0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(637)
Cybernetics
(246)
Information Theory
(155)
Data Processing
(121)
Logic Design
(114)
Data Modeling
(62)
Neural Networks
(52)
Natural Language Processing
(46)
Parallel
(5)
Sold By
Sold By
All Sellers
Fishpond
(1,444)
Age Range
Age Range
All Ranges
15+
(21)
All Ages
(21)
Country
Country
All Countries
United States
(352)
Switzerland
(258)
United Kingdom
(242)
Singapore
(146)
Germany
(32)
More...
Results for "Security Books"
Security Books
2,113 results
Filters
Refine By
Category
Category
General
(637)
Cybernetics
(246)
Information Theory
(155)
Data Processing
(121)
Logic Design
(114)
Data Modeling
(62)
Neural Networks
(52)
Natural Language Processing
(46)
Parallel
(5)
Sold By
Sold By
All Sellers
Fishpond
(1,444)
Age Range
Age Range
All Ranges
15+
(21)
All Ages
(21)
Country
Country
All Countries
United States
(352)
Switzerland
(258)
United Kingdom
(242)
Singapore
(146)
Germany
(32)
More...
2,113 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Deep Learning for Computational Problems in Hardware Security (Modeling Attacks on Strong Physically Unclonable Function Circuits (Studies in Computational Intelligence))
By
Chakraborty, Rajat Subhra
,
Santikellur, Pranesh
Deep Learning for Computational Problems in Hardware Security (Modeling Attacks on Strong Physically Unclonable Function Circuits (Studies in Computational Intelligence))
By
Chakraborty, Rajat Subhra
,
Santikellur, Pranesh
HK$538
Elsewhere
HK$929.65
Save HK$391.65 (42%)
Deep Learning for Computational Problems in Hardware Security (Modeling Attacks on Strong Physically Unclonable Function Circuits (Studies in Computational Intelligence))
By
Chakraborty, Rajat Subhra
,
Santikellur, Pranesh
Deep Learning for Computational Problems in Hardware Security (Modeling Attacks on Strong Physically Unclonable Function Circuits (Studies in Computational Intelligence))
By
Chakraborty, Rajat Subhra
,
Santikellur, Pranesh
HK$500
Emerging Technologies in Data Mining and Information Security (Proceedings of IEMIS 2022, Volume 2 (Lecture Notes in Networks and Systems))
By
Paramartha Dutta
,
Satyajit Chakrabarti
Emerging Technologies in Data Mining and Information Security (Proceedings of IEMIS 2022, Volume 2 (Lecture Notes in Networks and Systems))
By
Paramartha Dutta
,
Satyajit Chakrabarti
HK$1,980
Machine Learning, Image Processing, Network Security and Data Sciences (Select Proceedings of 3rd International Conference on MIND 2021 (Lecture Notes in Electrical Engineering))
By
Rajesh Doriya
,
Badal Soni
,
Anupam Shukla
,
Xiao-Zhi Gao
Machine Learning, Image Processing, Network Security and Data Sciences (Select Proceedings of 3rd International Conference on MIND 2021 (Lecture Notes in Electrical Engineering))
By
Rajesh Doriya
,
Badal Soni
,
Anupam Shukla
,
Xiao-Zhi Gao
HK$1,982
Elsewhere
HK$2,066.00
Save HK$84.00 (4%)
Machine Learning, Image Processing, Network Security and Data Sciences (Select Proceedings of 3rd International Conference on MIND 2021 (Lecture Notes in Electrical Engineering))
By
Rajesh Doriya
,
Badal Soni
,
Anupam Shukla
,
Xiao-Zhi Gao
Machine Learning, Image Processing, Network Security and Data Sciences (Select Proceedings of 3rd International Conference on MIND 2021 (Lecture Notes in Electrical Engineering))
By
Rajesh Doriya
,
Badal Soni
,
Anupam Shukla
,
Xiao-Zhi Gao
HK$2,100
Convergence of Blockchain and Explainable Artificial Intelligence (BlockXAI (River Publishers Series in Digital Security and Forensics))
By
Akansha Singh
,
Krishna Kant Singh
Convergence of Blockchain and Explainable Artificial Intelligence (BlockXAI (River Publishers Series in Digital Security and Forensics))
By
Akansha Singh
,
Krishna Kant Singh
HK$760
Elsewhere
HK$1,032.95
Save HK$272.95 (26%)
Global Perspectives on the Applications of Computer Vision in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Franklin Tchakounté
,
Marcellin Atemkeng
Global Perspectives on the Applications of Computer Vision in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Franklin Tchakounté
,
Marcellin Atemkeng
HK$1,672
Elsewhere
HK$1,942.14
Save HK$270.14 (14%)
Cyber-Physical Threat Intelligence for Critical Infrastructures Security (A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures (NowOpen))
By
John Soldatos
,
James Philpot
,
Gabriele Giunta
Cyber-Physical Threat Intelligence for Critical Infrastructures Security (A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures (NowOpen))
By
John Soldatos
,
James Philpot
,
Gabriele Giunta
HK$900
Elsewhere
HK$971.07
Save HK$71.07 (7%)
System Programming Essentials with Go (System calls, networking, efficiency, and security practices with practical projects in Golang)
By
Alex Rios
System Programming Essentials with Go (System calls, networking, efficiency, and security practices with practical projects in Golang)
By
Alex Rios
HK$439
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems (A Decision and Game Theoretic Approach (Advances in Information Security))
By
Xu, Zhiheng
,
Zhu, Quanyan
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems (A Decision and Game Theoretic Approach (Advances in Information Security))
By
Xu, Zhiheng
,
Zhu, Quanyan
HK$1,640
Digital Forensic Investigation of Internet of Things (IoT) Devices (Advanced Sciences and Technologies for Security Applications)
By
Reza Montasari
,
Hamid Jahankhani
,
Richard Hill
,
Simon Parkinson
Digital Forensic Investigation of Internet of Things (IoT) Devices (Advanced Sciences and Technologies for Security Applications)
By
Reza Montasari
,
Hamid Jahankhani
,
Richard Hill
,
Simon Parkinson
HK$1,340
Digital Forensic Investigation of Internet of Things (IoT) Devices (Advanced Sciences and Technologies for Security Applications)
By
Reza Montasari
,
Hamid Jahankhani
,
Richard Hill
,
Simon Parkinson
Digital Forensic Investigation of Internet of Things (IoT) Devices (Advanced Sciences and Technologies for Security Applications)
By
Reza Montasari
,
Hamid Jahankhani
,
Richard Hill
,
Simon Parkinson
HK$1,000
Towards Connected and Autonomous Vehicle Highways (Technical, Security and Social Challenges (EAI/Springer Innovations in Communication and Computing))
By
Umar Zakir Abdul Hamid
,
Fadi Al-Turjman
Towards Connected and Autonomous Vehicle Highways (Technical, Security and Social Challenges (EAI/Springer Innovations in Communication and Computing))
By
Umar Zakir Abdul Hamid
,
Fadi Al-Turjman
HK$1,660
Towards Connected and Autonomous Vehicle Highways (Technical, Security and Social Challenges (EAI/Springer Innovations in Communication and Computing))
By
Umar Zakir Abdul Hamid
,
Fadi Al-Turjman
Towards Connected and Autonomous Vehicle Highways (Technical, Security and Social Challenges (EAI/Springer Innovations in Communication and Computing))
By
Umar Zakir Abdul Hamid
,
Fadi Al-Turjman
HK$1,640
The Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021 (EAI/Springer Innovations in Communication and Computing))
By
Anand Nayyar
,
Anand Paul
,
Sudeep Tanwar
The Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021 (EAI/Springer Innovations in Communication and Computing))
By
Anand Nayyar
,
Anand Paul
,
Sudeep Tanwar
HK$1,300
The Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021 (EAI/Springer Innovations in Communication and Computing))
By
Anand Nayyar
,
Anand Paul
,
Sudeep Tanwar
The Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021 (EAI/Springer Innovations in Communication and Computing))
By
Anand Nayyar
,
Anand Paul
,
Sudeep Tanwar
HK$1,300
Guide to Cybersecurity in Digital Transformation (Trends, Methods, Technologies, Applications and Best Practices (Advances in Information Security))
By
Möller, Dietmar P. F.
Guide to Cybersecurity in Digital Transformation (Trends, Methods, Technologies, Applications and Best Practices (Advances in Information Security))
By
Möller, Dietmar P. F.
HK$800
Financial Cryptography and Data Security. FC 2022 International Workshops (CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers (Lecture Notes in Computer Science))
By
Shin'ichiro Matsuo
,
Lewis Gudgeon
,
Ariah Klages-Mundt
,
Daniel Perez Hernandez
Financial Cryptography and Data Security. FC 2022 International Workshops (CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers (Lecture Notes in Computer Science))
By
Shin'ichiro Matsuo
,
Lewis Gudgeon
,
Ariah Klages-Mundt
,
Daniel Perez Hernandez
HK$938
The Seventh International Conference on Safety and Security with IoT (SaSeIoT 2023 (EAI/Springer Innovations in Communication and Computing))
By
Kim Phuc Tran
,
Shujun Li
,
Cédric Heuchenne
,
Thu Huong Truong
The Seventh International Conference on Safety and Security with IoT (SaSeIoT 2023 (EAI/Springer Innovations in Communication and Computing))
By
Kim Phuc Tran
,
Shujun Li
,
Cédric Heuchenne
,
Thu Huong Truong
HK$1,300
Cryptography and Coding (10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Nigel P. Smart
Cryptography and Coding (10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Nigel P. Smart
HK$589
Surveillance in Action (Technologies for Civilian, Military and Cyber Surveillance (Advanced Sciences and Technologies for Security Applications))
By
Panagiotis Karampelas
,
Thirimachos Bourlai
Surveillance in Action (Technologies for Civilian, Military and Cyber Surveillance (Advanced Sciences and Technologies for Security Applications))
By
Panagiotis Karampelas
,
Thirimachos Bourlai
HK$1,900
Emerging Technologies in Data Mining and Information Security (Proceedings of IEMIS 2020, Volume 2 (Advances in Intelligent Systems and Computing))
By
Aboul Ella Hassanien
,
Siddhartha Bhattacharyya
,
Satyajit Chakrabati
,
Abhishek Bhattacharya
Emerging Technologies in Data Mining and Information Security (Proceedings of IEMIS 2020, Volume 2 (Advances in Intelligent Systems and Computing))
By
Aboul Ella Hassanien
,
Siddhartha Bhattacharyya
,
Satyajit Chakrabati
,
Abhishek Bhattacharya
HK$1,992
Design and Cryptanalysis of ZUC (A Stream Cipher in Mobile Telephony (SpringerBriefs on Cyber Security Systems and Networks))
By
Mukherjee, Chandra Sekhar
,
Maitra, Subhamoy
,
Subhamoy Maitra
Design and Cryptanalysis of ZUC (A Stream Cipher in Mobile Telephony (SpringerBriefs on Cyber Security Systems and Networks))
By
Mukherjee, Chandra Sekhar
,
Maitra, Subhamoy
,
Subhamoy Maitra
HK$482
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences & Innovative Business Technology)
By
Adarsh Kumar
,
Neelu Jyothi Ahuja
,
Keshav Kaushik
,
Deepak Singh Tomar
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences & Innovative Business Technology)
By
Adarsh Kumar
,
Neelu Jyothi Ahuja
,
Keshav Kaushik
,
Deepak Singh Tomar
HK$1,200
Elsewhere
HK$1,342.87
Save HK$142.87 (11%)
Previous Page
1
...
5
6
7
8
9
10
11
12
13
Next Page
Previous Page
1
...
5
6
7
8
9
10
11
12
13
Next Page