0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(637)
Cybernetics
(246)
Information Theory
(155)
Data Processing
(121)
Logic Design
(114)
Data Modeling
(62)
Neural Networks
(52)
Natural Language Processing
(46)
Parallel
(5)
Sold By
Sold By
All Sellers
Fishpond
(1,444)
Age Range
Age Range
All Ranges
15+
(21)
All Ages
(21)
Country
Country
All Countries
United States
(352)
Switzerland
(258)
United Kingdom
(242)
Singapore
(146)
Germany
(32)
More...
Results for "Security Books"
Security Books
2,113 results
Filters
Refine By
Category
Category
General
(637)
Cybernetics
(246)
Information Theory
(155)
Data Processing
(121)
Logic Design
(114)
Data Modeling
(62)
Neural Networks
(52)
Natural Language Processing
(46)
Parallel
(5)
Sold By
Sold By
All Sellers
Fishpond
(1,444)
Age Range
Age Range
All Ranges
15+
(21)
All Ages
(21)
Country
Country
All Countries
United States
(352)
Switzerland
(258)
United Kingdom
(242)
Singapore
(146)
Germany
(32)
More...
2,113 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Data Science and Security (Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems))
By
Samiksha Shukla
,
Xiao-Zhi Gao
,
Joseph Varghese Kureethara
,
Durgesh Mishra
Data Science and Security (Proceedings of IDSCS 2022 (Lecture Notes in Networks and Systems))
By
Samiksha Shukla
,
Xiao-Zhi Gao
,
Joseph Varghese Kureethara
,
Durgesh Mishra
HK$2,199
3D Imaging for Safety and Security (Computational Imaging and Vision)
By
Andreas Koschan
,
Marc Pollefeys
,
Mongi Abidi
3D Imaging for Safety and Security (Computational Imaging and Vision)
By
Andreas Koschan
,
Marc Pollefeys
,
Mongi Abidi
HK$560
Digital Communication (Communication, Multimedia, Security (X. Media Publishing))
By
Sack, Harald
,
Meinel, Christoph
Digital Communication (Communication, Multimedia, Security (X. Media Publishing))
By
Sack, Harald
,
Meinel, Christoph
HK$577
Machine Learning Security Principles (Keep data, networks, users, and applications safe from prying eyes)
By
John Paul Mueller
,
Rod Stephens
Machine Learning Security Principles (Keep data, networks, users, and applications safe from prying eyes)
By
John Paul Mueller
,
Rod Stephens
HK$489
Security Tokens and Stablecoins Quick Start Guide (Learn how to build STO and stablecoin decentralized applications)
By
Sun, Weimin
,
Wu, Xun
,
Angela Kwok
Security Tokens and Stablecoins Quick Start Guide (Learn how to build STO and stablecoin decentralized applications)
By
Sun, Weimin
,
Wu, Xun
,
Angela Kwok
HK$295
Access Control and Security Monitoring of Multimedia Information Processing and Transmission (Computing and Networks)
By
Zhihan Lyu
,
Jaime Lloret
,
Houbing Herbert Song
Access Control and Security Monitoring of Multimedia Information Processing and Transmission (Computing and Networks)
By
Zhihan Lyu
,
Jaime Lloret
,
Houbing Herbert Song
HK$1,000
Elsewhere
HK$1,187.46
Save HK$187.46 (16%)
Physical Biometrics for Hardware Security of DSP and Machine Learning Coprocessors (Materials, Circuits and Devices)
By
Anirban SenGupta
Physical Biometrics for Hardware Security of DSP and Machine Learning Coprocessors (Materials, Circuits and Devices)
By
Anirban SenGupta
HK$1,100
Elsewhere
HK$1,187.46
Save HK$87.46 (7%)
Cyber Security (The Lifeline of Information and Communication Technology (Springer Series in Wireless Technology))
By
Rohokale, Vandana
,
Prasad, Ramjee
Cyber Security (The Lifeline of Information and Communication Technology (Springer Series in Wireless Technology))
By
Rohokale, Vandana
,
Prasad, Ramjee
HK$1,340
Cyber Security (The Lifeline of Information and Communication Technology (Springer Series in Wireless Technology))
By
Ramjee Prasad
,
Vandana Rohokale
Cyber Security (The Lifeline of Information and Communication Technology (Springer Series in Wireless Technology))
By
Ramjee Prasad
,
Vandana Rohokale
HK$1,000
Elsewhere
HK$1,342.24
Save HK$342.24 (25%)
Cryptography Arithmetic (Algorithms and Hardware Architectures (Advances in Information Security))
By
Omondi, Amos R.
Cryptography Arithmetic (Algorithms and Hardware Architectures (Advances in Information Security))
By
Omondi, Amos R.
HK$900
Binary Code Fingerprinting for Cybersecurity (Application to Malicious Code Fingerprinting (Advances in Information Security))
By
Saed Alrabaee
,
Mourad Debbabi
,
Paria Shirani
,
Lingyu Wang
Binary Code Fingerprinting for Cybersecurity (Application to Malicious Code Fingerprinting (Advances in Information Security))
By
Saed Alrabaee
,
Mourad Debbabi
,
Paria Shirani
,
Lingyu Wang
HK$1,340
Binary Code Fingerprinting for Cybersecurity (Application to Malicious Code Fingerprinting (Advances in Information Security))
By
Saed Alrabaee
,
Mourad Debbabi
,
Paria Shirani
Binary Code Fingerprinting for Cybersecurity (Application to Malicious Code Fingerprinting (Advances in Information Security))
By
Saed Alrabaee
,
Mourad Debbabi
,
Paria Shirani
HK$1,300
Detecting Trust and Deception in Group Interaction (Terrorism, Security, and Computation)
By
V. S. Subrahmanian
,
Judee K. Burgoon
,
Norah E. Dunbar
Detecting Trust and Deception in Group Interaction (Terrorism, Security, and Computation)
By
V. S. Subrahmanian
,
Judee K. Burgoon
,
Norah E. Dunbar
HK$1,000
Detecting Trust and Deception in Group Interaction (Terrorism, Security, and Computation)
By
V. S. Subrahmanian
,
Judee K. Burgoon
,
Norah E. Dunbar
Detecting Trust and Deception in Group Interaction (Terrorism, Security, and Computation)
By
V. S. Subrahmanian
,
Judee K. Burgoon
,
Norah E. Dunbar
HK$1,000
Green Internet of Things Sensor Networks (Applications, Communication Technologies, and Security Challenges)
By
Murtala Zungeru, Adamu
,
Chuma, Joseph M.
,
Caspar K. Lebekwe
Green Internet of Things Sensor Networks (Applications, Communication Technologies, and Security Challenges)
By
Murtala Zungeru, Adamu
,
Chuma, Joseph M.
,
Caspar K. Lebekwe
HK$1,300
Green Internet of Things Sensor Networks (Applications, Communication Technologies, and Security Challenges)
By
Murtala Zungeru, Adamu
,
Chuma, Joseph M.
,
Caspar K. Lebekwe
Green Internet of Things Sensor Networks (Applications, Communication Technologies, and Security Challenges)
By
Murtala Zungeru, Adamu
,
Chuma, Joseph M.
,
Caspar K. Lebekwe
HK$1,281
Modern Cryptography (Applied Mathematics for Encryption and Information Security)
By
Easttom, William
Modern Cryptography (Applied Mathematics for Encryption and Information Security)
By
Easttom, William
HK$597
Security in Cyber-Physical Systems (Foundations and Applications (Studies in Systems, Decision and Control))
By
Ali Ismail Awad
,
Steven Furnell
,
Marcin Paprzycki
,
Sudhir Kumar Sharma
Security in Cyber-Physical Systems (Foundations and Applications (Studies in Systems, Decision and Control))
By
Ali Ismail Awad
,
Steven Furnell
,
Marcin Paprzycki
,
Sudhir Kumar Sharma
HK$1,560
Security in Cyber-Physical Systems (Foundations and Applications (Studies in Systems, Decision and Control))
By
Ali Ismail Awad
,
Steven Furnell
,
Marcin Paprzycki
,
Sudhir Kumar Sharma
Security in Cyber-Physical Systems (Foundations and Applications (Studies in Systems, Decision and Control))
By
Ali Ismail Awad
,
Steven Furnell
,
Marcin Paprzycki
,
Sudhir Kumar Sharma
HK$1,539
Android Malware Detection using Machine Learning (Data-Driven Fingerprinting and Threat Intelligence (Advances in Information Security))
By
Karbab, Elmouatez Billah
,
Mouheb, Djedjiga
,
Abdelouahid Derhab
Android Malware Detection using Machine Learning (Data-Driven Fingerprinting and Threat Intelligence (Advances in Information Security))
By
Karbab, Elmouatez Billah
,
Mouheb, Djedjiga
,
Abdelouahid Derhab
HK$1,535
Android Malware Detection using Machine Learning (Data-Driven Fingerprinting and Threat Intelligence (Advances in Information Security))
By
Karbab, Elmouatez Billah
,
Mouheb, Djedjiga
,
Abdelouahid Derhab
Android Malware Detection using Machine Learning (Data-Driven Fingerprinting and Threat Intelligence (Advances in Information Security))
By
Karbab, Elmouatez Billah
,
Mouheb, Djedjiga
,
Abdelouahid Derhab
HK$1,500
Privacy, Security and Forensics in the Internet of Things (Iot)
By
Reza Montasari
,
Fiona Carroll
,
Ian Mitchell
Privacy, Security and Forensics in the Internet of Things (Iot)
By
Reza Montasari
,
Fiona Carroll
,
Ian Mitchell
HK$1,500
Elsewhere
HK$1,652.01
Save HK$152.01 (9%)
Digital Transformation in Policing (The Promise, Perils and Solutions (Advanced Sciences and Technologies for Security Applications))
By
Reza Montasari
,
Victoria Carpenter
,
Anthony J. Masys
Digital Transformation in Policing (The Promise, Perils and Solutions (Advanced Sciences and Technologies for Security Applications))
By
Reza Montasari
,
Victoria Carpenter
,
Anthony J. Masys
HK$659
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page