0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Information Theory
Filters
Sold By
Sold By
All Sellers
Fishpond
(61)
Age Range
Age Range
All Ranges
15+
(4)
Country
Country
All Countries
Germany
(26)
Switzerland
(14)
United States
(13)
United Kingdom
(3)
Netherlands
(1)
Results for "The Code Of Trust"
The Code Of Trust
71 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(61)
Age Range
Age Range
All Ranges
15+
(4)
Country
Country
All Countries
Germany
(26)
Switzerland
(14)
United States
(13)
United Kingdom
(3)
Netherlands
(1)
71 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Trusted Computing Platforms (Design and Applications)
By
Smith, Sean W.
Trusted Computing Platforms (Design and Applications)
By
Smith, Sean W.
HK$900
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
By
Richard Brooks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
By
Richard Brooks
HK$1,000
Elsewhere
HK$1,510.73
Save HK$510.73 (34%)
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Lopez, Javier
,
Gritzalis, Dimitris
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Lopez, Javier
,
Gritzalis, Dimitris
HK$960
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Gritzalis, Dimitris
,
Lopez, Javier
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Gritzalis, Dimitris
,
Lopez, Javier
HK$1,000
Advances in Cryptology (Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings: AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast)
By
Jennifer Seberry
,
Yuliang Zheng
Advances in Cryptology (Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings: AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast)
By
Jennifer Seberry
,
Yuliang Zheng
HK$551
Advances in Ad Hoc Networking (Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma De Mallorca, Spain, June 25-27, 2008 (IFIP Advances in Information and Communication Technology))
By
Pedro Cuenca
,
Carlos Guerrero
,
Ramon Puigjaner
,
Bartomeu Serra
Advances in Ad Hoc Networking (Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma De Mallorca, Spain, June 25-27, 2008 (IFIP Advances in Information and Communication Technology))
By
Pedro Cuenca
,
Carlos Guerrero
,
Ramon Puigjaner
,
Bartomeu Serra
HK$900
Economics of Identity Theft (Avoidance, Causes and Possible Cures)
By
Camp, L. Jean
Economics of Identity Theft (Avoidance, Causes and Possible Cures)
By
Camp, L. Jean
HK$500
Making Sense of Field Research (A Practical Guide for Information Designers)
By
Pontis, Sheila
Making Sense of Field Research (A Practical Guide for Information Designers)
By
Pontis, Sheila
HK$988
Elsewhere
HK$1,460.37
Save HK$472.37 (32%)
Making Sense of Field Research (A Practical Guide for Information Designers)
By
Pontis, Sheila (University College London, Interaction Centre, U
Making Sense of Field Research (A Practical Guide for Information Designers)
By
Pontis, Sheila (University College London, Interaction Centre, U
HK$437
Elsewhere
HK$523.62
Save HK$86.62 (17%)
Telecommunication Network Intelligence (IFIP TC6/WG6.7 Sixth International Conference on Intelligence in Networks (SmartNet 2000), September 18–22, 2000, Vienna, Austria (IFIP Advances in Information and Communication Technology))
By
Harmen R. van As
Telecommunication Network Intelligence (IFIP TC6/WG6.7 Sixth International Conference on Intelligence in Networks (SmartNet 2000), September 18–22, 2000, Vienna, Austria (IFIP Advances in Information and Communication Technology))
By
Harmen R. van As
HK$1,940
Information Theory (A Tutorial Introduction (A Tutorial Introduction Book))
By
James V. Stone
Information Theory (A Tutorial Introduction (A Tutorial Introduction Book))
By
James V. Stone
HK$225
150
Securing Wireless Communications at the Physical Layer
By
Ruoheng Liu
,
Wade Trappe
Securing Wireless Communications at the Physical Layer
By
Ruoheng Liu
,
Wade Trappe
HK$1,300
Advances in Ad Hoc Networking (Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 (IFIP Advances in Information and Communication Technology))
By
Pedro Cuenca
,
Carlos Guerrero
,
Ramon Puigjaner
,
Bartomeu Serra
Advances in Ad Hoc Networking (Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 (IFIP Advances in Information and Communication Technology))
By
Pedro Cuenca
,
Carlos Guerrero
,
Ramon Puigjaner
,
Bartomeu Serra
HK$960
Economics of Identity Theft (Avoidance, Causes and Possible Cures)
By
Camp, L. Jean
Economics of Identity Theft (Avoidance, Causes and Possible Cures)
By
Camp, L. Jean
HK$540
Theory and Practice of Cryptography Solutions for Secure Information Systems
By
Elci
,
Atilla Eli
,
Josef Pieprzyk
Theory and Practice of Cryptography Solutions for Secure Information Systems
By
Elci
,
Atilla Eli
,
Josef Pieprzyk
HK$1,731
Elsewhere
HK$1,943.80
Save HK$212.80 (11%)
Telecommunication Network Intelligence (IFIP TC6/WG6.7 Sixth International Conference on Intelligence in Networks (SmartNet 2000), September 18–22, 2000, Vienna, Austria (IFIP Advances in Information and Communication Technology))
By
Harmen R. van As
Telecommunication Network Intelligence (IFIP TC6/WG6.7 Sixth International Conference on Intelligence in Networks (SmartNet 2000), September 18–22, 2000, Vienna, Austria (IFIP Advances in Information and Communication Technology))
By
Harmen R. van As
HK$1,800
Securing Wireless Communications at the Physical Layer
By
Ruoheng Liu
,
Wade Trappe
Securing Wireless Communications at the Physical Layer
By
Ruoheng Liu
,
Wade Trappe
HK$1,300
Information Theory (A Tutorial Introduction)
By
James V. Stone
Information Theory (A Tutorial Introduction)
By
James V. Stone
HK$200
Information Theory (A Tutorial Introduction)
By
James V. Stone
Information Theory (A Tutorial Introduction)
By
James V. Stone
HK$700
IoT as a Service (Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20-22, 2017, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Yi-Bing Lin
,
Der-Jiunn Deng
,
Ilsun You
,
Chun-Cheng Lin
IoT as a Service (Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20-22, 2017, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Yi-Bing Lin
,
Der-Jiunn Deng
,
Ilsun You
,
Chun-Cheng Lin
HK$500
Advances in Cryptology – CRYPTO 2019 (39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III (Security and Cryptology) (Lecture Notes in Computer Science))
By
Alexandra Boldyreva
,
Daniele Micciancio
Advances in Cryptology – CRYPTO 2019 (39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III (Security and Cryptology) (Lecture Notes in Computer Science))
By
Alexandra Boldyreva
,
Daniele Micciancio
HK$1,333
Body Area Networks (Smart IoT and Big Data for Intelligent Health Management: 14th EAI International Conference, BODYNETS 2019, Florence, Italy, October 2-3, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics an ..)
By
Lorenzo Mucchi
,
Matti Hämäläinen
,
Sara Jayousi
Body Area Networks (Smart IoT and Big Data for Intelligent Health Management: 14th EAI International Conference, BODYNETS 2019, Florence, Italy, October 2-3, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics an ..)
By
Lorenzo Mucchi
,
Matti Hämäläinen
,
Sara Jayousi
HK$500
Financial Cryptography and Data Security (FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Matthew Bernhard
,
Andrea Bracciali
,
L. Jean Camp
,
Shin'ichiro Matsuo
Financial Cryptography and Data Security (FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Matthew Bernhard
,
Andrea Bracciali
,
L. Jean Camp
,
Shin'ichiro Matsuo
HK$1,078
IoT as a Service (6th EAI International Conference, IoTaaS 2020, Xi’an, China, November 19–20, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Bo Li
,
Changle Li
,
Mao Yang
,
Zhongjiang Yan
IoT as a Service (6th EAI International Conference, IoTaaS 2020, Xi’an, China, November 19–20, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Bo Li
,
Changle Li
,
Mao Yang
,
Zhongjiang Yan
HK$1,030
1
2
3
Next Page
1
2
3
Next Page