0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(204)
Information Theory
(61)
Data Modeling
(24)
Data Processing
(21)
Logic Design
(20)
Cybernetics
(18)
Neural Networks
(10)
Natural Language Processing
(7)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(340)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(108)
United States
(76)
Switzerland
(56)
United Kingdom
(38)
Singapore
(10)
More...
Results for "The Code Of Trust"
The Code Of Trust
408 results
Filters
Refine By
Category
Category
General
(204)
Information Theory
(61)
Data Modeling
(24)
Data Processing
(21)
Logic Design
(20)
Cybernetics
(18)
Neural Networks
(10)
Natural Language Processing
(7)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(340)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(108)
United States
(76)
Switzerland
(56)
United Kingdom
(38)
Singapore
(10)
More...
408 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Ad-hoc, Mobile, and Wireless Networks (16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings (Computer Communication Networks and Telecommunications))
By
Antonio Puliafito
,
Dario Bruneo
,
Salvatore DiStefano
,
Francesco Longo
Ad-hoc, Mobile, and Wireless Networks (16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings (Computer Communication Networks and Telecommunications))
By
Antonio Puliafito
,
Dario Bruneo
,
Salvatore DiStefano
,
Francesco Longo
HK$887
Electronic Voting (Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings (Lecture Notes in Computer Science))
By
Robert Krimmer
,
Melanie Volkamer
,
Nadja Braun Binder
,
Norbert Kersting
Electronic Voting (Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings (Lecture Notes in Computer Science))
By
Robert Krimmer
,
Melanie Volkamer
,
Nadja Braun Binder
,
Norbert Kersting
HK$860
Security, Privacy, and Applied Cryptography Engineering (7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (Lecture Notes in Computer Science))
By
Sk Subidh Ali
,
Jean-Luc Danger
,
Thomas Eisenbarth
Security, Privacy, and Applied Cryptography Engineering (7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (Lecture Notes in Computer Science))
By
Sk Subidh Ali
,
Jean-Luc Danger
,
Thomas Eisenbarth
HK$700
Handbook of Biometric Anti-Spoofing (Presentation Attack Detection (Advances in Computer Vision and Pattern Recognition))
By
Sebastien Marcel
,
Mark S. Nixon
,
Julian Fierrez
,
Nicholas Evans
Handbook of Biometric Anti-Spoofing (Presentation Attack Detection (Advances in Computer Vision and Pattern Recognition))
By
Sebastien Marcel
,
Mark S. Nixon
,
Julian Fierrez
,
Nicholas Evans
HK$1,300
e-Infrastructure and e-Services for Developing Countries (9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engin)
By
Victor Odumuyiwa
,
Ojo Adegboyega
,
Charles Uwadia
e-Infrastructure and e-Services for Developing Countries (9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engin)
By
Victor Odumuyiwa
,
Ojo Adegboyega
,
Charles Uwadia
HK$579
Trustworthy Global Computing (4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
Christos Kaklamanis
,
Flemming Nielson
Trustworthy Global Computing (4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
Christos Kaklamanis
,
Flemming Nielson
HK$540
Information Security and Cryptology (4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (Lecture Notes in Computer Science))
By
Moti Yung
,
Peng Liu
,
Dongdai Lin
Information Security and Cryptology (4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (Lecture Notes in Computer Science))
By
Moti Yung
,
Peng Liu
,
Dongdai Lin
HK$593
Experimental Algorithms (8th International Symposium SEA 2009, Dortmund, Germany, June 4-6, 2009, Proceedings (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
Jan Vahrenhold
Experimental Algorithms (8th International Symposium SEA 2009, Dortmund, Germany, June 4-6, 2009, Proceedings (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
Jan Vahrenhold
HK$581
Advances in Information Security and Assurance (Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Lecture Notes in Computer Science))
By
James
,
Hsiao-Hwa Chen
,
Mohammed Atiquzzaman
,
Mohammed Atiquzzaman
Advances in Information Security and Assurance (Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Lecture Notes in Computer Science))
By
James
,
Hsiao-Hwa Chen
,
Mohammed Atiquzzaman
,
Mohammed Atiquzzaman
HK$1,140
Wireless Algorithms, Systems, and Applications (4th International Conference, WASA 2009, Boston, MA, USA, August 16-18, 2009, Proceedings (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues))
By
Benyuan Liu
,
Azer Bestavros
,
Ding-Zhu Du
,
Jie Wang
Wireless Algorithms, Systems, and Applications (4th International Conference, WASA 2009, Boston, MA, USA, August 16-18, 2009, Proceedings (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues))
By
Benyuan Liu
,
Azer Bestavros
,
Ding-Zhu Du
,
Jie Wang
HK$1,085
Mobile Lightweight Wireless Systems (First International ICST Conference, MOBILIGHT 2009, Athens, Greece, May 18-20, 2009, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)
By
Fabrizio Granelli
,
Charalabos Skianis
,
Periklis Chatzimisios
,
Yang Xiao
Mobile Lightweight Wireless Systems (First International ICST Conference, MOBILIGHT 2009, Athens, Greece, May 18-20, 2009, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)
By
Fabrizio Granelli
,
Charalabos Skianis
,
Periklis Chatzimisios
,
Yang Xiao
HK$590
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks (Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings (Lecture Notes in Computer Science))
By
Olivier Markowitch
,
Angelos Bilas
,
Jaap-Henk Hoepman
,
Chris J. Mitchell
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks (Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings (Lecture Notes in Computer Science))
By
Olivier Markowitch
,
Angelos Bilas
,
Jaap-Henk Hoepman
,
Chris J. Mitchell
HK$500
Formal Methods for Components and Objects (7th International Symposium, FMCO 2008, Sophia Antipolis, France, October 21-23, 2008, State of the Art Survey (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Frank S. de Boer
,
Marcello M. Bonsangue
,
Eric Madelaine
Formal Methods for Components and Objects (7th International Symposium, FMCO 2008, Sophia Antipolis, France, October 21-23, 2008, State of the Art Survey (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Frank S. de Boer
,
Marcello M. Bonsangue
,
Eric Madelaine
HK$560
Ad-Hoc, Mobile and Wireless Networks (8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings (Computer Communication Networks and Telecommunications) (Lecture Notes in Computer Science))
By
Pedro Ruiz
,
J. J. Garcia-Luna-Aceves
Ad-Hoc, Mobile and Wireless Networks (8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings (Computer Communication Networks and Telecommunications) (Lecture Notes in Computer Science))
By
Pedro Ruiz
,
J. J. Garcia-Luna-Aceves
HK$584
Stabilization, Safety, and Security of Distributed Systems (11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
Rachid Guerraoui
,
Franck Petit
Stabilization, Safety, and Security of Distributed Systems (11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
Rachid Guerraoui
,
Franck Petit
HK$1,132
Artificial Intelligence and Computational Intelligence (International Conference, AICI 2009, Shanghai, China, November 7-8, 2009, Proceedings (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
Hepu Deng
,
Lanzhou Wang
,
Fu Lee Wang
,
Jingsheng Lei
Artificial Intelligence and Computational Intelligence (International Conference, AICI 2009, Shanghai, China, November 7-8, 2009, Proceedings (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
Hepu Deng
,
Lanzhou Wang
,
Fu Lee Wang
,
Jingsheng Lei
HK$1,100
Post-Quantum Cryptography
By
Daniel J. Bernstein
,
Johannes Buchmann
,
Erik Dahmen
Post-Quantum Cryptography
By
Daniel J. Bernstein
,
Johannes Buchmann
,
Erik Dahmen
HK$1,273
Elsewhere
HK$1,450.77
Save HK$177.77 (12%)
Information and Communications Security (11th International Conference, ICICS 2009 (Lecture Notes in Computer Science / Security and Cryptology))
By
Sihan Qing
,
Chris J. Mitchell
,
Guilin Wang
Information and Communications Security (11th International Conference, ICICS 2009 (Lecture Notes in Computer Science / Security and Cryptology))
By
Sihan Qing
,
Chris J. Mitchell
,
Guilin Wang
HK$1,060
Information Security Theory and Practices (Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings (Security and Cryptology) (Lecture Notes in Com ..)
By
Pierangela Samarati
,
Michael Tunstall
,
Joachim Posegga
,
Konstantinos Markantonakis
Information Security Theory and Practices (Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings (Security and Cryptology) (Lecture Notes in Com ..)
By
Pierangela Samarati
,
Michael Tunstall
,
Joachim Posegga
,
Konstantinos Markantonakis
HK$599
Advances in Artificial Intelligence (23rd Canadian Conference on Artificial Intelligence, Canadian AI 2010, Ottawa, Canada, May 31 - June 2, 2010, Proceedings (Lecture Notes in Computer Science) (Lecture Notes in Artificial Intelligence))
By
Atefeh Farzindar
,
Vlado Keselj
Advances in Artificial Intelligence (23rd Canadian Conference on Artificial Intelligence, Canadian AI 2010, Ottawa, Canada, May 31 - June 2, 2010, Proceedings (Lecture Notes in Computer Science) (Lecture Notes in Artificial Intelligence))
By
Atefeh Farzindar
,
Vlado Keselj
HK$600
Advances in Grid and Pervasive Computing (5th International Conference, CPC 2010, Hualien, Taiwan, May 10-13, 2010, Proceedings (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
Paolo Bellavista
,
Ruay-Shiung Chang
,
Han-Chieh Chao
,
Shin-Feng Lin
Advances in Grid and Pervasive Computing (5th International Conference, CPC 2010, Hualien, Taiwan, May 10-13, 2010, Proceedings (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
Paolo Bellavista
,
Ruay-Shiung Chang
,
Han-Chieh Chao
,
Shin-Feng Lin
HK$1,100
Towards Hardware-Intrinsic Security (Foundations and Practice (Information Security and Cryptography))
By
Ahmad-Reza Sadeghi
,
David Naccache
,
Pim Tuyls
Towards Hardware-Intrinsic Security (Foundations and Practice (Information Security and Cryptography))
By
Ahmad-Reza Sadeghi
,
David Naccache
,
Pim Tuyls
HK$1,485
Recent Trends in Network Security and Applications (Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings (Communications in Computer and Information Science))
By
Natarajan Meghanathan
,
Selma Boumerdassi
,
Nabendu Chaki
Recent Trends in Network Security and Applications (Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings (Communications in Computer and Information Science))
By
Natarajan Meghanathan
,
Selma Boumerdassi
,
Nabendu Chaki
HK$1,200
Contemporary Computing (Third International Conference, IC3 2010, Noida, India, August 9-11, 2010. Proceedings, Part I (Communications in Computer and Information Science))
By
Sanjay Ranka
,
Arunava Banerjee
,
Kanad Kishore Biswas
,
Sumeet Dua
Contemporary Computing (Third International Conference, IC3 2010, Noida, India, August 9-11, 2010. Proceedings, Part I (Communications in Computer and Information Science))
By
Sanjay Ranka
,
Arunava Banerjee
,
Kanad Kishore Biswas
,
Sumeet Dua
HK$1,090
Previous Page
1
...
9
10
11
12
13
14
15
16
Next Page
Previous Page
1
...
9
10
11
12
13
14
15
16
Next Page