0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(203)
Information Theory
(61)
Data Modeling
(24)
Data Processing
(21)
Logic Design
(20)
Cybernetics
(18)
Neural Networks
(10)
Natural Language Processing
(7)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(339)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(108)
United States
(76)
Switzerland
(56)
United Kingdom
(38)
Singapore
(10)
More...
Results for "The Code Of Trust"
The Code Of Trust
410 results
Filters
Refine By
Category
Category
General
(203)
Information Theory
(61)
Data Modeling
(24)
Data Processing
(21)
Logic Design
(20)
Cybernetics
(18)
Neural Networks
(10)
Natural Language Processing
(7)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(339)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(108)
United States
(76)
Switzerland
(56)
United Kingdom
(38)
Singapore
(10)
More...
410 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Information Security Practice and Experience (First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Robert H. Deng
,
Feng Bao
,
Hweehwa Pang
,
Jianying Zhou
Information Security Practice and Experience (First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Robert H. Deng
,
Feng Bao
,
Hweehwa Pang
,
Jianying Zhou
HK$500
Experimental and Efficient Algorithms (4th International Workshop, WEA 2005, Santorini Island, Greece, May 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Programming and Software Engineering))
By
Sotiris E. Nikoletseas
Experimental and Efficient Algorithms (4th International Workshop, WEA 2005, Santorini Island, Greece, May 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Programming and Software Engineering))
By
Sotiris E. Nikoletseas
HK$975
Computational Science -- ICCS 2005 (5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part I (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
V. S. Sunderam
,
Geert Dick van Albada
,
Peter M.A. Sloot
,
J. J. Dongarra
Computational Science -- ICCS 2005 (5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part I (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
V. S. Sunderam
,
Geert Dick van Albada
,
Peter M.A. Sloot
,
J. J. Dongarra
HK$1,260
Data and Applications Security XIX (19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Com ..)
By
Sushil Jajodia
,
Duminda Wijesekera
Data and Applications Security XIX (19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Com ..)
By
Sushil Jajodia
,
Duminda Wijesekera
HK$500
Database and Expert Systems Applications (16th International Conference, DEXA 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Kim V. Andersen
,
John Debenham
,
Roland Wagner
Database and Expert Systems Applications (16th International Conference, DEXA 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Kim V. Andersen
,
John Debenham
,
Roland Wagner
HK$1,091
Communications and Multimedia Security (9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19 - 21, 2005: Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Jana Dittmann
,
Stefan Katzenbeisser
,
Andreas Uhl
Communications and Multimedia Security (9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19 - 21, 2005: Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Jana Dittmann
,
Stefan Katzenbeisser
,
Andreas Uhl
HK$500
Computer Network Security (Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings (Lecture Notes in Computer Science) (Com ..)
By
Vladimir Gorodetsky
,
Igor Kotenko
,
Victor Skormin
Computer Network Security (Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings (Lecture Notes in Computer Science) (Com ..)
By
Vladimir Gorodetsky
,
Igor Kotenko
,
Victor Skormin
HK$540
Cryptology and Network Security (4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Yongging Li
,
Yvo G. Desmedt
,
Yi Mu
,
Yi Mu
Cryptology and Network Security (4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Yongging Li
,
Yvo G. Desmedt
,
Yi Mu
,
Yi Mu
HK$500
Mobile Ad-Hoc and Sensor Networks (First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005 : Proceedings (Lecture Notes in Computer Science / Computer Communication Networks and Telecommunications))
By
Xiaohua Jia
,
Jie Wu
,
Yanxiang He
Mobile Ad-Hoc and Sensor Networks (First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005 : Proceedings (Lecture Notes in Computer Science / Computer Communication Networks and Telecommunications))
By
Xiaohua Jia
,
Jie Wu
,
Yanxiang He
HK$1,538
Information and Communications Security (7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Sihan Qing
,
Wenbo Mao
,
Javier Lopez
,
Guilin Wang
Information and Communications Security (7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Sihan Qing
,
Wenbo Mao
,
Javier Lopez
,
Guilin Wang
HK$540
Digital Rights Management (Technologies, Issues, Challenges and Systems (Security and Cryptology) (Lecture Notes in Computer Science))
By
Reihaneh Safavi-Naini
,
Moti Yung
Digital Rights Management (Technologies, Issues, Challenges and Systems (Security and Cryptology) (Lecture Notes in Computer Science))
By
Reihaneh Safavi-Naini
,
Moti Yung
HK$500
Wireless Algorithms, Systems, and Applications (First International Conference, Wasa 2006, XI'an, China, August 15-17, 2006, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Xiuzhen Cheng
,
Wei Li
,
Taieb Znati
Wireless Algorithms, Systems, and Applications (First International Conference, Wasa 2006, XI'an, China, August 15-17, 2006, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Xiuzhen Cheng
,
Wei Li
,
Taieb Znati
HK$1,000
High Performance Computing and Communications (Second International Conference, HPCC 2006, Munich, Germany, September 13-15, 2006, Proceedings (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues))
By
Michael Gerndt
,
Dieter Kranzlmuller
High Performance Computing and Communications (Second International Conference, HPCC 2006, Munich, Germany, September 13-15, 2006, Proceedings (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues))
By
Michael Gerndt
,
Dieter Kranzlmuller
HK$1,088
Formal Approaches to Agent-Based Systems (Second International Workshop, FAABS 2002, Greenbelt, MD, USA, October 29-31, 2002, Revised Papers (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
Michael G. Hinchey
,
James L. Rash
,
Walter F. Truszkowski
,
Christopher A. Rouff
Formal Approaches to Agent-Based Systems (Second International Workshop, FAABS 2002, Greenbelt, MD, USA, October 29-31, 2002, Revised Papers (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
Michael G. Hinchey
,
James L. Rash
,
Walter F. Truszkowski
,
Christopher A. Rouff
HK$658
Modular Programming Languages (Joint Modular Languages Conference, JMLC 2003, Klagenfurt, Austria, August 25-27, 2003, Proceedings (Lecture Notes in Computer Science))
By
Laszlo Boszormenyi
,
Peter Schojer
Modular Programming Languages (Joint Modular Languages Conference, JMLC 2003, Klagenfurt, Austria, August 25-27, 2003, Proceedings (Lecture Notes in Computer Science))
By
Laszlo Boszormenyi
,
Peter Schojer
HK$496
Information Security and Privacy (6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001. Proceedings: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001.Proceedings (Lecture Notes in Computer Science / Lect)
By
Vijay Varadharajan
,
Yi Mu
Information Security and Privacy (6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001. Proceedings: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001.Proceedings (Lecture Notes in Computer Science / Lect)
By
Vijay Varadharajan
,
Yi Mu
HK$540
Information and Communications Security (Third International Conference, ICICS 2001, Xian China, November 13-16, 2001 Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Tatsuaki Okamoto
,
Jianying Zhou
,
Jianying Zhou
Information and Communications Security (Third International Conference, ICICS 2001, Xian China, November 13-16, 2001 Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Tatsuaki Okamoto
,
Jianying Zhou
,
Jianying Zhou
HK$693
Information Security and Cryptology - Icisc 2001 (4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings (Lecture Notes in Computer Science))
By
Kwangjo Kim
Information Security and Cryptology - Icisc 2001 (4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings (Lecture Notes in Computer Science))
By
Kwangjo Kim
HK$532
Information Security and Privacy (7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 - Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Lynn Batten
,
Jennifer Seberry
Information Security and Privacy (7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 - Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Lynn Batten
,
Jennifer Seberry
HK$951
Intelligent Data Engineering and Automated Learning - Ideal 2002 (Third International Conference, Manchester, UK, August 12-14 Proceedings: v. 2412 (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Hujun Yin
,
Nigel Allinson
,
Richard Freeman
,
John Keane
Intelligent Data Engineering and Automated Learning - Ideal 2002 (Third International Conference, Manchester, UK, August 12-14 Proceedings: v. 2412 (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Hujun Yin
,
Nigel Allinson
,
Richard Freeman
,
John Keane
HK$960
Image Analysis and Recognition (Third International Conference, ICIAR 2006, Póvoa de Varzim, Portugal, September 18-20, 2006, Proceedings, Part I (Lecture Notes in Computer Science) (Image Processing, Computer Vision, Pattern Recognition, and Graphics))
By
Aurelio Campilho
,
Mohamed Kamel
Image Analysis and Recognition (Third International Conference, ICIAR 2006, Póvoa de Varzim, Portugal, September 18-20, 2006, Proceedings, Part I (Lecture Notes in Computer Science) (Image Processing, Computer Vision, Pattern Recognition, and Graphics))
By
Aurelio Campilho
,
Mohamed Kamel
HK$1,091
Cryptographic Hardware and Embedded Systems - CHES 2006 (8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Louis Goubin
,
Mitsuru Matsui
Cryptographic Hardware and Embedded Systems - CHES 2006 (8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Louis Goubin
,
Mitsuru Matsui
HK$573
On the Move to Meaningful Internet Systems 2006 (CoopIS, DOA, GADA, and ODBASE: OTM Confederated International Conferences, CoopIS, DOA, GADA, and ODBASE 2006, Montpellier, France, October 29 - November 3, 2006, Proceedings, Part II (Information System ..)
By
Robert Meersman
,
Zahir Tari
On the Move to Meaningful Internet Systems 2006 (CoopIS, DOA, GADA, and ODBASE: OTM Confederated International Conferences, CoopIS, DOA, GADA, and ODBASE 2006, Montpellier, France, October 29 - November 3, 2006, Proceedings, Part II (Information System ..)
By
Robert Meersman
,
Zahir Tari
HK$1,039
Information Security and Cryptology -ICISC 2006 (9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Min Surp Rhee
,
Byoungcheon Lee
Information Security and Cryptology -ICISC 2006 (9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Min Surp Rhee
,
Byoungcheon Lee
HK$500
Previous Page
1
...
6
7
8
9
10
11
12
13
14
Next Page
Previous Page
1
...
6
7
8
9
10
11
12
13
14
Next Page