0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (119)
  • R250 - R500 (231)
  • R500+ (821)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Customer Data and Privacy: The Insights You Need from Harvard Business Review (Hardcover): Harvard Business Review, Timothy... Customer Data and Privacy: The Insights You Need from Harvard Business Review (Hardcover)
Harvard Business Review, Timothy Morey, Andrew Burt, Christine Moorman, Thomas C. Redman
R1,063 R892 Discovery Miles 8 920 Save R171 (16%) Ships in 10 - 15 working days

Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues&#8212blockchain, cybersecurity, AI, and more&#8212each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas&#8212and prepare you and your company for the future.

The Foundations of EU Data Protection Law (Hardcover): Orla Lynskey The Foundations of EU Data Protection Law (Hardcover)
Orla Lynskey
R4,410 Discovery Miles 44 100 Ships in 10 - 15 working days

Nearly two decades after the EU first enacted data protection rules, key questions about the nature and scope of this EU policy, and the harms it seeks to prevent, remain unanswered. The inclusion of a Right to Data Protection in the EU Charter has increased the salience of these questions, which must be addressed in order to ensure the legitimacy, effectiveness and development of this Charter right and the EU data protection regime more generally. The Foundations of EU Data Protection Law is a timely and important work which sheds new light on this neglected area of law, challenging the widespread assumption that data protection is merely a subset of the right to privacy. By positioning EU data protection law within a comprehensive conceptual framework, it argues that data protection has evolved from a regulatory instrument into a fundamental right in the EU legal order and that this right grants individuals more control over more forms of data than the right to privacy. It suggests that this dimension of the right to data protection should be explicitly recognised, while identifying the practical and conceptual limits of individual control over personal data. At a time when EU data protection law is sitting firmly in the international spotlight, this book offers academics, policy-makers, and practitioners a coherent vision for the future of this key policy and fundamental right in the EU legal order, and how best to realise it.

IT-Sicherheitsmanagement nach der neuen ISO 27001 - ISMS, Risiken, Kennziffern, Controls (German, Paperback, 2., akt. Aufl.... IT-Sicherheitsmanagement nach der neuen ISO 27001 - ISMS, Risiken, Kennziffern, Controls (German, Paperback, 2., akt. Aufl. 2020)
Heinrich Kersten, Gerhard Klett, Jurgen Reuter, Klaus-Werner Schroeder
R1,111 Discovery Miles 11 110 Ships in 10 - 15 working days

Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der Norm ISO/IEC 27001. Mit der 2. Auflage wurden die Inhalte des Fachbuches umfassend aktualisiert und den Neuerungen der Norm angepasst. Die Autoren erlautern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das Informationssicherheits-Managementsystem (ISMS) genauso wie die 114 Controls aus dem Anhang der Norm. Die ausfuhrlich kommentierten Controls unterstutzen Sicherheitsverantwortliche bei der Auswahl geeigneter Sicherheitsmassnahmen in allen Bereichen. Die Normenreihe ISO 27000 ist ein wichtiges Hilfsmittel fur Unternehmen und Behoerden, die ein IT-Sicherheitsmanagement in ihrer Organisation einfuhren und betreiben wollen. Im internationalen Kontext ist die Anwendung der ISO 27001 fur viele Organisationen nahezu unverzichtbar. Nicht zuletzt mit dem deutschen IT-Sicherheitsgesetz erhalt dieser Standard auch national eine hohe Bedeutung. Seit der Neufassung der Norm im Jahr 2015 (deutsche Version) und AEnderungen in 2017 mussen sich alle Organisationen entsprechend umstellen und ihr ISMS anpassen. Hierfur enthalt das Buch entsprechende "Fahrplane".

Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events... Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events (Paperback, 1st ed.)
Eric C. Thompson
R1,297 R1,077 Discovery Miles 10 770 Save R220 (17%) Ships in 10 - 15 working days

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare's current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that's required is a plan-which author Eric Thompson provides in this book. What You Will Learn Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.

Database Nation - The Death of Privacy in the 21st Century (Paperback, New edition): "Garfinkel" Database Nation - The Death of Privacy in the 21st Century (Paperback, New edition)
"Garfinkel"
R425 R356 Discovery Miles 3 560 Save R69 (16%) Ships in 10 - 15 working days

Fifty years ago, in "1984, " George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours.

"Database Nation: The Death of Privacy in the 21st Century" shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril.

Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of "Database Nation " is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before?

Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.

Cybersecurity for Beginners (Paperback, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Paperback, 2nd Revised edition)
Raef Meeuwisse
R556 Discovery Miles 5 560 Ships in 9 - 17 working days
Die Fortentwicklung des Datenschutzes - Zwischen Systemgestaltung und Selbstregulierung (German, Paperback, 1. Aufl. 2018):... Die Fortentwicklung des Datenschutzes - Zwischen Systemgestaltung und Selbstregulierung (German, Paperback, 1. Aufl. 2018)
Alexander Rossnagel, Michael Friedewald, Marit Hansen
R2,645 Discovery Miles 26 450 Ships in 10 - 15 working days

Der Datenschutz ist nicht ausreichend auf die Herausforderungen moderner Informationstechnik mit Ubiquitous Computing, Big Data, kunstlicher Intelligenz und lernenden Systemen eingestellt. Dies gilt auch fur die Datenschutz-Grundverordnung. Die Beitrage des Sammelbandes untersuchen die Anforderungen des digitalen Wandels an Konzepte, Instrumente und Institutionen des Datenschutzes; sie eroertern Loesungen fur bisher ungeregelte Datenschutzprobleme, entwerfen Konzepte fur einen modernen Grundrechts- und Datenschutz und entwickeln Modelle fur eine Evolution des Datenschutzes in der kunftigen digitalen Welt.

Informationelle Selbstbestimmung Im Digitalen Wandel (German, Paperback, 1. Aufl. 2017 ed.): Michael Friedewald, Joern Lamla,... Informationelle Selbstbestimmung Im Digitalen Wandel (German, Paperback, 1. Aufl. 2017 ed.)
Michael Friedewald, Joern Lamla, Alexander Rossnagel
R2,374 Discovery Miles 23 740 Ships in 10 - 15 working days
Der Grundsatz Der Verfugbarkeit - Ziel, Rechtsstand Und Perspektiven Des Strafrechtlichen Informationsaustauschs in Der... Der Grundsatz Der Verfugbarkeit - Ziel, Rechtsstand Und Perspektiven Des Strafrechtlichen Informationsaustauschs in Der Europaischen Union (German, Paperback, 1. Aufl. 2018 ed.)
Magdalena Schmidt
R1,748 Discovery Miles 17 480 Ships in 10 - 15 working days
Radical Secrecy - The Ends of Transparency in Datafied America (Paperback): Clare Birchall Radical Secrecy - The Ends of Transparency in Datafied America (Paperback)
Clare Birchall
R597 Discovery Miles 5 970 Ships in 10 - 15 working days

Reimagining transparency and secrecy in the era of digital data When total data surveillance delimits agency and revelations of political wrongdoing fail to have consequences, is transparency the social panacea liberal democracies purport it to be? This book sets forth the provocative argument that progressive social goals would be better served by a radical form of secrecy, at least while state and corporate forces hold an asymmetrical advantage over the less powerful in data control. Clare Birchall asks: How might transparency actually serve agendas that are far from transparent? Can we imagine a secrecy that could act in the service of, rather than against, a progressive politics? To move beyond atomizing calls for privacy and to interrupt the perennial tension between state security and the public's right to know, Birchall adapts Edouard Glissant's thinking to propose a digital "right to opacity." As a crucial element of radical secrecy, she argues, this would eventually give rise to a "postsecret" society, offering an understanding and experience of the political that is free from the false choice between secrecy and transparency. She grounds her arresting story in case studies including the varied presidential styles of George W. Bush, Barack Obama, and Donald Trump; the Snowden revelations; conspiracy theories espoused or endorsed by Trump; WikiLeaks and guerrilla transparency; and the opening of the state through data portals. Postsecrecy is the necessary condition for imagining, finally, an alternative vision of "the good," of equality, as neither shaped by neoliberal incarnations of transparency nor undermined by secret state surveillance. Not least, postsecrecy reimagines collective resistance in the era of digital data.

Kingdom Of Lies - Adventures in cybercrime (Paperback): Kate Fazzini Kingdom Of Lies - Adventures in cybercrime (Paperback)
Kate Fazzini 1
R305 R277 Discovery Miles 2 770 Save R28 (9%) Ships in 9 - 17 working days

Would you say your phone is safe, or your computer? What about your car? Or your bank? There is a global war going on and the next target could be anyone - an international corporation or a randomly selected individual. From cybercrime villages in Romania to intellectual property theft campaigns in China, these are the true stories of the hackers behind some of the largest cyberattacks in history and those committed to stopping them. You've never heard of them and you're not getting their real names. Kate Fazzini has met the hackers who create new cyberweapons, hack sports cars and develop ransomware capable of stopping international banks in their tracks. Kingdom of Lies is a fast-paced look at technological innovations that were mere fantasy only a few years ago, but now make up an integral part of all our lives.

Adapt and Overcome - What Business Owners Need to Do to Keep Employees, Clients and Infrastructure Safe During a Time of Crisis... Adapt and Overcome - What Business Owners Need to Do to Keep Employees, Clients and Infrastructure Safe During a Time of Crisis (Paperback)
Bryan Hornung, Chee Lam, Jeri Morgan
R428 Discovery Miles 4 280 Ships in 10 - 15 working days
Cybersecurity - 3 in 1- Beginner's Guide+ Tips and tricks+ Advanced and Effective measures to secure your Cyber Networks... Cybersecurity - 3 in 1- Beginner's Guide+ Tips and tricks+ Advanced and Effective measures to secure your Cyber Networks (Paperback)
Elijah Lewis
R1,215 Discovery Miles 12 150 Ships in 10 - 15 working days
SQL & NoSQL Databases - Models, Languages, Consistency Options and Architectures for Big Data Management (Paperback, 1st ed.... SQL & NoSQL Databases - Models, Languages, Consistency Options and Architectures for Big Data Management (Paperback, 1st ed. 2019)
Andreas Meier, Michael Kaufmann
R1,308 Discovery Miles 13 080 Ships in 9 - 17 working days

This book offers a comprehensive introduction to relational (SQL) and non-relational (NoSQL) databases. The authors thoroughly review the current state of database tools and techniques, and examine coming innovations. The book opens with a broad look at data management, including an overview of information systems and databases, and an explanation of contemporary database types: SQL and NoSQL databases, and their respective management systems The nature and uses of Big Data A high-level view of the organization of data management Data Modeling and Consistency Chapter-length treatment is afforded Data Modeling in both relational and graph databases, including enterprise-wide data architecture, and formulas for database design. Coverage of languages extends from an overview of operators, to SQL and and QBE (Query by Example), to integrity constraints and more. A full chapter probes the challenges of Ensuring Data Consistency, covering: Multi-User Operation Troubleshooting Consistency in Massive Distributed Data Comparison of the ACID and BASE consistency models, and more System Architecture also gets from its own chapter, which explores Processing of Homogeneous and Heterogeneous Data; Storage and Access Structures; Multi-dimensional Data Structures and Parallel Processing with MapReduce, among other topics. Post-Relational and NoSQL Databases The chapter on post-relational databases discusses the limits of SQL - and what lies beyond, including Multi-Dimensional Databases, Knowledge Bases and and Fuzzy Databases. A final chapter covers NoSQL Databases, along with Development of Non-Relational Technologies, Key-Value, Column-Family and Document Stores XML Databases and Graphic Databases, and more The book includes more than 100 tables, examples and illustrations, and each chapter offers a list of resources for further reading. SQL & NoSQL Databases conveys the strengths and weaknesses of relational and non-relational approaches, and shows how to undertake development for big data applications. The book benefits readers including students and practitioners working across the broad field of applied information technology. This textbook has been recommended and developed for university courses in Germany, Austria and Switzerland.

Cybersecurity - Advanced and Effective Measures to Secure Your Cyber Networks (Paperback): Elijah Lewis Cybersecurity - Advanced and Effective Measures to Secure Your Cyber Networks (Paperback)
Elijah Lewis
R538 Discovery Miles 5 380 Ships in 10 - 15 working days
Cyber Security Disasters - History of It Disasters and How to Avoid Them in the Future (Paperback): Matt Olivier Cyber Security Disasters - History of It Disasters and How to Avoid Them in the Future (Paperback)
Matt Olivier
R266 Discovery Miles 2 660 Ships in 10 - 15 working days
Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback)
Ethan Thorpe
R532 Discovery Miles 5 320 Ships in 10 - 15 working days
Privacy and the Press (Hardcover, New): Joshua Rozenberg Privacy and the Press (Hardcover, New)
Joshua Rozenberg
R2,318 Discovery Miles 23 180 Ships in 10 - 15 working days

Do we need a law of privacy? Should judges be allowed to stop us reading about a footballer's adultery or enjoying pictures of a film star's wedding? Is a super-model's cocaine addiction something that she should be allowed to keep private? And aren't we entitled to walk down the street without having our most intimate activities recorded on security cameras and broadcast to the world?
These questions have divided not only the country but also our most senior judges. Drawing a line between justified and unjustified intrusion places great stresses on our legal traditions: some judges favour stretching existing laws to help deserving victims, whilst others feel it would be more honest simply to recognize privacy as a new human right. The latter approach creates further problems: shouldn't it be up to Parliament alone to create such a right? And what about free speech: don't the newspapers and the public have rights too?
The issues raised are often highly emotive. Newspapers are not allowed to identify Thompson and Venables, the young men who murdered two-year-old James Bulger, because their lives would be in danger. Nobody may identify Mary Bell, who also killed when she was a child, even though there was no such risk. Will paedophiles be the next to demand lifelong anonymity?
Steering a course through this minefield requires a grasp of legal concepts and principles and an understanding of how the law develops. This book explores how the English legal system has had to blend old laws on confidentiality with modern human rights law in order to deal with these problematic issues. Written for non-specialists by one of Britain's best known legal journalists, this book provides a uniquely accessible guide to the legal aspects of this topical debate.

Advanced WordPress Security - Go beyond the basics and stop sophisticated attacks (Paperback): Grant Stokley Advanced WordPress Security - Go beyond the basics and stop sophisticated attacks (Paperback)
Grant Stokley
R550 Discovery Miles 5 500 Ships in 10 - 15 working days
Ethical Hacking - 3 in 1- Beginner's Guide+ Tips and Tricks+ Advanced and Effective measures of Ethical Hacking... Ethical Hacking - 3 in 1- Beginner's Guide+ Tips and Tricks+ Advanced and Effective measures of Ethical Hacking (Paperback)
Elijah Lewis
R1,224 Discovery Miles 12 240 Ships in 10 - 15 working days
MentalTheft - Your mind is the weakest link (Paperback): Paul Newton MentalTheft - Your mind is the weakest link (Paperback)
Paul Newton
R485 R451 Discovery Miles 4 510 Save R34 (7%) Ships in 10 - 15 working days
You Can't Afford to Get Hacked - The must-have practical guide to keeping your household safe online (Paperback): Amir... You Can't Afford to Get Hacked - The must-have practical guide to keeping your household safe online (Paperback)
Amir Roknifard, Amjad Pirotti
R405 Discovery Miles 4 050 Ships in 10 - 15 working days
What Do We Know and What Should We Do About Internet Privacy? (Paperback): Paul Bernal What Do We Know and What Should We Do About Internet Privacy? (Paperback)
Paul Bernal
R499 Discovery Miles 4 990 Ships in 9 - 17 working days

Privacy on the internet is challenged in a wide variety of ways - from large social media companies, whose entire business models are based on privacy invasion, through the developing technologies of facial recognition, to the desire of governments to monitor our every activity online. But the impact these issues have on our daily lives is often underplayed or misunderstood. In this book, Paul Bernal analyses how the internet became what it is today, exploring how the current manifestation of the internet works for people, for companies and even for governments, with reference to the new privacy battlefields of location and health data, the internet of things and the increasingly contentious issue of personal data and political manipulation. The author then proposes what we should do about the problems surrounding internet privacy, such as significant changes in government policy, a reversal of the current 'war' on encryption, being brave enough to take on the internet giants, and challenging the idea that 'real names' would improve the discourse on social networks. ABOUT THE SERIES: The 'What Do We Know and What Should We Do About...?' series offers readers short, up-to-date overviews of key issues often misrepresented, simplified or misunderstood in modern society and the media. Each book is written by a leading social scientist with an established reputation in the relevant subject area. The Series Editor is Professor Chris Grey, Royal Holloway, University of London

Datenschutz - Einfuhrung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie (German, Paperback, 2. Aufl.... Datenschutz - Einfuhrung in technischen Datenschutz, Datenschutzrecht und angewandte Kryptographie (German, Paperback, 2. Aufl. 2022)
Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth
R1,040 Discovery Miles 10 400 Ships in 10 - 15 working days

Dieses Lehrbuch behandelt im ersten Teil schwerpunktmassig technische Massnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Gewahrleistung von Anonymitat im Internet (z. B. Tor) vorgestellt. Das Buch gibt einen UEberblick uber gangige Verfahren des Identitatsmanagements (z. B. OpenID Connect) und die in elektronischen Ausweisdokumenten (z. B. im Personalausweis) verwendeten Sicherheitsmassnahmen. Die Datenschutz-Garantien der vermittelten Ansatze werden im Detail behandelt. Im Bereich des World Wide Web erfahrt der Leser, wo die Probleme aus Sicht des Datenschutzes liegen und wie diese Lucken geschlossen werden koennen. Anonyme Bezahlverfahren und eine Untersuchung von Bitcoin runden den technischen Teil des Buches ab. Der Leser lernt Ansatze aus der Praxis kennen, um so je nach Anforderungen in der Systementwicklung das passende Verfahren auswahlen zu koennen. Im zweiten Teil werden die Grundlagen des Datenschutzrechts behandelt. Denn technische Massnahmen sollen unerlaubte Datenverarbeitung verhindern; das Recht bestimmt, welche Datenverarbeitungen erlaubt sind. Ohne Kenntnisse im Datenschutzrecht koennen technische Massnahmen nicht richtig implementiert werden. Zum besseren Verstandnis erfolgt ein UEberblick uber die Rechtsordnung insgesamt, in die das Datenschutzrecht eingeordnet wird. Betrachtet werden die europaische und die verfassungsrechtliche Dimension des Datenschutzes. Der Schwerpunkt liegt auf den Regelungen der Datenschutz-Grundverordnung. Dabei werden auch besonders haufig vorkommende und Fragen aufwerfende Verarbeitungssituationen wie das Webtracking eroertert. Beispielhaft werden datenschutzrechtliche Falle bearbeitet.

Programming for beginners - 2 books in 1: Kali linux and python for beginners (Paperback): Adam Harris Programming for beginners - 2 books in 1: Kali linux and python for beginners (Paperback)
Adam Harris
R586 Discovery Miles 5 860 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Social Networks: Models of Information…
Alexander G. Chkhartishvili, Dmitry A. Gubanov, … Hardcover R2,873 Discovery Miles 28 730
Measure Theory in Non-Smooth Spaces
Nicola Gigli Hardcover R3,451 Discovery Miles 34 510
Burn - Michael Faraday's Candle
Darcy Pattison Hardcover R630 R568 Discovery Miles 5 680
Fundamental Theories and Their…
Dazhong Lao, Shanshan Zhao Hardcover R7,759 Discovery Miles 77 590
Lectures on Lyapunov Exponents
Marcelo Viana Hardcover R1,754 Discovery Miles 17 540
How to Read the Periodic Table of…
Baby Professor Hardcover R748 R659 Discovery Miles 6 590
L2 - Gain and Passivity Techniques in…
Arjan van der Schaft Hardcover R4,497 Discovery Miles 44 970
Discover Fireworks
Xist Publishing Hardcover R698 Discovery Miles 6 980
Proceedings of the 2015 International…
Limin Jia, Zhigang Liu, … Hardcover R8,487 Discovery Miles 84 870
Bifurcation Theory of Impulsive…
Kevin E.M. Church, Xinzhi Liu Hardcover R3,674 Discovery Miles 36 740

 

Partners