0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
General
Filters
Sold By
Sold By
All Sellers
Fishpond
(204)
Age Range
Age Range
All Ranges
15+
(32)
All Ages
(13)
Country
Country
All Countries
Germany
(88)
United States
(53)
Switzerland
(22)
United Kingdom
(14)
Singapore
(4)
More...
Results for "The Code Of Trust"
The Code Of Trust
244 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(204)
Age Range
Age Range
All Ranges
15+
(32)
All Ages
(13)
Country
Country
All Countries
Germany
(88)
United States
(53)
Switzerland
(22)
United Kingdom
(14)
Singapore
(4)
More...
244 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Advances in Cryptology (Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings: AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast)
By
Jennifer Seberry
,
Yuliang Zheng
Advances in Cryptology (Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings: AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast)
By
Jennifer Seberry
,
Yuliang Zheng
HK$555
Digital Logic Design and Computer Organization with Computer Architecture for Security
By
Faroughi, Nikrouz
Digital Logic Design and Computer Organization with Computer Architecture for Security
By
Faroughi, Nikrouz
HK$1,440
Speech Enhancement (A Signal Subspace Perspective)
By
Benesty, Jacob
,
Jensen, Jesper Rindom
,
Mads Graesboll Christensen
Speech Enhancement (A Signal Subspace Perspective)
By
Benesty, Jacob
,
Jensen, Jesper Rindom
,
Mads Graesboll Christensen
HK$403
Elsewhere
HK$456.34
Save HK$53.34 (12%)
Radical Project Management
By
Rob Thomsett
Radical Project Management
By
Rob Thomsett
HK$600
1
Pfleeger: SEC Computing _c4
By
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
Pfleeger: SEC Computing _c4
By
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
HK$284
Elsewhere
HK$862.07
Save HK$578.07 (67%)
1
Lean Devops (A Practical Guide to on Demand Service Delivery)
By
Benefield, Robert
Lean Devops (A Practical Guide to on Demand Service Delivery)
By
Benefield, Robert
HK$330
Digital Government (Technology and Public Sector Performance)
By
West, Darrell M.
Digital Government (Technology and Public Sector Performance)
By
West, Darrell M.
HK$389
1
Cryptography
By
Louridas, Panos
Cryptography
By
Louridas, Panos
HK$132
Elsewhere
HK$172.33
Save HK$40.33 (23%)
Advances in Ad Hoc Networking (Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma De Mallorca, Spain, June 25-27, 2008 (IFIP Advances in Information and Communication Technology))
By
Pedro Cuenca
,
Carlos Guerrero
,
Ramon Puigjaner
,
Bartomeu Serra
Advances in Ad Hoc Networking (Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma De Mallorca, Spain, June 25-27, 2008 (IFIP Advances in Information and Communication Technology))
By
Pedro Cuenca
,
Carlos Guerrero
,
Ramon Puigjaner
,
Bartomeu Serra
HK$900
Open Source Development, Communities and Quality (IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Barbara Russo
,
Ernesto Damiani
,
Scott Hissam
,
Bjorn Lundell
Open Source Development, Communities and Quality (IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Barbara Russo
,
Ernesto Damiani
,
Scott Hissam
,
Bjorn Lundell
HK$960
Artificial Intelligence Applications and Innovations (3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI), 2006, June 7-9, 2006, Athens, Greece (IFIP Advances in Information and Communication Technology))
By
Ilias Maglogiannis
,
Kostas Karpouzis
,
Max Bramer
Artificial Intelligence Applications and Innovations (3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI), 2006, June 7-9, 2006, Athens, Greece (IFIP Advances in Information and Communication Technology))
By
Ilias Maglogiannis
,
Kostas Karpouzis
,
Max Bramer
HK$1,500
Economics of Identity Theft (Avoidance, Causes and Possible Cures)
By
Camp, L. Jean
Economics of Identity Theft (Avoidance, Causes and Possible Cures)
By
Camp, L. Jean
HK$500
Information Systems Development (Volume 2: Information Systems Development Challenges in Practice, Theory, and Education)
By
Chris Barry
,
Kieran Conboy
,
Michael Lang
,
Gregory Wojtkowski
Information Systems Development (Volume 2: Information Systems Development Challenges in Practice, Theory, and Education)
By
Chris Barry
,
Kieran Conboy
,
Michael Lang
,
Gregory Wojtkowski
HK$1,393
Ubiquitous Computing (Smart Devices, Environments and Interactions)
By
Stefan Poslad
,
Patricia Charlton
Ubiquitous Computing (Smart Devices, Environments and Interactions)
By
Stefan Poslad
,
Patricia Charlton
HK$800
Elsewhere
HK$851.52
Save HK$51.52 (6%)
1
Agent-Based Computational Sociology
By
Squazzoni, Flaminio
Agent-Based Computational Sociology
By
Squazzoni, Flaminio
HK$600
Elsewhere
HK$668.94
Save HK$68.94 (10%)
Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1
By
Roger A. Grimes
Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1
By
Roger A. Grimes
HK$218
Elsewhere
HK$273.76
Save HK$55.76 (20%)
Alice and Bob Learn Application Security
By
Tanya Janca
Alice and Bob Learn Application Security
By
Tanya Janca
HK$306
Elsewhere
HK$405.73
Save HK$99.73 (25%)
Blue Fox (Arm Assembly Internals and Binary Analys is of Mobile and IoT Devices)
By
Maria Markstedter
Blue Fox (Arm Assembly Internals and Binary Analys is of Mobile and IoT Devices)
By
Maria Markstedter
HK$332
Elsewhere
HK$354.91
Save HK$22.91 (6%)
The Official (ISC)2 CISSP CBK Reference, 6th Edition
By
Arthur J. Deane
,
Aaron Kraus
The Official (ISC)2 CISSP CBK Reference, 6th Edition
By
Arthur J. Deane
,
Aaron Kraus
HK$698
Elsewhere
HK$750.60
Save HK$52.60 (7%)
Mathematics and Computer Science, Volume 1
By
Sharmistha Ghosh
,
M. Niranjanamurthy
,
Krishanu Deyasi
,
Biswadip Basu Mallik
Mathematics and Computer Science, Volume 1
By
Sharmistha Ghosh
,
M. Niranjanamurthy
,
Krishanu Deyasi
,
Biswadip Basu Mallik
HK$1,495
Elsewhere
HK$1,724.34
Save HK$229.34 (13%)
The Power of Artificial Intelligence for the Next-Generation Oil and Gas Industry (Envisaging AI-inspired Intelligent Energy Systems and Environments (IEEE Press Series on Power and Energy Systems))
By
Chelliah, Pethuru R.
,
Jayasankar, Venkatraman
,
Mats Agerstam
,
B. Sundaravadivazhagan
The Power of Artificial Intelligence for the Next-Generation Oil and Gas Industry (Envisaging AI-inspired Intelligent Energy Systems and Environments (IEEE Press Series on Power and Energy Systems))
By
Chelliah, Pethuru R.
,
Jayasankar, Venkatraman
,
Mats Agerstam
,
B. Sundaravadivazhagan
HK$973
Elsewhere
HK$1,075.18
Save HK$102.18 (10%)
Agile Technologies in Open Source Development
By
Barbara Russo
,
Marco Scotto
,
Alberto Sillitti
,
Giancarlo Succi
Agile Technologies in Open Source Development
By
Barbara Russo
,
Marco Scotto
,
Alberto Sillitti
,
Giancarlo Succi
HK$1,500
Elsewhere
HK$1,815.63
Save HK$315.63 (17%)
Securing Wireless Communications at the Physical Layer
By
Ruoheng Liu
,
Wade Trappe
Securing Wireless Communications at the Physical Layer
By
Ruoheng Liu
,
Wade Trappe
HK$1,331
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page