0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Information Theory
Filters
Sold By
Sold By
All Sellers
Fishpond
(9)
Age Range
Age Range
All Ranges
15+
(9)
Country
Country
All Countries
Germany
(8)
Switzerland
(1)
Results for "API"
API
12 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(9)
Age Range
Age Range
All Ranges
15+
(9)
Country
Country
All Countries
Germany
(8)
Switzerland
(1)
Related Searches:
linux api
rest api
web api
api 579-1
"api 579"
web api 2
$sj pulse desktop api url$
api ponds and accessories
12 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Generating Plans from Proofs (Synthesis Lectures on Data Management)
By
Michael Benedikt
,
Julien Leblay
,
Balder ten Cate
,
Efthymia Tsamoura
Generating Plans from Proofs (Synthesis Lectures on Data Management)
By
Michael Benedikt
,
Julien Leblay
,
Balder ten Cate
,
Efthymia Tsamoura
HK$493
Database Programming Languages (10th International Symposium, DBPL 2005, Trondheim, Norway, August 28-29, 2005, Revised Selected Papers (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Gavin Bierman
,
Christoph Koch
Database Programming Languages (10th International Symposium, DBPL 2005, Trondheim, Norway, August 28-29, 2005, Revised Selected Papers (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Gavin Bierman
,
Christoph Koch
HK$500
Information Security and Privacy (11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Lynn Batten
,
Reihaneh Safavi-Naini
Information Security and Privacy (11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Lynn Batten
,
Reihaneh Safavi-Naini
HK$534
Conceptual Structures, Standards and Practices: 7th International Conference on Conceptual Structures, Iccs'99, Blacksburg, VA, USA, July 12-15, 1999, Proceedings (7th: Standards and Practices - International Conference on Conceptual Structures, ICCS '99,)
By
William M. Tepfenhart
,
Walling Cyre
Conceptual Structures, Standards and Practices: 7th International Conference on Conceptual Structures, Iccs'99, Blacksburg, VA, USA, July 12-15, 1999, Proceedings (7th: Standards and Practices - International Conference on Conceptual Structures, ICCS '99,)
By
William M. Tepfenhart
,
Walling Cyre
HK$700
Advances in Computer Science - ASIAN 2007 - Computer and Network Security (Proceedings 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues))
By
Iliano Cervesato
Advances in Computer Science - ASIAN 2007 - Computer and Network Security (Proceedings 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues))
By
Iliano Cervesato
HK$500
Foundations and Applications of Security Analysis (Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers (Lecture Notes in Comput ..)
By
Pierpaolo Degano
,
Luca Vigano
Foundations and Applications of Security Analysis (Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers (Lecture Notes in Comput ..)
By
Pierpaolo Degano
,
Luca Vigano
HK$492
Computer Security - ESORICS 2009 (14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Michael Backes
,
Peng Ning
Computer Security - ESORICS 2009 (14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Michael Backes
,
Peng Ning
HK$1,000
Identity and Privacy in the Internet Age (14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Audun Josang
,
Torleiv Maseng
,
Svein J. Knapskog
Identity and Privacy in the Internet Age (14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Audun Josang
,
Torleiv Maseng
,
Svein J. Knapskog
HK$500
Information and Communications Security (14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Tat Wing Chim
,
Tsz Hon Yuen
Information and Communications Security (14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Tat Wing Chim
,
Tsz Hon Yuen
HK$555
Smart Cards, Tokens, Security and Applications
By
Dr. Keith Mayes
,
Konstantinos Markantonakis
Smart Cards, Tokens, Security and Applications
By
Dr. Keith Mayes
,
Konstantinos Markantonakis
Currently
Unavailable
Einf�hrung in Javafx [German] (Moderne GUIs F�r Rias Und Java-Applikationen)
By
Steyer, Ralph
Einf�hrung in Javafx [German] (Moderne GUIs F�r Rias Und Java-Applikationen)
By
Steyer, Ralph
Currently
Unavailable
Cloud-Based Remote Sensing with Google Earth Engine (Fundamentals and Applications)
By
Jeffrey A. Cardille
,
Morgan A. Crowley
,
David Saah
,
Nicholas E. Clinton
Cloud-Based Remote Sensing with Google Earth Engine (Fundamentals and Applications)
By
Jeffrey A. Cardille
,
Morgan A. Crowley
,
David Saah
,
Nicholas E. Clinton
Currently
Unavailable