 10 - 15 working days

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards' approval processes Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company's cybersecurity and cyber resiliency strategic plan.

Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa Jack Russell Terrier (Portuguese, Paperback):... Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa Jack Russell Terrier (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover): Suneeta Satpathy, Sachi Mohanty Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover)
Suneeta Satpathy, Sachi Mohanty
R2,466 Discovery Miles 24 660 Ships in 10 - 15 working days

Digital forensics has recently gained a notable development and become the most demanding area in today's information security requirement. This book investigates the areas of digital forensics, digital investigation and data analysis procedures as they apply to computer fraud and cybercrime, with the main objective of describing a variety of digital crimes and retrieving potential digital evidence. Big Data Analytics and Computing for Digital Forensic Investigations gives a contemporary view on the problems of information security. It presents the idea that protective mechanisms and software must be integrated along with forensic capabilities into existing forensic software using big data computing tools and techniques. Features Describes trends of digital forensics served for big data and the challenges of evidence acquisition Enables digital forensic investigators and law enforcement agencies to enhance their digital investigation capabilities with the application of data science analytics, algorithms and fusion technique This book is focused on helping professionals as well as researchers to get ready with next-generation security systems to mount the rising challenges of computer fraud and cybercrimes as well as with digital forensic investigations. Dr Suneeta Satpathy has more than ten years of teaching experience in different subjects of the Computer Science and Engineering discipline. She is currently working as an associate professor in the Department of Computer Science and Engineering, College of Bhubaneswar, affiliated with Biju Patnaik University and Technology, Odisha. Her research interests include computer forensics, cybersecurity, data fusion, data mining, big data analysis and decision mining. Dr Sachi Nandan Mohanty is an associate professor in the Department of Computer Science and Engineering at ICFAI Tech, ICFAI Foundation for Higher Education, Hyderabad, India. His research interests include data mining, big data analysis, cognitive science, fuzzy decision-making, brain-computer interface, cognition and computational intelligence.

Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa gatinho de olhos azuis (Portuguese, Paperback):... Agenda de passwords - Agenda para endere os electr nicos e passwords - Capa gatinho de olhos azuis (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover)
Adam Henschke
R3,068 Discovery Miles 30 680 Ships in 10 - 15 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Basset Hound (Italian, Paperback):... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina Basset Hound (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected... Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.

Agenda de passwords - Agenda para enderecos electronicos e passwords - Capa gatinho brincalhao (Portuguese, Paperback): Coisas... Agenda de passwords - Agenda para enderecos electronicos e passwords - Capa gatinho brincalhao (Portuguese, Paperback)
Coisas Realmente Uteis
R206 Discovery Miles 2 060 Ships in 18 - 22 working days
Agenda de passwords - Agenda para enderecos electronicos e passwords - Capa gatinho ruivo a relaxar (Portuguese, Paperback):... Agenda de passwords - Agenda para enderecos electronicos e passwords - Capa gatinho ruivo a relaxar (Portuguese, Paperback)
Coisas Realmente Uteis
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun,... Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
R3,255 Discovery Miles 32 550 Ships in 18 - 22 working days

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.

A Practical Guide to Privacy in Libraries (Paperback): Paul Pedley A Practical Guide to Privacy in Libraries (Paperback)
Paul Pedley
R1,808 Discovery Miles 18 080 Ships in 10 - 15 working days

Privacy is a core value of librarianship and yet as a concept, it is difficult to define and in practice, a challenge to uphold. This groundbreaking new book considers how privacy issues can arise in a library context and what library and information professionals can do to protect the privacy of their users. A Practical Guide to Privacy in Libraries features a wide range of practical examples of such issues, providing insights and practical steps which readers can follow. In-depth case studies and scenarios support the examples laid out in the book, while examples of data breaches which have occurred in a library setting, and the lessons we can learn from them, are also included. The book also covers the main legislation governing data protection - GDPR - which will be particularly relevant to European librarians, and international librarians offering services to EU citizens. The book provides a range of tools through which libraries can communicate how they handle the personal data of their users whilst ensuring that they are following best practice with their privacy policy statements, their privacy audits and data protection impact assessments. Privacy is not the same thing as data protection, and the book outlines the differences between these two concepts. Nevertheless, the book has been written with the requirements of data protection law very much in mind. Written in a highly practical manner, this book is essential reading for library and information professionals who need to understand and support privacy in the library setting and a useful reference for students and researchers in the field who need to understand this topic in practice.

Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa cachorrinho Golden Retriever - Portugues (Brasil)... Agenda de Senhas - Agenda para enderecos eletronicos e senhas: Capa cachorrinho Golden Retriever - Portugues (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R206 Discovery Miles 2 060 Ships in 18 - 22 working days
Advanced Persistent Training - Take Your Security Awareness Program to the Next Level (Paperback, 1st ed.): Jordan Schroeder Advanced Persistent Training - Take Your Security Awareness Program to the Next Level (Paperback, 1st ed.)
Jordan Schroeder
R1,667 Discovery Miles 16 670 Ships in 18 - 22 working days

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handle these especially difficult situations. Many information security professionals are required by regulation or policy to provide security awareness training within the companies they work for, but many believe that the resulting low compliance with training does not outweigh the costs of delivering that training. There are also many who believe that this training is crucial, if only it could be more effective. What you will learn: Present awareness materials all year-round in a way that people will really listen. Implement a "behavior-first" approach to teaching security awareness. Adopt to gamification the right way, even for people who hate games. Use tips from security awareness leaders addressing the same problems you face. Who is this book for Security awareness professionals or IT Security professionals who are tasked with teaching security awareness within their organization.

Click Here to Kill Everybody - Security and Survival in a Hyper-connected World (Paperback): Bruce Schneier Click Here to Kill Everybody - Security and Survival in a Hyper-connected World (Paperback)
Bruce Schneier
R432 Discovery Miles 4 320 Ships in 9 - 17 working days

We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the "World-Sized Web". It includes everything from driverless cars to smart thermostats, from billboards that respond to specific people to drones equipped with their own behavioural algorithms. While the World-Sized Web carries enormous potential, Schneier argues that we are unprepared for the vulnerabilities it brings. Cutting-edge digital attackers can now crash your car, pacemaker and home security system and everyone else's. Click Here to Kill Everybody explores the risks and security implications of the World-Sized Web and lays out common-sense policies that will allow us to enjoy the benefits of this new omnipotent age without surrendering ourselves entirely to our creation.

Advanced Computing and Systems for Security - Volume Four (Paperback, 1st ed. 2017): Rituparna Chaki, Khalid Saeed, Agostino... Advanced Computing and Systems for Security - Volume Four (Paperback, 1st ed. 2017)
Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki
R1,868 Discovery Miles 18 680 Ships in 18 - 22 working days

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

Privacy-Preserving Machine Learning (Paperback, 1st ed. 2022): Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li Privacy-Preserving Machine Learning (Paperback, 1st ed. 2022)
Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li
R1,533 Discovery Miles 15 330 Ships in 10 - 15 working days

This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are now available for various applications, including risk assessment and image recognition. In light of open access to datasets and not fully trusted environments, machine learning-based applications face enormous security and privacy risks. In turn, it presents studies conducted to address privacy issues and a series of proposed solutions for ensuring privacy protection in machine learning tasks involving multiple parties. In closing, the book reviews state-of-the-art privacy-preserving techniques and examines the security threats they face.

Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cucciolo Golden Retriever (Italian,... Agenda delle password - Agenda degli indirizzi web e delle password di accesso - Copertina cucciolo Golden Retriever (Italian, Paperback)
Agende Pratiche
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Cybersecurity All-in-One For Dummies (Paperback): Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs Cybersecurity All-in-One For Dummies (Paperback)
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
R1,120 R831 Discovery Miles 8 310 Save R289 (26%) Ships in 9 - 17 working days

Over 700 pages of insight into all things cybersecurity Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization. Explore the basics of cybersecurity at home and in business Learn how to secure your devices, data, and cloud-based assets Test your security to find holes and vulnerabilities before hackers do Create a culture of cybersecurity throughout an entire organization This For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide.

Agenda de Senhas - Agenda Para Endere os Eletr nicos E Senhas: Capa Jack Russell Terrier - Portugu s (Brasil) (Portuguese,... Agenda de Senhas - Agenda Para Endere os Eletr nicos E Senhas: Capa Jack Russell Terrier - Portugu s (Brasil) (Portuguese, Paperback)
Agendas E Cadernos
R205 Discovery Miles 2 050 Ships in 18 - 22 working days
Advanced Computing and Systems for Security - Volume Three (Paperback, 1st ed. 2017): Rituparna Chaki, Khalid Saeed, Agostino... Advanced Computing and Systems for Security - Volume Three (Paperback, 1st ed. 2017)
Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki
R1,920 Discovery Miles 19 200 Ships in 18 - 22 working days

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Tipping Point: Turmoil Or Reform…
Raymond Parsons Paperback R300 R277 Discovery Miles 2 770
Die Wet Van Gauteng
Hannes Barnard Paperback R370 R330 Discovery Miles 3 300
International Perspectives on the Youth…
Samir Amine Hardcover R4,704 Discovery Miles 47 040
The Oxford Handbook of Indian Foreign…
David M. Malone, C.Raja Mohan, … Hardcover R4,542 Discovery Miles 45 420
Secrets of a Mariachi Violinist
D.R. Ransdell Paperback R439 Discovery Miles 4 390
100 Mandela Moments
Kate Sidley Paperback R231 Discovery Miles 2 310
The Boat Runner
Devin Murphy Paperback R414 Discovery Miles 4 140
SAUK 1936-1995 - Bedreigde Spesie... Of…
Wynand Harmse Paperback R399 Discovery Miles 3 990
Bad Luck Penny
Amy Heydenrych Paperback  (1)
R350 R323 Discovery Miles 3 230
The Heist
Jack Du Brul Paperback R395 R353 Discovery Miles 3 530

 

Partners