0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(204)
Information Theory
(61)
Data Modeling
(24)
Data Processing
(21)
Logic Design
(20)
Cybernetics
(18)
Neural Networks
(10)
Natural Language Processing
(7)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(340)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(108)
United States
(76)
Switzerland
(56)
United Kingdom
(38)
Singapore
(10)
More...
Results for "The Code Of Trust"
The Code Of Trust
407 results
Filters
Refine By
Category
Category
General
(204)
Information Theory
(61)
Data Modeling
(24)
Data Processing
(21)
Logic Design
(20)
Cybernetics
(18)
Neural Networks
(10)
Natural Language Processing
(7)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(340)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(108)
United States
(76)
Switzerland
(56)
United Kingdom
(38)
Singapore
(10)
More...
407 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Trusted Execution Environments
By
Carlton Shepherd
,
Konstantinos Markantonakis
Trusted Execution Environments
By
Carlton Shepherd
,
Konstantinos Markantonakis
HK$349
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (ACM Books)
By
Parno, Bryan Jeffrey
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (ACM Books)
By
Parno, Bryan Jeffrey
HK$500
Elsewhere
HK$547.03
Save HK$47.03 (9%)
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
By
Parno, Bryan Jeffrey
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
By
Parno, Bryan Jeffrey
HK$692
Elsewhere
HK$957.30
Save HK$265.30 (28%)
Hardware IP Security and Trust
By
Prabhat Mishra
,
Swarup Bhunia
,
Mark Tehranipoor
Hardware IP Security and Trust
By
Prabhat Mishra
,
Swarup Bhunia
,
Mark Tehranipoor
HK$1,540
Trusted Computing Platforms (Design and Applications)
By
Smith, Sean W.
Trusted Computing Platforms (Design and Applications)
By
Smith, Sean W.
HK$931
Software Durability (Concepts and Practices)
By
Kumar, Rajeev
,
Ahmad Khan, Suhel
,
Raees Ahmad Khan
Software Durability (Concepts and Practices)
By
Kumar, Rajeev
,
Ahmad Khan, Suhel
,
Raees Ahmad Khan
HK$436
Elsewhere
HK$536.80
Save HK$100.80 (19%)
The Code of Honor (Embracing Ethics in Cybersecurity)
By
Paul J. Maurer
,
Ed Skoudis
The Code of Honor (Embracing Ethics in Cybersecurity)
By
Paul J. Maurer
,
Ed Skoudis
HK$259
Elsewhere
HK$313.93
Save HK$54.93 (17%)
The Ethical Hacker (Unraveling Technology Dilemmas for Student Coders)
By
Natalia Ivanova
The Ethical Hacker (Unraveling Technology Dilemmas for Student Coders)
By
Natalia Ivanova
HK$188
Computational Trust Models and Machine Learning (Chapman & Hall/CRC Machine Learning & Pattern Recognition)
By
Xin Liu
,
Anwitaman Datta
,
Ee-Peng Lim
Computational Trust Models and Machine Learning (Chapman & Hall/CRC Machine Learning & Pattern Recognition)
By
Xin Liu
,
Anwitaman Datta
,
Ee-Peng Lim
HK$449
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
By
Richard Brooks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
By
Richard Brooks
HK$1,000
Elsewhere
HK$1,519.52
Save HK$519.52 (34%)
Mastering Salesforce Devops (A Practical Guide to Building Trust While Delivering Innovation)
By
Davis, Andrew
Mastering Salesforce Devops (A Practical Guide to Building Trust While Delivering Innovation)
By
Davis, Andrew
HK$418
Elsewhere
HK$506.41
Save HK$88.41 (17%)
Embedded Software Design (A Practical Approach to Architecture, Processes, and Coding Techniques)
By
Beningo, Jacob
Embedded Software Design (A Practical Approach to Architecture, Processes, and Coding Techniques)
By
Beningo, Jacob
HK$395
Elsewhere
HK$455.76
Save HK$60.76 (13%)
Cloud Native Data Security with Oauth (A Scalable Zero Trust Architecture)
By
Gary Archer
,
Judith Kahrer
,
Michal Trojanowski
Cloud Native Data Security with Oauth (A Scalable Zero Trust Architecture)
By
Gary Archer
,
Judith Kahrer
,
Michal Trojanowski
HK$373
Elsewhere
HK$486.15
Save HK$113.15 (23%)
Programming with GitHub Copilot (Write Better Code--Faster! (Tech Today))
By
Dowswell, Kurt
Programming with GitHub Copilot (Write Better Code--Faster! (Tech Today))
By
Dowswell, Kurt
HK$372
Elsewhere
HK$481.18
Save HK$109.18 (23%)
Data Governance Handbook (A practical approach to building trust in data)
By
Wendy S. Batchelder
Data Governance Handbook (A practical approach to building trust in data)
By
Wendy S. Batchelder
HK$473
Data and Analytics in Action (Project Ideas and Basic Code Skeleton in Python)
By
Goraga, Zemelak
Data and Analytics in Action (Project Ideas and Basic Code Skeleton in Python)
By
Goraga, Zemelak
HK$308
Elsewhere
HK$491.21
Save HK$183.21 (37%)
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
HK$300
Elsewhere
HK$354.56
Save HK$54.56 (15%)
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
HK$398
AI Mastery Trilogy (A Comprehensive Guide to AI Basics for Managers, Essential Mathematics for AI, and Coding Practices for Modern Programmers in the AI Era (3-in-1 Collection) (AI Fundamentals))
By
Hinton, Andrew
AI Mastery Trilogy (A Comprehensive Guide to AI Basics for Managers, Essential Mathematics for AI, and Coding Practices for Modern Programmers in the AI Era (3-in-1 Collection) (AI Fundamentals))
By
Hinton, Andrew
HK$294
AI Mastery Trilogy (A Comprehensive Guide to AI Basics for Managers, Essential Mathematics for AI, and Coding Practices for Modern Program)
By
Hinton, Andrew
AI Mastery Trilogy (A Comprehensive Guide to AI Basics for Managers, Essential Mathematics for AI, and Coding Practices for Modern Program)
By
Hinton, Andrew
HK$420
Autonomic and Trusted Computing (4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Bin Xiao
,
Laurence Tianruo Yang
,
Christian Muller-Schloer
,
Christian Muller-Schloer
Autonomic and Trusted Computing (4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Bin Xiao
,
Laurence Tianruo Yang
,
Christian Muller-Schloer
,
Christian Muller-Schloer
HK$571
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Lopez, Javier
,
Gritzalis, Dimitris
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Lopez, Javier
,
Gritzalis, Dimitris
HK$973
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Gritzalis, Dimitris
,
Lopez, Javier
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Gritzalis, Dimitris
,
Lopez, Javier
HK$974
Human Aspects of Information Security, Privacy, and Trust (Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Information Systems and Applications, incl. Internet/ ..)
By
Theodore Tryfonas
,
Ioannis Askoxylakis
Human Aspects of Information Security, Privacy, and Trust (Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Information Systems and Applications, incl. Internet/ ..)
By
Theodore Tryfonas
,
Ioannis Askoxylakis
HK$540
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page