0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (38)
  • R500+ (367)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R331 R312 Discovery Miles 3 120 Save R19 (6%) Ships in 18 - 22 working days
India's National Security - A Maritime Security Perspective (Hardcover): Dr Suresh R India's National Security - A Maritime Security Perspective (Hardcover)
Dr Suresh R
R1,664 R1,422 Discovery Miles 14 220 Save R242 (15%) Ships in 18 - 22 working days

Maritime security is one of the latest additions to the field of international as well as national security. The concept has received growing attention especially due to the intensification of concerns over maritime terrorism since 2000. The rise of modern piracy, maritime crimes such as human trafficking, and the increasing importance of the 'blue economy' and issues relating to freedom of navigation, maritime environmental protection, and resource management have resulted in the increased significance of maritime security studies. A significant number of states and other international actors such as Multinational Corporations (MNCs) and Transnational Corporations (TNCs) have placed maritime security high in their security agenda. This priority is reflected in several governmental and intergovernmental strategies for maritime security. In addition to that, the regional grouping in the Indian Ocean and Indo - Pacific, such as ASEAN, BIMSTEC, IORA, and IONS have placed maritime security issues high in their agenda.

Real Estate Investing - How to Profit from Investing in Residential Properties (Paperback): Louis Zeman Real Estate Investing - How to Profit from Investing in Residential Properties (Paperback)
Louis Zeman
R294 R271 Discovery Miles 2 710 Save R23 (8%) Ships in 18 - 22 working days
George Scarborough - The Life and Death of a Lawman on the Closing Frontier (Paperback, New Ed): Robert K. DeArment George Scarborough - The Life and Death of a Lawman on the Closing Frontier (Paperback, New Ed)
Robert K. DeArment
R711 Discovery Miles 7 110 Ships in 18 - 22 working days

Now, for the first time, Robert K. DeArment has told the full story of George Scarborough's life, illuminating his activity as a lawman during the final part of the nineteenth century and his controversial killings while wearing the badge-he was tried for murder on three occasions and acquitted each time.

Secrets and Power in Myanmar - Intelligence and the Fall of General Khin Nyunt (Paperback): Andrew Selth Secrets and Power in Myanmar - Intelligence and the Fall of General Khin Nyunt (Paperback)
Andrew Selth
R883 R658 Discovery Miles 6 580 Save R225 (25%) Ships in 10 - 15 working days

No external observer knows more about Myanmar's security and intelligence apparatus than Andrew Selth. In this book he presents an account of the structure and functions of Myanmar's deep state, along with a tale of personal ambition, rivalry and ruthless power politics worthy of John Le Carre. A thoroughly educative, entertaining and intriguing read."" - Professor Michael Wesley, Dean, College of Asia and the Pacific, The Australian National University ""Andrew Selth has once again amply illustrated the depth and penetration of his study of Myanmar/Burma and its institutions. This work on the more recent aspects of the country's intelligence apparatus goes beyond a masterful and comprehensive analysis of the Burmese intelligence community, and probes the social and institutional bases of the attitudes giving rise to that critical aspect of power. We are once again in Dr Selth's debt. This is required reading for serious observers of the Burmese scene."" - David I. Steinberg, Distinguished Professor of Asian Studies Emeritus, Georgetown University ""By lifting the lid on a pervasive yet secretive intelligence apparatus, Andrew Selth makes an outstanding contribution to Myanmar Studies. For scholars and practitioners alike, this book provides an essential history of a security state that remains powerful even during the transition away from overt authoritarian rule."" - Professor Ian Holliday, Vice-President (Teaching and Learning), The University of Hong Kong

Social Media - The Fastest Growing Vulnerability to the Air Force Mission (Paperback): Scott E Solomon Social Media - The Fastest Growing Vulnerability to the Air Force Mission (Paperback)
Scott E Solomon
R230 Discovery Miles 2 300 Ships in 18 - 22 working days
Silent Weapons for Quiet Wars - An Introductory Programming Manual (Paperback): Anonymous Silent Weapons for Quiet Wars - An Introductory Programming Manual (Paperback)
Anonymous
R261 R241 Discovery Miles 2 410 Save R20 (8%) Ships in 18 - 22 working days
Bunderchook Starword Poet 'Revival' - Philistines, Angels and Queers (Paperback): Rachael Pennington Black Bunderchook Starword Poet 'Revival' - Philistines, Angels and Queers (Paperback)
Rachael Pennington Black
R218 Discovery Miles 2 180 Ships in 18 - 22 working days
The Myth of International Order - Why Weak States Persist and Alternatives to the State Fade Away (Paperback): Arjun Chowdhury The Myth of International Order - Why Weak States Persist and Alternatives to the State Fade Away (Paperback)
Arjun Chowdhury
R829 Discovery Miles 8 290 Ships in 10 - 15 working days

In February of 2011, Libyan citizens rebelled against Muammar Qaddafi and quickly unseated him. The speed of the regime's collapse confounded many observers, and the ensuing civil war showed Foreign Policy's index of failed states to be deeply flawed-FP had, in 2010, identified 110 states as being more likely than Libya to descend into chaos. They were spectacularly wrong, but this points to a larger error in conventional foreign policy wisdom: failed, or weak and unstable, states are not anomalies but are instead in the majority. More states resemble Libya than Sweden. Why are most states weak and unstable? Taking as his launching point Charles Tilly's famous dictum that 'war made the state, and the state made war,' Arjun Chowdhury argues that the problem lies in our mistaken equation of democracy and economic power with stability. But major wars are the true source of stability: only the existential crisis that such wars produced could lead citizens to willingly sacrifice the resources that allowed the state to build the capacity it needed for survival. Developing states in the postcolonial era never experienced the demands major interstate war placed on European states, and hence citizens in those nations have been unwilling to sacrifice the resources that would build state capacity. For example, India and Mexico are established democracies with large economies. Despite their indices of stability, both countries are far from stable: there is an active Maoist insurgency in almost a quarter of India's districts, and Mexico is plagued by violence, drug trafficking, and high levels of corruption in local government. Nor are either effective at collecting revenue. As a consequence, they do not have the tax base necessary to perform the most fundamental tasks of modern states: controlling organized violence in a given territory and providing basic services to citizens. By this standard, the majority of states in the world-about two thirds-are weak states. Chowdury maintains that an accurate evaluation of international security requires a normative shift : the language of weakness and failure belies the fact that strong states are exceptions. Chowdhury believes that dismantling this norm is crucial, as it encourages developing states to pursue state-building via war, which is an extremely costly approach-in terms of human lives and capital. Moreover, in our era, such an approach is destined to fail because the total wars of the past are highly unlikely to occur today. Just as importantly, the non-state alternatives on offer are not viable alternatives. For better or worse, we will continue to live in a state-dominated world where most states are weak. Counterintuitive and sweeping in its coverage, The Myth of International Order demands that we fundamentally rethink foundational concepts of international politics like political stability and state failure.

Virtual Terror - 21st Century Cyber Warfare (Paperback): Daniel Wagner Virtual Terror - 21st Century Cyber Warfare (Paperback)
Daniel Wagner
R585 Discovery Miles 5 850 Ships in 18 - 22 working days
A loss of privacy - The Google epidemic (Paperback): Robert Valvasori A loss of privacy - The Google epidemic (Paperback)
Robert Valvasori
R368 Discovery Miles 3 680 Ships in 18 - 22 working days
Surveillance Zone - The Hidden World of Corporate Surveillance Detection & Covert Special Operations (Paperback): Ami Toben Surveillance Zone - The Hidden World of Corporate Surveillance Detection & Covert Special Operations (Paperback)
Ami Toben
R300 Discovery Miles 3 000 Ships in 18 - 22 working days
Guinea Pigs (Paperback): John Hall Guinea Pigs (Paperback)
John Hall
R452 Discovery Miles 4 520 Ships in 18 - 22 working days
Diplomatic Security Abroad & Protests in Muslim Countries (Hardcover): Lucien Goudreau Diplomatic Security Abroad & Protests in Muslim Countries (Hardcover)
Lucien Goudreau
R3,175 Discovery Miles 31 750 Ships in 10 - 15 working days

The deaths of Ambassador Christopher Stevens and three other U.S. personnel in Benghazi, Libya, on 11 September 2012, along with attacks on U.S. embassies in Egypt, Sudan, Tunisia, and Yemen, have drawn renewed attention to the challenges facing U.S. diplomats abroad, as well as to the difficulty in balancing concerns for their security against the outreach required of their mission. Congress plays a key role in shaping the response to these challenges, such as by providing resources for diplomatic security and examining security breaches overseas. The inability to provide perfect security, especially against the evident threat of mob violence, has focused particular scrutiny on the deployment of diplomatic personnel in high-threat environments. This book provides background information on the authorities, regulations, and procedures in place at the Department of State regarding diplomatic security with additional discussion on embassy security funding trends.

Towards a Surveillant Society - The Rise of Surveillance Systems in Europe (Paperback, New): Thomas Mathiesen Towards a Surveillant Society - The Rise of Surveillance Systems in Europe (Paperback, New)
Thomas Mathiesen
R762 Discovery Miles 7 620 Ships in 18 - 22 working days

A most timely publication in view of current concerns about snooping. Thomas Mathiesen describes how the major databases of Europe have become interlinked and accessible to diverse organizations and third States; meaning that, largely unchallenged, a 'Surveillance Monster' now threatens rights, freedoms, democracy and the Rule of Law. As information is logged on citizens' every move, data flows across borders via systems soon to be under central, global or even non-State control. Secret plans happen behind closed doors and 'systems func tionaries' become defensive of their own role. Goals expand and entire processes are shrouded in mystery. Alongside the integration of automated systems sits a weakening of State ties as the Prum Treaty and Schengen Convention lead to systems lacking transparency, restraint or Parliamentary scrutiny. As Mathiesen explains, the intention may have been fighting terrorism or organized crime, but the means have become disproportionate, unaccountable, over-expensive and lacking in results which ordinary vigilance and sound intelligence in communities should provide.

Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Paperback): John Mueller, Mark... Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Paperback)
John Mueller, Mark Stewart
R992 Discovery Miles 9 920 Ships in 10 - 15 working days

In seeking to evaluate the efficacy of post-9/11 homeland security expenses--which have risen by more than a trillion dollars, not including war costs--the common query has been, "Are we safer?" This, however, is the wrong question. Of course we are "safer"--the posting of a single security guard at one building's entrance enhances safety. The correct question is, "Are any gains in security worth the funds expended?"
In this engaging, readable book, John Mueller and Mark Stewart apply risk and cost-benefit evaluation techniques to answer this very question. This analytical approach has been used throughout the world for decades by regulators, academics, and businesses--but, as a recent National Academy of Science study suggests, it has never been capably applied by the people administering homeland security funds. Given the limited risk terrorism presents, expenses meant to lower it have for the most part simply not been worth it. For example, to be considered cost-effective, increased American homeland security expenditures would have had each year to have foiled up to 1,667 attacks roughly like the one intended on Times Square in 2010--more than four a day. Cataloging the mistakes that the US has made--and continues to make--in managing homeland security programs, Terror, Security, andMoney has the potential to redirect our efforts toward a more productive and far more cost-effective course.

Weak Links - Fragile States, Global Threats, and International Security (Paperback): Stewart Patrick Weak Links - Fragile States, Global Threats, and International Security (Paperback)
Stewart Patrick
R1,175 Discovery Miles 11 750 Ships in 10 - 15 working days

Conventional wisdom holds that weak and failing states are the source of the world's most pressing security threats. After all, the 9/11 attacks originated in an impoverished, war-ravaged country, and transnational crime appears to flourish in weakly governed states. However, our assumptions about the threats posed by failing states are based on anecdotal arguments, not on a systematic analysis of the connections between state failure and transnational security threats. Analyzing terrorism, transnational crime, WMDs, pandemic diseases, and energy insecurity, Stewart Patrick shows that while some global threats do emerge in fragile states, most of their weaknesses create misery only for their own citizenry. Moreover, many threats originate farther up the chain, in wealthier and more stable countries like Russia and Venezuela. Weak Links will force policymakers to rethink what they assume about state failure and transnational insecurity.

The Globalization of Surveillance (Paperback): A. Mattelart The Globalization of Surveillance (Paperback)
A. Mattelart
R793 Discovery Miles 7 930 Ships in 18 - 22 working days

Video surveillance, public records, fingerprints, hidden microphones, RFID chips: in contemporary societies the intrusive techniques of surveillance used in daily life have increased dramatically. The "war against terror" has only exacerbated this trend, creating a world that is closer than one might have imagined to that envisaged by George Orwell in 1984.How have we reached this situation? Why have democratic societies accepted that their rights and freedoms should be taken away, a little at a time, by increasingly sophisticated mechanisms of surveillance?From the anthropometry of the 19th Century to the Patriot Act, through an analysis of military theory and the Echelon Project, Armand Mattelart constructs a genealogy of this new power of control and examines its globalising dynamic. This book provides an essential wake-up call at a time when democratic societies are becoming less and less vigilant against the dangers of proliferating systems of surveillance.

Surveillance - Power, Problems, and Politics (Paperback): Sean P. Hier, Josh Greenberg Surveillance - Power, Problems, and Politics (Paperback)
Sean P. Hier, Josh Greenberg
R801 Discovery Miles 8 010 Ships in 10 - 15 working days

Surveillance is commonly rationalized as a solution for existing problems such as crime and terrorism. This book explores how surveillance, often disguised as risk management or harm reduction, is also at the root of a range of social and political problems. Canadian scholars from diverse disciplines interrogate the moral and ideological bases as well as the material effects of surveillance in policing, consumerism, welfare administration, disaster management, popular culture, moral regulation, news media, social movements, and anti-terrorism campaigns.

Homeland Security - Assessing the First Five Years (Hardcover): Michael Chertoff Homeland Security - Assessing the First Five Years (Hardcover)
Michael Chertoff; Contributions by Lee H. Hamilton
R710 Discovery Miles 7 100 Ships in 10 - 15 working days

In 2003, the President and the U.S. Congress established the Department of Homeland Security. From the beginning, its mission was clear: prevent terrorist attacks, protect against threats to America's safety and security, and prepare the nation to respond effectively to disasters, both natural and man-made. This monumental mission demands a comprehensive strategy. It also requires a crystal-clear explanation of that strategy to Americans and their allies worldwide. In a revealing new book, "Homeland Security: Assessing the First Five Years," Michael Chertoff provides that explanation. In a refreshingly candid and engaging manner, America's former homeland security secretary depicts the department's long-term approach, what it has achieved, and what it has yet to do.The strategy begins with the threats America faces, from terrorist groups like al Qaeda to hurricanes like Ike or Gustav. "Once these threats are identified," Chertoff writes, "we can confront them, using every tool at our disposal. We can stop terrorists from entering the country, and discourage people from embracing terrorism by combating its lethal ideology. We can protect our critical assets and reduce our vulnerabilities to natural disasters. We can plan and prepare for emergencies and respond in a way that minimizes the consequences. And we can work closely with our allies abroad to reduce the risk of future disasters." In each of these areas, Chertoff informs the reader what the nation has done and what it still must do to secure its future.How well has this strategy fared in a post-9/11 world? Since that fateful day, there have been no global terror attacks on American soil. Yet in the face of continued dangers, Michael Chertoff warns repeatedly against complacency. He urges America and its leaders to strengthen their resolve, stay the course, and build creatively on past successes.

The Rules of Security - Staying Safe in a Risky World (Hardcover): Paul Martin The Rules of Security - Staying Safe in a Risky World (Hardcover)
Paul Martin
R670 R587 Discovery Miles 5 870 Save R83 (12%) Ships in 9 - 17 working days

This book demystifies and explains a subject that affects every one of us in our private lives and at work. Security is a practical discipline concerned with safeguarding lives, property, information, wealth, reputations, and social wellbeing. It is the basis of civilised society. People, businesses, and nations cannot thrive in its absence, whereas the right kind of security frees us to live fulfilling lives. But deciding what is needed, and then making it happen, is not easy. The threats to our security are complex and continually evolving, as criminals, hackers, terrorists, and hostile foreign states continually find new ways of staying one step ahead of us, their potential victims. At the same time, we are continually creating new vulnerabilities as we adopt new technologies and new ways of working. Those who do not understand the fundamentals of security, risk, and resilience open themselves, and those around them, to avoidable dangers, needless anxieties, and unnecessary costs. Inadequate security may leave them exposed to intolerable risks, while the wrong kind of security is expensive, intrusive, and ineffective. In his essential new book, world-leading security expert Paul Martin sets out the ten most important guiding principles of protective security and resilience. Clearly expressed in the form of simple but powerful rules of thumb, their purpose is to help solve complicated problems for which there are no textbook solutions. The rules offer a powerful toolkit, designed to work in many different situations, including the cyber domain. When we are faced with novel problems requiring complex decisions, it is easy to focus on the wrong things. These rules remind us what really matters. The psychological and behavioural aspects of security are key themes throughout the book. People lie at the heart of security. The criminals, terrorists, and hackers are social animals with complex emotions and psychological predispositions. So too are the victims of those attackers and the security practitioners who strive to protect us. The human dimension is therefore crucial to understanding security. The Rules of Security will help anyone with an interest in their own security and that of their home, family, business, or society. It will be indispensable to those in positions of responsibility, allowing them to understand how best to protect their organisation, people, and assets. It assumes no expert technical knowledge and explains the ideas in clear and simple terms. It will appeal to anyone with an interest in security. If you read only one book about security, it should be this one.

ISpy - Surveillance and Power in the Interactive Era (Paperback): Mark Andrejevic ISpy - Surveillance and Power in the Interactive Era (Paperback)
Mark Andrejevic
R762 Discovery Miles 7 620 Ships in 10 - 15 working days

'This book will change the way you think about today's new media technologies' - Daniel J. Solove, author of ""The Digital Person: Technology and Privacy in the Information Age"". Whether you're purchasing groceries with your Safeway 'club card' or casting a vote on ""American Idol"", those data are being collected. From Amazon to iTunes, smart phones to GPS devices, Google to TiVo - all of these products and services give us an expansive sense of choice, access, and participation. Mark Andrejevic shows, however, that these continuously evolving new technologies have also been employed as modes of surveillance and control, most disturbingly exemplified by revelations about the NSA's secret monitoring of our phone calls, e-mails, and internet searches. Many contend that our proliferating interactive media empower individuals and democratize society. But, Andrejevic asks, at what cost? In ""iSpy"", he reveals that these and other highly advertised benefits are accompanied by hidden risks and potential threats that we all tend to ignore. His book, providing the first sustained critique of a concept that has been a talking point for twenty years, debunks the false promises of the digital revolution still touted by the popular media while seeking to rehabilitate, rather than simply write off, the potentially democratic uses of interactive media. Andrejevic opens up the world of digital rights management and the data trail each of us leaves - data about our locations, preferences, or life events that are already put to use in various economic, political, and social contexts. He notes that, while citizens are becoming increasingly transparent to private and public monitoring agencies, they themselves are unable to access the information gathered about them - or know whether it's even correct. (The watchmen, it seems, don't want to be watched.) He also considers the appropriation of consumer marketing for political campaigns in targeting voters and examines the implications of the Internet for the so-called War on Terror. In ""iSpy"", Andrejevic poses real challenges for our digital future. Amazingly detailed, compellingly readable, it warns that we need to temper our enthusiasm for these technologies with a better understanding of the threats they pose - to be able to distinguish between interactivity as centralized control and as collaborative participation.

Neglected Defense - Mobilizing the Private Sector to Support Homeland Security (Paperback): Stephen E. Flynn, Daniel B. Prieto Neglected Defense - Mobilizing the Private Sector to Support Homeland Security (Paperback)
Stephen E. Flynn, Daniel B. Prieto
R397 Discovery Miles 3 970 Ships in 18 - 22 working days

The March 2006 furor over a Dubai firms attempt to purchase the company managing some U.S. ports illustrates the difficult homeland security challenges that exist at the nexus of privately owned critical assets as well as global interdependence. Unfortunately, nearly five years after the September 11 attacks on New York and Washington, D.C., federal efforts to enlist the private sector in bolstering homeland security remain largely stillborn. Neglected Defense offers a thoughtful and tightly reasoned analysis of why that is so. It presents a way forward for strengthening cooperation between the private sector and government on homeland security. The report begins by laying out the policy dilemma in detail. It offers a recent history of the security role of the private sector, and highlights specific problems that have kept public-private security partnerships from maturing. It concludes with a series of recommendationsfor Congress, the Bush administration, and the private sectorto better secure the homeland.

The New Politics of Surveillance and Visibility (Paperback): Kevin Haggerty, Richard V. Ericson The New Politics of Surveillance and Visibility (Paperback)
Kevin Haggerty, Richard V. Ericson; Edited by Kevin Haggerty, Richard V. Ericson
R1,123 Discovery Miles 11 230 Ships in 10 - 15 working days

Since the terrorist attacks of September 2001, surveillance has been put forward as the essential tool for the aEURO"war on terror,aEURO(t) with new technologies and policies offering police and military operatives enhanced opportunities for monitoring suspect populations. The last few years have also seen the publicaEURO(t)s consumer tastes become increasingly codified, with aEURO"data minesaEURO(t) of demographic information such as postal codes and purchasing records. Additionally, surveillance has become a form of entertainment, with aEURO"realityaEURO(t) shows becoming the dominant genre on network and cable television.In The New Politics of Surveillance and Visibility, editors Kevin D. Haggerty and Richard V. Ericson bring together leading experts to analyse how society is organized through surveillance systems, technologies, and practices. They demonstrate how the new political uses of surveillance make visible that which was previously unknown, blur the boundaries between public and private, rewrite the norms of privacy, create new forms of inclusion and exclusion, and alter processes of democratic accountability. This collection challenges conventional wisdom and advances new theoretical approaches through a series of studies of surveillance in policing, the military, commercial enterprises, mass media, and health sciences.

The Security Handbook (Paperback, 2nd edition): Philip Purpura The Security Handbook (Paperback, 2nd edition)
Philip Purpura
R1,698 Discovery Miles 16 980 Ships in 18 - 22 working days

The Security Handbook, Second Edition is a user-friendly guide for security officers and guards, covering everything from introductory information to advanced topics. Whether looking for entry into the profession or development within the security industry, this book offers the practical information, training, and need-to-know techniques for the realization of professional goals.
The Second Edition emphasizes the proper skills required to improve job performance -- customer service, security methods, patrolling, communicating, and report writing. Chapters cover such important topics as arrest law and procedure (including legal liability), self-defense and weapons, a new section on career planning, violence in the workplace, internal theft, burglary, robbery, terrorism, cybercrime, and first response during emergencies. Countermeasures to a variety of threats are explained throughout the book.
Experienced security officers, supervisors, and managers will also find the book useful in outlining the changing roles and responsibilities of the protection officer and for helping train their front line staff.
* Covers every important aspect of the security officer's job, with several new updates and access to online sources
* Defines key terms and outlines basic information before moving on to more advanced topics
* Each chapter includes an outline, chapter objectives, and follows with review questions to aid in the learning process
* Features numerous examples, illustrations, Web sites, case studies, and new "What if?" scenarios to relate theory to practice
* Serves as a comprehensive study guide for state mandated training and certification exams such as the Certified Protection Officer (CPO) program sponsored by the IFPO

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security Supervision and Management…
Ifpo Paperback R1,521 Discovery Miles 15 210
Gender and Private Security in Global…
Maya Eichler Hardcover R3,575 Discovery Miles 35 750
Biometrics - Concepts, Methodologies…
Information Reso Management Association Hardcover R9,432 Discovery Miles 94 320
Silent Weapons for Quiet Wars - An…
Anonymous Hardcover R592 R536 Discovery Miles 5 360
Tell Me Everything - The Story of a…
Erika Krouse Paperback R443 Discovery Miles 4 430
The Professional Protection Officer…
Sandi J. Davies, Lawrence Fennelly Paperback R1,374 Discovery Miles 13 740
Machine See, Machine Do - How Technology…
Patrick K Lin Hardcover R683 R612 Discovery Miles 6 120
Patriotic Information Systems
Todd Loendorf, G.David Garson Hardcover R2,595 Discovery Miles 25 950
Security Consulting
Charles A. Sennewald Paperback R1,107 Discovery Miles 11 070
Emergency Notification
Robert C. Chandler Hardcover R1,562 Discovery Miles 15 620

 

Partners