0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(904)
Information Theory
(240)
Data Processing
(141)
Logic Design
(126)
Data Modeling
(94)
Cybernetics
(90)
Neural Networks
(28)
Natural Language Processing
(26)
Parallel
(8)
Sold By
Sold By
All Sellers
Fishpond
(1,537)
Age Range
Age Range
All Ranges
15+
(189)
All Ages
(46)
Country
Country
All Countries
Germany
(427)
United States
(360)
Switzerland
(260)
United Kingdom
(183)
Singapore
(45)
More...
Results for "Web Application Security"
Web Application Security
2,092 results
Filters
Refine By
Category
Category
General
(904)
Information Theory
(240)
Data Processing
(141)
Logic Design
(126)
Data Modeling
(94)
Cybernetics
(90)
Neural Networks
(28)
Natural Language Processing
(26)
Parallel
(8)
Sold By
Sold By
All Sellers
Fishpond
(1,537)
Age Range
Age Range
All Ranges
15+
(189)
All Ages
(46)
Country
Country
All Countries
Germany
(427)
United States
(360)
Switzerland
(260)
United Kingdom
(183)
Singapore
(45)
More...
2,092 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Computer Security - ESORICS 2008 (13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Jajodia, Sushil
,
Lopez, Javier
Computer Security - ESORICS 2008 (13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Jajodia, Sushil
,
Lopez, Javier
HK$582
Information and Communications Security (10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Liqun Chen
,
Mark D. Ryan
,
Guilin Wang
Information and Communications Security (10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Liqun Chen
,
Mark D. Ryan
,
Guilin Wang
HK$540
On the Move to Meaningful Internet Systems (OTM 2008: OTM Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008 Proceedings, Part II (Information Systems and Applications, incl. Internet/Web)
By
Robert Meersman
,
Zahir Tari
On the Move to Meaningful Internet Systems (OTM 2008: OTM Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008 Proceedings, Part II (Information Systems and Applications, incl. Internet/Web)
By
Robert Meersman
,
Zahir Tari
HK$600
Critical Information Infrastructures Security (Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007 (Lecture Notes in Computer Science) (Security and Cryptology))
By
Javier Lopez
,
Bernhard Hammerli
Critical Information Infrastructures Security (Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007 (Lecture Notes in Computer Science) (Security and Cryptology))
By
Javier Lopez
,
Bernhard Hammerli
HK$559
Distributed Computing and Internet Technology (5th International Conference, ICDCIT 2008, New Delhi, India, December 10-12, 2008 ; Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Manish Parashar
,
Sanjeev K. Aggarwal
Distributed Computing and Internet Technology (5th International Conference, ICDCIT 2008, New Delhi, India, December 10-12, 2008 ; Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Manish Parashar
,
Sanjeev K. Aggarwal
HK$497
Information Systems Security (4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
R. Sekar
,
A. K. Pujari
Information Systems Security (4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
R. Sekar
,
A. K. Pujari
HK$500
Computer Supported Cooperative Work in Design IV (11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer ..)
By
Jean-Paul A. Barthes
,
Weiming Shen
,
Yun Yang
,
Yun Yang
Computer Supported Cooperative Work in Design IV (11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer ..)
By
Jean-Paul A. Barthes
,
Weiming Shen
,
Yun Yang
,
Yun Yang
HK$1,036
Advances in Multimedia Modeling (15th International Multimedia Modeling Conference, MMM 2009, Sophia-Antipolis, France, January 7-9, 2009. Proceedings. (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Benoit Huet
,
Alan F. Smeaton
,
Ketan Mayer-Patel
,
Yannis Avrithis
Advances in Multimedia Modeling (15th International Multimedia Modeling Conference, MMM 2009, Sophia-Antipolis, France, January 7-9, 2009. Proceedings. (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Benoit Huet
,
Alan F. Smeaton
,
Ketan Mayer-Patel
,
Yannis Avrithis
HK$560
Human Aspects of Information Security, Privacy, and Trust (Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Information Systems and Applications, incl. Internet/ ..)
By
Theodore Tryfonas
,
Ioannis Askoxylakis
Human Aspects of Information Security, Privacy, and Trust (Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Information Systems and Applications, incl. Internet/ ..)
By
Theodore Tryfonas
,
Ioannis Askoxylakis
HK$553
Intelligent Computing Theory (10th International Conference, ICIC 2014, Taiyuan, China, August 3-6, 2014, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
De-Shuang Huang
,
Vitoantonio Bevilacqua
,
Prashan Premaratne
Intelligent Computing Theory (10th International Conference, ICIC 2014, Taiyuan, China, August 3-6, 2014, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
De-Shuang Huang
,
Vitoantonio Bevilacqua
,
Prashan Premaratne
HK$630
Foundations of Security Analysis and Design VII (Fosad 2012 / 2013 Tutorial Lectures (Lecture Notes in Computer Science / Security and Cryptology))
By
Alessandro Aldini
,
Javier Lopez
,
Fabio Martinelli
Foundations of Security Analysis and Design VII (Fosad 2012 / 2013 Tutorial Lectures (Lecture Notes in Computer Science / Security and Cryptology))
By
Alessandro Aldini
,
Javier Lopez
,
Fabio Martinelli
HK$459
Electronic Government and the Information Systems Perspective (Third International Conference, EGOVIS 2014, Munich, Germany, September 1-3, 2014. Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, ..)
By
Andrea Kő
,
Enrico Francesconi
Electronic Government and the Information Systems Perspective (Third International Conference, EGOVIS 2014, Munich, Germany, September 1-3, 2014. Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, ..)
By
Andrea Kő
,
Enrico Francesconi
HK$500
Pattern Analysis, Intelligent Security and the Internet of Things (Advances in Intelligent Systems and Computing)
By
Ajith Abraham
,
Azah Kamilah Muda
,
Yun-Huoy Choo
Pattern Analysis, Intelligent Security and the Internet of Things (Advances in Intelligent Systems and Computing)
By
Ajith Abraham
,
Azah Kamilah Muda
,
Yun-Huoy Choo
HK$1,240
Intelligent Computing Theories and Methodologies (11th International Conference, ICIC 2015, Fuzhou, China, August 20-23, 2015, Proceedings, Part I (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
De-Shuang Huang
,
Vitoantonio Bevilacqua
,
Prashan Premaratne
Intelligent Computing Theories and Methodologies (11th International Conference, ICIC 2015, Fuzhou, China, August 20-23, 2015, Proceedings, Part I (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
De-Shuang Huang
,
Vitoantonio Bevilacqua
,
Prashan Premaratne
HK$600
Intelligent Computing Theories and Methodologies (11th International Conference, ICIC 2015, Fuzhou, China, August 20-23, 2015, Proceedings, Part II (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, and HCI))
By
De-Shuang Huang
,
Kang-Hyun Jo
,
Abir Hussain
Intelligent Computing Theories and Methodologies (11th International Conference, ICIC 2015, Fuzhou, China, August 20-23, 2015, Proceedings, Part II (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, and HCI))
By
De-Shuang Huang
,
Kang-Hyun Jo
,
Abir Hussain
HK$600
Evolution of Cyber Technologies and Operations to 2035 (Advances in Information Security)
By
Misty Blowers
Evolution of Cyber Technologies and Operations to 2035 (Advances in Information Security)
By
Misty Blowers
HK$700
Elsewhere
HK$1,544.50
Save HK$844.50 (55%)
Computer Security -- ESORICS 2015 (20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I (Lecture Notes in Computer Science) (Security and Cryptology))
By
Gunther Pernul
,
Peter Y. A. Ryan
,
Edgar R. Weippl
Computer Security -- ESORICS 2015 (20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I (Lecture Notes in Computer Science) (Security and Cryptology))
By
Gunther Pernul
,
Peter Y. A. Ryan
,
Edgar R. Weippl
HK$900
Computer Information Systems and Industrial Management (16th IFIP TC8 International Conference, CISIM 2017, Bialystok, Poland, June 16-18, 2017, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer ..)
By
Khalid Saeed
,
Władysław Homenda
,
Rituparna Chaki
Computer Information Systems and Industrial Management (16th IFIP TC8 International Conference, CISIM 2017, Bialystok, Poland, June 16-18, 2017, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer ..)
By
Khalid Saeed
,
Władysław Homenda
,
Rituparna Chaki
HK$600
Modelling and Simulation for Autonomous Systems (4th International Conference, MESAS 2017, Rome, Italy, October 24-26, 2017, Revised Selected Papers (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Jan Mazal
Modelling and Simulation for Autonomous Systems (4th International Conference, MESAS 2017, Rome, Italy, October 24-26, 2017, Revised Selected Papers (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Jan Mazal
HK$553
Evolution of Cyber Technologies and Operations to 2035 (Advances in Information Security)
By
Misty Blowers
Evolution of Cyber Technologies and Operations to 2035 (Advances in Information Security)
By
Misty Blowers
HK$685
Elsewhere
HK$1,544.50
Save HK$859.50 (56%)
Human-Computer Interaction. Interaction in Context (20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Masaaki Kurosu
Human-Computer Interaction. Interaction in Context (20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Masaaki Kurosu
HK$936
Human-Computer Interaction. Interaction Technologies (20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part III (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Masaaki Kurosu
Human-Computer Interaction. Interaction Technologies (20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part III (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Masaaki Kurosu
HK$890
Social, Cultural, and Behavioral Modeling (11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Robert Thomson
,
Christopher Dancy
,
Ayaz Hyder
,
Halil Bisgin
Social, Cultural, and Behavioral Modeling (11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Robert Thomson
,
Christopher Dancy
,
Ayaz Hyder
,
Halil Bisgin
HK$540
Internet of Things - ICIOT 2018 (Third International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Dimitrios Georgakopoulos
,
Liang-Jie Zhang
Internet of Things - ICIOT 2018 (Third International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Dimitrios Georgakopoulos
,
Liang-Jie Zhang
HK$492
Previous Page
1
...
11
12
13
14
15
16
17
18
19
Next Page
Previous Page
1
...
11
12
13
14
15
16
17
18
19
Next Page