0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(196)
Information Theory
(113)
Natural Language Processing
(19)
Data Processing
(17)
Data Modeling
(17)
Neural Networks
(12)
Logic Design
(11)
Cybernetics
(8)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(332)
Age Range
Age Range
All Ranges
15+
(35)
All Ages
(9)
Country
Country
All Countries
Germany
(105)
United States
(81)
Switzerland
(45)
United Kingdom
(45)
Netherlands
(1)
More...
Results for "Secret Knowledge"
Secret Knowledge
406 results
Filters
Refine By
Category
Category
General
(196)
Information Theory
(113)
Natural Language Processing
(19)
Data Processing
(17)
Data Modeling
(17)
Neural Networks
(12)
Logic Design
(11)
Cybernetics
(8)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(332)
Age Range
Age Range
All Ranges
15+
(35)
All Ages
(9)
Country
Country
All Countries
Germany
(105)
United States
(81)
Switzerland
(45)
United Kingdom
(45)
Netherlands
(1)
More...
406 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Generating Creative Images With DALL-E 3 (Create accurate images with effective prompting for real-world applications)
By
Holly Picano
Generating Creative Images With DALL-E 3 (Create accurate images with effective prompting for real-world applications)
By
Holly Picano
HK$362
GitHub for Next-Generation Coders (Build your ideas, share your code, and join a community of creators)
By
Igor Irić
GitHub for Next-Generation Coders (Build your ideas, share your code, and join a community of creators)
By
Igor Irić
HK$294
The Kubernetes Bible - Second Edition (The definitive guide to deploying and managing Kubernetes across cloud and on-prem environments)
By
Gineesh Madapparambath
,
Russ McKendrick
The Kubernetes Bible - Second Edition (The definitive guide to deploying and managing Kubernetes across cloud and on-prem environments)
By
Gineesh Madapparambath
,
Russ McKendrick
HK$600
Essential Guide to LLMOps (Implementing effective LLMOps strategies and tools from data to deployment)
By
Ryan Doan
Essential Guide to LLMOps (Implementing effective LLMOps strategies and tools from data to deployment)
By
Ryan Doan
HK$391
Microsoft Cybersecurity Architect Exam Ref SC-100 - Second Edition (Ace the SC-100 exam and develop cutting-edge cybersecurity strategies)
By
Dwayne Natwick
,
Graham Gold
,
Abu Zobayer
Microsoft Cybersecurity Architect Exam Ref SC-100 - Second Edition (Ace the SC-100 exam and develop cutting-edge cybersecurity strategies)
By
Dwayne Natwick
,
Graham Gold
,
Abu Zobayer
HK$456
Metaverse 2.0 (Blockchain Guide)
By
Simon L. Liggett
Metaverse 2.0 (Blockchain Guide)
By
Simon L. Liggett
HK$277
Building Data Science Applications with FastAPI - Second Edition (Develop, manage, and deploy efficient machine learning applications with Python)
By
Voron, François
Building Data Science Applications with FastAPI - Second Edition (Develop, manage, and deploy efficient machine learning applications with Python)
By
Voron, François
HK$483
AWS Certified Security - Specialty (SCS-C02) Exam Guide - Second Edition (Get all the guidance you need to pass the AWS (SCS-C02) exam on your first a)
By
Adam Book
,
Stuart Scott
AWS Certified Security - Specialty (SCS-C02) Exam Guide - Second Edition (Get all the guidance you need to pass the AWS (SCS-C02) exam on your first a)
By
Adam Book
,
Stuart Scott
HK$496
The Regularization Cookbook (Explore practical recipes to improve the functionality of your ML models)
By
Vincent Vandenbussche
,
Akin Osman Kazakci
The Regularization Cookbook (Explore practical recipes to improve the functionality of your ML models)
By
Vincent Vandenbussche
,
Akin Osman Kazakci
HK$554
Designing Hexagonal Architecture with Java - Second Edition (Build maintainable and long-lasting applications with Java and Quarkus)
By
Vieira, Davi
Designing Hexagonal Architecture with Java - Second Edition (Build maintainable and long-lasting applications with Java and Quarkus)
By
Vieira, Davi
HK$462
Principles of Data Science - Third Edition (A beginner's guide to essential math and coding skills for data fluency and machine learning)
By
Sinan Ozdemir
Principles of Data Science - Third Edition (A beginner's guide to essential math and coding skills for data fluency and machine learning)
By
Sinan Ozdemir
HK$383
Cloud-Native Development and Migration to Jakarta EE (Transform your legacy Java EE project into a cloud-native application)
By
Ron Veen
,
David Vlijmincx
Cloud-Native Development and Migration to Jakarta EE (Transform your legacy Java EE project into a cloud-native application)
By
Ron Veen
,
David Vlijmincx
HK$400
Hands-On Docker for Microservices with Python (Design, deploy, and operate a complex system with multiple microservices using Docker and Kubernetes)
By
Buelta, Jaime
Hands-On Docker for Microservices with Python (Design, deploy, and operate a complex system with multiple microservices using Docker and Kubernetes)
By
Buelta, Jaime
HK$416
Quantum Computing (Computer Science, Physics, And Mathematics)
By
Botwright, Rob
Quantum Computing (Computer Science, Physics, And Mathematics)
By
Botwright, Rob
HK$367
Elsewhere
HK$410.45
Save HK$43.45 (11%)
Neurocomputational Poetics (How the Brain Processes Verbal Art (Anthem Studies in Bibliotherapy and Well-Being))
By
Jacobs, Arthur
Neurocomputational Poetics (How the Brain Processes Verbal Art (Anthem Studies in Bibliotherapy and Well-Being))
By
Jacobs, Arthur
HK$834
Security with Noisy Data (On Private Biometrics, Secure Key Storage and Anti-counterfeiting)
By
Pim Tuyls
,
Boris Skoric
,
Tom Kevenaar
Security with Noisy Data (On Private Biometrics, Secure Key Storage and Anti-counterfeiting)
By
Pim Tuyls
,
Boris Skoric
,
Tom Kevenaar
HK$960
Multiterminal Secrecy by Public Discussion (Foundations and Trends (R) in Communications and Information Theory)
By
Narayan, Prakash
,
Tyagi, Himanshu
Multiterminal Secrecy by Public Discussion (Foundations and Trends (R) in Communications and Information Theory)
By
Narayan, Prakash
,
Tyagi, Himanshu
HK$760
Codes, Cryptology and Information Security (Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji (Security and Cryptology))
By
Claude Carlet
,
Sylvain Guilley
,
Abderrahmane Nitaj
,
El Mamoun Souidi
Codes, Cryptology and Information Security (Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji (Security and Cryptology))
By
Claude Carlet
,
Sylvain Guilley
,
Abderrahmane Nitaj
,
El Mamoun Souidi
HK$558
Advances in Cryptology – CRYPTO 2019 (39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I (Lecture Notes in Computer Science) (Security and Cryptology))
By
Alexandra Boldyreva
,
Daniele Micciancio
Advances in Cryptology – CRYPTO 2019 (39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I (Lecture Notes in Computer Science) (Security and Cryptology))
By
Alexandra Boldyreva
,
Daniele Micciancio
HK$1,240
Advances in Cryptology – CRYPTO 2019 (39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II (Lecture Notes in Computer Science) (Security and Cryptology))
By
Alexandra Boldyreva
,
Daniele Micciancio
Advances in Cryptology – CRYPTO 2019 (39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II (Lecture Notes in Computer Science) (Security and Cryptology))
By
Alexandra Boldyreva
,
Daniele Micciancio
HK$1,340
Advances in Cryptology – CRYPTO 2019 (39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III (Security and Cryptology) (Lecture Notes in Computer Science))
By
Alexandra Boldyreva
,
Daniele Micciancio
Advances in Cryptology – CRYPTO 2019 (39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III (Security and Cryptology) (Lecture Notes in Computer Science))
By
Alexandra Boldyreva
,
Daniele Micciancio
HK$1,356
Simulation Tools and Techniques (11th International Conference, SIMUtools 2019, Chengdu, China, July 8–10, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Houbing Song
,
Dingde Jiang
,
Jiang Zhou
Simulation Tools and Techniques (11th International Conference, SIMUtools 2019, Chengdu, China, July 8–10, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Houbing Song
,
Dingde Jiang
,
Jiang Zhou
HK$600
Advances in Cryptology – EUROCRYPT 2020 (39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I (Lecture Notes in Computer Science) (Security and Cryptology))
By
Anne Canteaut
,
Yuval Ishai
Advances in Cryptology – EUROCRYPT 2020 (39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I (Lecture Notes in Computer Science) (Security and Cryptology))
By
Anne Canteaut
,
Yuval Ishai
HK$1,040
Advances in Cryptology - EUROCRYPT 2020 (39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part II (Security and Cryptology))
By
Anne Canteaut
,
Yuval Ishai
Advances in Cryptology - EUROCRYPT 2020 (39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part II (Security and Cryptology))
By
Anne Canteaut
,
Yuval Ishai
HK$1,052
Previous Page
1
...
3
4
5
6
7
8
9
10
11
Next Page
Previous Page
1
...
3
4
5
6
7
8
9
10
11
Next Page