0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(204)
Information Theory
(61)
Data Modeling
(24)
Data Processing
(21)
Logic Design
(20)
Cybernetics
(18)
Neural Networks
(10)
Natural Language Processing
(7)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(340)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(108)
United States
(76)
Switzerland
(56)
United Kingdom
(38)
Singapore
(10)
More...
Results for "The Code Of Trust"
The Code Of Trust
410 results
Filters
Refine By
Category
Category
General
(204)
Information Theory
(61)
Data Modeling
(24)
Data Processing
(21)
Logic Design
(20)
Cybernetics
(18)
Neural Networks
(10)
Natural Language Processing
(7)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(340)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(108)
United States
(76)
Switzerland
(56)
United Kingdom
(38)
Singapore
(10)
More...
410 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Trusted Execution Environments
By
Carlton Shepherd
,
Konstantinos Markantonakis
Trusted Execution Environments
By
Carlton Shepherd
,
Konstantinos Markantonakis
HK$375
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (ACM Books)
By
Parno, Bryan Jeffrey
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (ACM Books)
By
Parno, Bryan Jeffrey
HK$500
Elsewhere
HK$544.14
Save HK$44.14 (8%)
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
By
Parno, Bryan Jeffrey
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
By
Parno, Bryan Jeffrey
HK$689
Elsewhere
HK$952.25
Save HK$263.25 (28%)
Hardware IP Security and Trust
By
Prabhat Mishra
,
Swarup Bhunia
,
Mark Tehranipoor
Hardware IP Security and Trust
By
Prabhat Mishra
,
Swarup Bhunia
,
Mark Tehranipoor
HK$1,538
Trusted Computing Platforms (Design and Applications)
By
Smith, Sean W.
Trusted Computing Platforms (Design and Applications)
By
Smith, Sean W.
HK$900
Software Durability (Concepts and Practices)
By
Kumar, Rajeev
,
Ahmad Khan, Suhel
,
Raees Ahmad Khan
Software Durability (Concepts and Practices)
By
Kumar, Rajeev
,
Ahmad Khan, Suhel
,
Raees Ahmad Khan
HK$443
Elsewhere
HK$533.97
Save HK$90.97 (17%)
The Code of Honor (Embracing Ethics in Cybersecurity)
By
Paul J. Maurer
,
Ed Skoudis
The Code of Honor (Embracing Ethics in Cybersecurity)
By
Paul J. Maurer
,
Ed Skoudis
HK$279
Elsewhere
HK$312.28
Save HK$33.28 (11%)
The Ethical Hacker (Unraveling Technology Dilemmas for Student Coders)
By
Natalia Ivanova
The Ethical Hacker (Unraveling Technology Dilemmas for Student Coders)
By
Natalia Ivanova
HK$187
Computational Trust Models and Machine Learning (Chapman & Hall/CRC Machine Learning & Pattern Recognition)
By
Xin Liu
,
Anwitaman Datta
,
Ee-Peng Lim
Computational Trust Models and Machine Learning (Chapman & Hall/CRC Machine Learning & Pattern Recognition)
By
Xin Liu
,
Anwitaman Datta
,
Ee-Peng Lim
HK$447
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
By
Richard Brooks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
By
Richard Brooks
HK$1,000
Elsewhere
HK$1,511.51
Save HK$511.51 (34%)
Mastering Salesforce Devops (A Practical Guide to Building Trust While Delivering Innovation)
By
Davis, Andrew
Mastering Salesforce Devops (A Practical Guide to Building Trust While Delivering Innovation)
By
Davis, Andrew
HK$420
Elsewhere
HK$503.73
Save HK$83.73 (17%)
Embedded Software Design (A Practical Approach to Architecture, Processes, and Coding Techniques)
By
Beningo, Jacob
Embedded Software Design (A Practical Approach to Architecture, Processes, and Coding Techniques)
By
Beningo, Jacob
HK$396
Elsewhere
HK$453.35
Save HK$57.35 (13%)
Cloud Native Data Security with Oauth (A Scalable Zero Trust Architecture)
By
Gary Archer
,
Judith Kahrer
,
Trojanowski Micha?
Cloud Native Data Security with Oauth (A Scalable Zero Trust Architecture)
By
Gary Archer
,
Judith Kahrer
,
Trojanowski Micha?
HK$467
Programming with GitHub Copilot (Write Better Code--Faster! (Tech Today))
By
Dowswell, Kurt
Programming with GitHub Copilot (Write Better Code--Faster! (Tech Today))
By
Dowswell, Kurt
HK$406
Elsewhere
HK$478.64
Save HK$72.64 (15%)
Data Governance Handbook (A practical approach to building trust in data)
By
Wendy S. Batchelder
Data Governance Handbook (A practical approach to building trust in data)
By
Wendy S. Batchelder
HK$471
Data and Analytics in Action (Project Ideas and Basic Code Skeleton in Python)
By
Goraga, Zemelak
Data and Analytics in Action (Project Ideas and Basic Code Skeleton in Python)
By
Goraga, Zemelak
HK$309
Elsewhere
HK$488.62
Save HK$179.62 (37%)
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
HK$299
Elsewhere
HK$352.69
Save HK$53.69 (15%)
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
HK$400
AI Mastery Trilogy (A Comprehensive Guide to AI Basics for Managers, Essential Mathematics for AI, and Coding Practices for Modern Programmers in the AI Era (3-in-1 Collection) (AI Fundamentals))
By
Hinton, Andrew
AI Mastery Trilogy (A Comprehensive Guide to AI Basics for Managers, Essential Mathematics for AI, and Coding Practices for Modern Programmers in the AI Era (3-in-1 Collection) (AI Fundamentals))
By
Hinton, Andrew
HK$292
AI Mastery Trilogy (A Comprehensive Guide to AI Basics for Managers, Essential Mathematics for AI, and Coding Practices for Modern Program)
By
Hinton, Andrew
AI Mastery Trilogy (A Comprehensive Guide to AI Basics for Managers, Essential Mathematics for AI, and Coding Practices for Modern Program)
By
Hinton, Andrew
HK$418
Autonomic and Trusted Computing (4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Bin Xiao
,
Laurence Tianruo Yang
,
Christian Muller-Schloer
,
Christian Muller-Schloer
Autonomic and Trusted Computing (4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Bin Xiao
,
Laurence Tianruo Yang
,
Christian Muller-Schloer
,
Christian Muller-Schloer
HK$560
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Lopez, Javier
,
Gritzalis, Dimitris
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Lopez, Javier
,
Gritzalis, Dimitris
HK$960
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Gritzalis, Dimitris
,
Lopez, Javier
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Gritzalis, Dimitris
,
Lopez, Javier
HK$987
Human Aspects of Information Security, Privacy, and Trust (Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Information Systems and Applications, incl. Internet/ ..)
By
Theodore Tryfonas
,
Ioannis Askoxylakis
Human Aspects of Information Security, Privacy, and Trust (Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Information Systems and Applications, incl. Internet/ ..)
By
Theodore Tryfonas
,
Ioannis Askoxylakis
HK$540
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page