0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 25 of 45 matches in All Departments

Selected Papers from Coastlab18 Conference (Hardcover): Javier Lopez Lara, Maria Maza Selected Papers from Coastlab18 Conference (Hardcover)
Javier Lopez Lara, Maria Maza
R1,681 Discovery Miles 16 810 Ships in 12 - 17 working days
Host-Pathogen Interactions - Methods and Protocols (Hardcover, 1st ed. 2018): Carlos Medina, Francisco Javier Lopez-Baena Host-Pathogen Interactions - Methods and Protocols (Hardcover, 1st ed. 2018)
Carlos Medina, Francisco Javier Lopez-Baena
R3,400 Discovery Miles 34 000 Ships in 10 - 15 working days

This detailed volume explores numerous multidisciplinary approaches employed to analyze the role of different molecules or strategies used by different guests to survive inside hosts. Divided into several sections, the book delves into animal-pathogen interaction, microbe-microbe interaction, as well as plant-pathogen interaction. Written for the highly successful Methods in Molecular Biology series, chapters include brief introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls. Authoritative and practical, Host-Pathogen Interactions: Methods and Protocols provides many molecular and bioinformatics techniques currently in use at reputed laboratories in countries all around the world, vital for many kinds of host-pathogen interactions studies.

Return of the Grasshopper - Games, Leisure and the Good Life in the Third Millennium (Paperback): Bernard Suits Return of the Grasshopper - Games, Leisure and the Good Life in the Third Millennium (Paperback)
Bernard Suits; Edited by Christopher C. Yorke, Francisco Javier Lopez Frias
R1,124 Discovery Miles 11 240 Ships in 12 - 17 working days

The sequel to Bernard Suits' classic book on the philosophy of games and sport The Grasshopper, published in full for the first time Suits is one of the most influential philosophers of all time in the philosophy of sport and games, a staple of all reading lists for courses on this topic Return of the Grasshopper includes clues intended by Suits to help the reader to unlock the riddles posed in the original The Grasshopper, so it's an essential companion to that classic book In Return of the Grasshopper, Suits goes further in his exploration of existential and political themes Includes introductory chapters that put Suits' life and work in context, examining the key themes he addresses in both The Grasshopper and Return of the Grasshopper

Return of the Grasshopper - Games, Leisure and the Good Life in the Third Millennium (Hardcover): Bernard Suits Return of the Grasshopper - Games, Leisure and the Good Life in the Third Millennium (Hardcover)
Bernard Suits; Edited by Christopher C. Yorke, Francisco Javier Lopez Frias
R3,881 Discovery Miles 38 810 Ships in 12 - 17 working days

The sequel to Bernard Suits' classic book on the philosophy of games and sport The Grasshopper, published in full for the first time Suits is one of the most influential philosophers of all time in the philosophy of sport and games, a staple of all reading lists for courses on this topic Return of the Grasshopper includes clues intended by Suits to help the reader to unlock the riddles posed in the original The Grasshopper, so it's an essential companion to that classic book In Return of the Grasshopper, Suits goes further in his exploration of existential and political themes Includes introductory chapters that put Suits' life and work in context, examining the key themes he addresses in both The Grasshopper and Return of the Grasshopper

Location Privacy in Wireless Sensor Networks (Paperback): Ruben Rios, Javier Lopez, Jorge Cuellar Location Privacy in Wireless Sensor Networks (Paperback)
Ruben Rios, Javier Lopez, Jorge Cuellar
R1,293 Discovery Miles 12 930 Ships in 12 - 17 working days

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks. Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being monitored or even to destroy or compromise the whole network. This book will aid in the protection against this serious privacy threat.

Defining Sport - Conceptions and Borderlines (Hardcover): Shawn E Klein Defining Sport - Conceptions and Borderlines (Hardcover)
Shawn E Klein; Contributions by Shawn E Klein, Dr. Chad Carlson, Francisco Javier Lopez Frias, Kevin Schieman, …
R2,575 Discovery Miles 25 750 Ships in 12 - 17 working days

Defining Sport: Conceptions and Borderlines is not about the variations of usage of the term "sport." It is about the concept, the range of activities in the world that we unite into one idea-sport. It is through the project of defining sport that we can come to understand these activities better, how they are similar or different, and how they relate to other human endeavors. This definitional inquiry, and the deeper appreciation and apprehension of sport that follows, is the core of this volume. Part I examines several of the standard and influential approaches to defining sport. Part II uses these approaches to examine various challenging borderline cases. These chapters examine the interplay of the borderline cases with the definition and provide a more thorough and clearer understanding of both the definition and the given cases. This work is not meant to be the definitive or exhaustive account of sport. It is meant to inspire further thought and debate on just what sport is; how it relates to other activities and human endeavors; and what we can learn about ourselves through the study of sport. This book will be of interest to scholars in philosophy of sport, history, communications, sociology, psychology, sports management, cultural studies, and physical education.

A Practical Guide to Equine Radiography (Hardcover): Gabriel Manso Diaz, Javier Lopez San Roman, Renate Weller A Practical Guide to Equine Radiography (Hardcover)
Gabriel Manso Diaz, Javier Lopez San Roman, Renate Weller
R2,094 Discovery Miles 20 940 Ships in 12 - 17 working days

A Practical Guide to Equine Radiography is designed to accompany the clinical veterinarian either within a hospital setting or out in the field. The book offers an informative step-by-step guide to obtaining high quality radiographs with a focus on image quality, accuracy, consistency and safety. General principles and equipment are covered before working through the anatomy of the horse with separate chapters devoted to each body region, providing a thorough and detailed picture of the skeletal structure of the horse, making the book an ideal reference for professionals involved with horse health and disease. Features provided in the book will guide the veterinarian through the stages of taking and interpreting normal radiographs and include: * Clinical indications of radiographic areas of interest in the horse * Equipment required * Preparation and setup guides, supported by photographs * Projections focusing on radiographic areas of interest, aided by photographs * x-rays presented with detailed labels, providing a close-up view of skeletal structures * Three dimensional images demonstrating normal anatomy A Practical Guide to Equine Radiography is an essential tool for equine practitioners, veterinary students and para-professionals.

Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009,... Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (Hardcover, 2009 ed.)
Dimitris Gritzalis, Javier Lopez
R2,867 Discovery Miles 28 670 Ships in 10 - 15 working days

It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long history. This volume contains the papers selected for presentation at SEC 2009. In response to the call for papers, 176 papers were submitted to the conference. All of them were evaluated on the basis of their novelty and technical quality, and reviewed by at least two members of the conference Program Committee. Of the papers submitted, 39 were selected for presentation at the conference; the acceptance rate was as low as 22%, thus making the conference a highly competitive forum. It is the commitment of several people that makes international conferences pos- ble. That also holds true for SEC 2009. The list of people who volunteered their time and energy to help is really long.

Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7,... Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Javier Lopez, Jianying Zhou, Miguel Soriano
R3,266 Discovery Miles 32 660 Ships in 10 - 15 working days

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7,... Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Javier Lopez, Jianying Zhou, Miguel Soriano
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Host-Pathogen Interactions - Methods and Protocols (Paperback, Softcover reprint of the original 1st ed. 2018): Carlos Medina,... Host-Pathogen Interactions - Methods and Protocols (Paperback, Softcover reprint of the original 1st ed. 2018)
Carlos Medina, Francisco Javier Lopez-Baena
R3,525 Discovery Miles 35 250 Ships in 10 - 15 working days

This detailed volume explores numerous multidisciplinary approaches employed to analyze the role of different molecules or strategies used by different guests to survive inside hosts. Divided into several sections, the book delves into animal-pathogen interaction, microbe-microbe interaction, as well as plant-pathogen interaction. Written for the highly successful Methods in Molecular Biology series, chapters include brief introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls. Authoritative and practical, Host-Pathogen Interactions: Methods and Protocols provides many molecular and bioinformatics techniques currently in use at reputed laboratories in countries all around the world, vital for many kinds of host-pathogen interactions studies.

Defining Sport - Conceptions and Borderlines (Paperback): Shawn E Klein Defining Sport - Conceptions and Borderlines (Paperback)
Shawn E Klein; Contributions by Shawn E Klein, Dr. Chad Carlson, Francisco Javier Lopez Frias, Kevin Schieman, …
R1,218 Discovery Miles 12 180 Ships in 12 - 17 working days

Defining Sport: Conceptions and Borderlines is not about the variations of usage of the term "sport." It is about the concept, the range of activities in the world that we unite into one idea-sport. It is through the project of defining sport that we can come to understand these activities better, how they are similar or different, and how they relate to other human endeavors. This definitional inquiry, and the deeper appreciation and apprehension of sport that follows, is the core of this volume. Part I examines several of the standard and influential approaches to defining sport. Part II uses these approaches to examine various challenging borderline cases. These chapters examine the interplay of the borderline cases with the definition and provide a more thorough and clearer understanding of both the definition and the given cases. This work is not meant to be the definitive or exhaustive account of sport. It is meant to inspire further thought and debate on just what sport is; how it relates to other activities and human endeavors; and what we can learn about ourselves through the study of sport. This book will be of interest to scholars in philosophy of sport, history, communications, sociology, psychology, sports management, cultural studies, and physical education.

Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015,... Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings (Paperback, 2015 ed.)
Javier Lopez, Yongdong Wu
R3,116 Discovery Miles 31 160 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.

Foundations of Security Analysis and Design VII - FOSAD 2012 / 2013 Tutorial Lectures (Paperback, 2014 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design VII - FOSAD 2012 / 2013 Tutorial Lectures (Paperback, 2014 ed.)
Alessandro Aldini, Javier Lopez, Fabio Martinelli
R2,255 Discovery Miles 22 550 Ships in 10 - 15 working days

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.

Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.): Maritta Heisel, Wouter... Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.)
Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli
R2,577 Discovery Miles 25 770 Ships in 10 - 15 working days

This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the Network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The 15 papers included in this volume deal with the main NESSoS research areas: security requirements for Future Internet services; creating secure service architectures and secure service design; supporting programming environments for secure and composable services; enabling security assurance and integrating former results in a risk-aware and cost-aware software life-cycle.

Critical Information Infrastructures Security - 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18,... Critical Information Infrastructures Security - 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Bernhard Hammerli, Nils Kalstad Svendsen, Javier Lopez
R2,135 Discovery Miles 21 350 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling.

Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August... Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings (Paperback, 2013 ed.)
Steven Furnell, Costas Lambrinoudakis, Javier Lopez
R1,349 Discovery Miles 13 490 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: access control and authentication; identity and trust management; privacy and confidentiality management; information systems security; security policies/legal issues; and trust and privacy in mobile and pervasive environments.

Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings (Paperback,... Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings (Paperback, 2013 ed.)
Javier Lopez, Xinyi Huang, Ravi Sandhu
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings... Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings (Paperback, 2012 ed.)
Yang Xiang, Javier Lopez, C.-C.Jay Kuo, Wanlei Zhou
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.

Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected... Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Paperback, 2011)
Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner
R1,825 Discovery Miles 18 250 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010.
The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.

Secure and Trust Computing, Data Management, and Applications - 8th FIRA International Conference, STA 2011, Loutraki, Greece,... Secure and Trust Computing, Data Management, and Applications - 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part I (Paperback, 2011)
James J (Jong Hyuk) Park, Javier Lopez, Sang-Soo Yeo, Taeshik Shon, David Taniar
R1,462 Discovery Miles 14 620 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address various theories and practical applications of secure and trust computing and data management in future environments.

Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings... Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings (Paperback, Edition.)
Javier Lopez, Gene Tsudik
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009,... Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Dimitris Gritzalis, Javier Lopez
R2,837 Discovery Miles 28 370 Ships in 10 - 15 working days

It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long history. This volume contains the papers selected for presentation at SEC 2009. In response to the call for papers, 176 papers were submitted to the conference. All of them were evaluated on the basis of their novelty and technical quality, and reviewed by at least two members of the conference Program Committee. Of the papers submitted, 39 were selected for presentation at the conference; the acceptance rate was as low as 22%, thus making the conference a highly competitive forum. It is the commitment of several people that makes international conferences pos- ble. That also holds true for SEC 2009. The list of people who volunteered their time and energy to help is really long.

Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 -... Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 (Paperback, 2006 ed.)
Javier Lopez
R1,565 Discovery Miles 15 650 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Critical Information Infrastructures Security, CRITIS 2006, held on Samos Island, Greece in August/September 2006 in conjunction with ISC 2006, the 9th International Information Security Conference. The papers address all security-related heterogeneous aspects of critical information infrastructures.

Information and Communications Security - 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004.... Information and Communications Security - 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Paperback, 2004 ed.)
Javier Lopez, Eiji Okamoto
R3,049 Discovery Miles 30 490 Ships in 10 - 15 working days

This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), ' Spain,27-29 October 2004. The ?ve previous conferences were held in Beijing, Sydney, Xian, S- gapore and Huhehaote City, where we had an enthusiastic and well-attended event. The proceedings were released as volumes 1334, 1726, 2229, 2513 and 2836 of the LNCS series of Springer, respectively. During these last years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by offering you yet another successful meeting with a rich and interesting program. The responseto the Call for Paperswas overwhelming,245 papersubmissionswere received. Therefore, the paper selection process was very competitive and dif?cult - only 42 papers were accepted. The success of the conference depends on the quality of the program. Thus, we are indebted to our Program Committee members and the ext- nal refereesfor the great job they did. These proceedingscontainrevised versionsof the accepted papers.Revisions were not checked and the authorsbear full responsibilityfor the content of their papers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Handmaid's Tale - Season 4
Elisabeth Moss, Yvonne Strahovski, … DVD R416 Discovery Miles 4 160
Sellotape Clear Tape - Double Value…
R22 R16 Discovery Miles 160
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Kenwood Steam Iron with Auto Shut Off…
R634 Discovery Miles 6 340
Everlotus CD DVD wallet, 72 discs
 (1)
R129 R99 Discovery Miles 990
Percy Jackson And The Olympians - 5-Book…
Rick Riordan Paperback R622 Discovery Miles 6 220
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Salton Cool Touch Toaster (4…
R880 R740 Discovery Miles 7 400
Baby Dove Body Wash 200ml
R50 Discovery Miles 500
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100

 

Partners