0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Information Theory
Filters
Sold By
Sold By
All Sellers
Fishpond
(54)
Age Range
Age Range
All Ranges
15+
(9)
Country
Country
All Countries
United States
(17)
Germany
(14)
Switzerland
(14)
Netherlands
(2)
United Kingdom
(1)
Results for "API"
API
62 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(54)
Age Range
Age Range
All Ranges
15+
(9)
Country
Country
All Countries
United States
(17)
Germany
(14)
Switzerland
(14)
Netherlands
(2)
United Kingdom
(1)
Related Searches:
linux api
rest api
web api
api 579-1
"api 579"
web api 2
$sj pulse desktop api url$
api ponds and accessories
62 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Foundations and Applications of Security Analysis (Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers (Lecture Notes in Comput ..)
By
Pierpaolo Degano
,
Luca Vigano
Foundations and Applications of Security Analysis (Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers (Lecture Notes in Comput ..)
By
Pierpaolo Degano
,
Luca Vigano
HK$500
Computer Security - ESORICS 2009 (14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Michael Backes
,
Peng Ning
Computer Security - ESORICS 2009 (14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Michael Backes
,
Peng Ning
HK$1,033
Identity and Privacy in the Internet Age (14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Audun Josang
,
Torleiv Maseng
,
Svein J. Knapskog
Identity and Privacy in the Internet Age (14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Audun Josang
,
Torleiv Maseng
,
Svein J. Knapskog
HK$500
Information and Communications Security (14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Tat Wing Chim
,
Tsz Hon Yuen
Information and Communications Security (14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Tat Wing Chim
,
Tsz Hon Yuen
HK$560
Smart Cards, Tokens, Security and Applications
By
Dr. Keith Mayes
,
Konstantinos Markantonakis
Smart Cards, Tokens, Security and Applications
By
Dr. Keith Mayes
,
Konstantinos Markantonakis
HK$771
Smart Cards, Tokens, Security and Applications
By
Keith Mayes
,
Konstantinos Markantonakis
Smart Cards, Tokens, Security and Applications
By
Keith Mayes
,
Konstantinos Markantonakis
HK$752
Smart Cards, Tokens, Security and Applications
By
Dr. Keith Mayes
,
Konstantinos Markantonakis
Smart Cards, Tokens, Security and Applications
By
Dr. Keith Mayes
,
Konstantinos Markantonakis
Currently
Unavailable
Einf�hrung in Javafx [German] (Moderne GUIs F�r Rias Und Java-Applikationen)
By
Steyer, Ralph
Einf�hrung in Javafx [German] (Moderne GUIs F�r Rias Und Java-Applikationen)
By
Steyer, Ralph
Currently
Unavailable
Graph Transformation (17th International Conference, ICGT 2024, Held as Part of STAF 2024, Enschede, The Netherlands, July 10–11, 2024, Proceedings (Lecture Notes in Computer Science))
By
Russ Harmer
,
Jens Kosiol
Graph Transformation (17th International Conference, ICGT 2024, Held as Part of STAF 2024, Enschede, The Netherlands, July 10–11, 2024, Proceedings (Lecture Notes in Computer Science))
By
Russ Harmer
,
Jens Kosiol
Currently
Unavailable
Digital Marketplaces Unleashed (Mastering Knowledge Intensive Assets: Monetizing and Sharing at Scale)
By
Sinha, Ranjan
,
Vasudevan, Cheranellore
Digital Marketplaces Unleashed (Mastering Knowledge Intensive Assets: Monetizing and Sharing at Scale)
By
Sinha, Ranjan
,
Vasudevan, Cheranellore
Currently
Unavailable
Data Insight Foundations (Step-by-Step Data Analysis with R)
By
Nikita Tkachenko
Data Insight Foundations (Step-by-Step Data Analysis with R)
By
Nikita Tkachenko
Currently
Unavailable
Collective Intelligence in Action
By
Alag, Satnam
Collective Intelligence in Action
By
Alag, Satnam
Currently
Unavailable
Cloud-Based Remote Sensing with Google Earth Engine (Fundamentals and Applications)
By
Jeffrey A. Cardille
,
Morgan A. Crowley
,
David Saah
,
Nicholas E. Clinton
Cloud-Based Remote Sensing with Google Earth Engine (Fundamentals and Applications)
By
Jeffrey A. Cardille
,
Morgan A. Crowley
,
David Saah
,
Nicholas E. Clinton
Currently
Unavailable
Cloud-Based Remote Sensing with Google Earth Engine (Fundamentals and Applications)
By
Jeffrey A. Cardille
,
Morgan A. Crowley
,
David Saah
,
Nicholas E. Clinton
Cloud-Based Remote Sensing with Google Earth Engine (Fundamentals and Applications)
By
Jeffrey A. Cardille
,
Morgan A. Crowley
,
David Saah
,
Nicholas E. Clinton
Currently
Unavailable
Previous Page
1
2
3
Previous Page
1
2
3