0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(904)
Information Theory
(240)
Data Processing
(141)
Logic Design
(126)
Data Modeling
(94)
Cybernetics
(90)
Neural Networks
(28)
Natural Language Processing
(26)
Parallel
(8)
Sold By
Sold By
All Sellers
Fishpond
(1,537)
Age Range
Age Range
All Ranges
15+
(189)
All Ages
(46)
Country
Country
All Countries
Germany
(427)
United States
(360)
Switzerland
(260)
United Kingdom
(183)
Singapore
(45)
More...
Results for "Web Application Security"
Web Application Security
2,092 results
Filters
Refine By
Category
Category
General
(904)
Information Theory
(240)
Data Processing
(141)
Logic Design
(126)
Data Modeling
(94)
Cybernetics
(90)
Neural Networks
(28)
Natural Language Processing
(26)
Parallel
(8)
Sold By
Sold By
All Sellers
Fishpond
(1,537)
Age Range
Age Range
All Ranges
15+
(189)
All Ages
(46)
Country
Country
All Countries
Germany
(427)
United States
(360)
Switzerland
(260)
United Kingdom
(183)
Singapore
(45)
More...
2,092 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Smart Sensor Networks Using AI for Industry 4.0 (Applications and New Opportunities (Advances in Intelligent Decision-Making, Systems Engineering, and Project Management))
By
Soumya Ranjan Nayak
,
Biswa Mohan Sahoo
,
Muthukumaran Malarvel
,
Jibitesh Mishra
Smart Sensor Networks Using AI for Industry 4.0 (Applications and New Opportunities (Advances in Intelligent Decision-Making, Systems Engineering, and Project Management))
By
Soumya Ranjan Nayak
,
Biswa Mohan Sahoo
,
Muthukumaran Malarvel
,
Jibitesh Mishra
HK$800
Elsewhere
HK$1,184.20
Save HK$384.20 (32%)
Artificial Intelligence (AI) (Recent Trends and Applications (Artificial Intelligence AI: Elementary to Advanced Practices))
By
S. Kanimozhi Suguna
,
M. Dhivya
,
Sara Paiva
Artificial Intelligence (AI) (Recent Trends and Applications (Artificial Intelligence AI: Elementary to Advanced Practices))
By
S. Kanimozhi Suguna
,
M. Dhivya
,
Sara Paiva
HK$419
Elsewhere
HK$504.47
Save HK$85.47 (17%)
Trust Management (Proceedings of IFIPTM 2008 - Joint ITrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway: No. 2 (IFIP Advances in Information and Communication Technology))
By
Yucel Karabulut
,
John C. Mitchell
,
Peter Herrmann
,
C. Damsgaard Jensen
Trust Management (Proceedings of IFIPTM 2008 - Joint ITrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway: No. 2 (IFIP Advances in Information and Communication Technology))
By
Yucel Karabulut
,
John C. Mitchell
,
Peter Herrmann
,
C. Damsgaard Jensen
HK$1,100
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
HK$1,534
Distributed Network Systems (From Concepts to Implementations (Network Theory and Applications))
By
Jia, Weijia
,
Zhou, Wanlei
Distributed Network Systems (From Concepts to Implementations (Network Theory and Applications))
By
Jia, Weijia
,
Zhou, Wanlei
HK$1,100
Communications and Multimedia Security (8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom (IFIP Advances in Information and Communication Technology))
By
David Chadwick
,
Bart Preneel
Communications and Multimedia Security (8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom (IFIP Advances in Information and Communication Technology))
By
David Chadwick
,
Bart Preneel
HK$1,060
Security and Privacy in the Age of Ubiquitous Computing (IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (IFIP Advances in Information and Communication Technology))
By
Ryoichi Sasaki
,
Eiji Okamoto
,
Hiroshi Yoshiura
,
Hiroshi Yoshiura
Security and Privacy in the Age of Ubiquitous Computing (IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (IFIP Advances in Information and Communication Technology))
By
Ryoichi Sasaki
,
Eiji Okamoto
,
Hiroshi Yoshiura
,
Hiroshi Yoshiura
HK$1,400
Security and Privacy in Dynamic Environments (Proceedings of the IFIP Tc-11 21st International Information Security Conference (Sec 2006), 22-24 May 2006, Karlstad, Sweden (IFIP Advances in Information and Communication Technology))
By
Simone Fischer-Hubner
,
Kai Rannenberg
,
Louise Yngstrom
,
Stefan Lindskog
Security and Privacy in Dynamic Environments (Proceedings of the IFIP Tc-11 21st International Information Security Conference (Sec 2006), 22-24 May 2006, Karlstad, Sweden (IFIP Advances in Information and Communication Technology))
By
Simone Fischer-Hubner
,
Kai Rannenberg
,
Louise Yngstrom
,
Stefan Lindskog
HK$1,360
Intelligent Fractal-Based Image Analysis (Applications in Pattern Recognition and Machine Vision (Cognitive Data Science in Sustainable Computing))
By
Soumya Ranjan Nayak
,
Janmenjoy Nayak
,
Khan Muhammad
,
Yeliz Karaca
Intelligent Fractal-Based Image Analysis (Applications in Pattern Recognition and Machine Vision (Cognitive Data Science in Sustainable Computing))
By
Soumya Ranjan Nayak
,
Janmenjoy Nayak
,
Khan Muhammad
,
Yeliz Karaca
HK$1,075
Elsewhere
HK$1,266.58
Save HK$191.58 (15%)
Access Database Design & Programming (Creating Programmable Database Applications with Access 97, 2000, 2002 & 2003)
By
Roman, Steven
Access Database Design & Programming (Creating Programmable Database Applications with Access 97, 2000, 2002 & 2003)
By
Roman, Steven
HK$265
Elsewhere
HK$329.41
Save HK$64.41 (20%)
1
Communications and Multimedia Security Issues of the New Century (IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) May 21-22, 2001, Darmstadt, Germany (IFIP Advances in Information and Communication Technol)
By
Ralf Steinmetz
,
Jana Dittmann
,
Martin Steinebach
Communications and Multimedia Security Issues of the New Century (IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) May 21-22, 2001, Darmstadt, Germany (IFIP Advances in Information and Communication Technol)
By
Ralf Steinmetz
,
Jana Dittmann
,
Martin Steinebach
HK$1,933
High Performance Computing Systems and Applications (Springer International Series in Engineering and Computer Science The)
By
Andrew Pollard
,
Douglas J. K. Mewhort
,
Donald F. Weaver
High Performance Computing Systems and Applications (Springer International Series in Engineering and Computer Science The)
By
Andrew Pollard
,
Douglas J. K. Mewhort
,
Donald F. Weaver
HK$1,500
Research Advances in Database and Information Systems Security (IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA (IFIP Advances in Information and Communication Technology))
By
Vijay Atluri
,
John Hale
,
Vijay Atluri
Research Advances in Database and Information Systems Security (IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA (IFIP Advances in Information and Communication Technology))
By
Vijay Atluri
,
John Hale
,
Vijay Atluri
HK$1,094
Information Security for Global Information Infrastructures (IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China (IFIP Advances in Information and Communication Technology))
By
Eloff, Jan H. P.
,
Sihan Qing
Information Security for Global Information Infrastructures (IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China (IFIP Advances in Information and Communication Technology))
By
Eloff, Jan H. P.
,
Sihan Qing
HK$1,940
Smart Card Research and Advanced Applications (IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20–22, 2000, Bristol, United Kingdom (IFIP Advances in Information and Communication Technology))
By
Josep Domingo-Ferrer
,
David Chan
,
Anthony Watson
Smart Card Research and Advanced Applications (IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20–22, 2000, Bristol, United Kingdom (IFIP Advances in Information and Communication Technology))
By
Josep Domingo-Ferrer
,
David Chan
,
Anthony Watson
HK$1,781
Elsewhere
HK$1,853.42
Save HK$72.42 (4%)
Secure Information Networks (Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium (IFIP Advances in Information and Communication Technol ..)
By
Bart Preneel
Secure Information Networks (Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium (IFIP Advances in Information and Communication Technol ..)
By
Bart Preneel
HK$1,860
Trust Management II (Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway (IFIP Advances in Information and Communication Technology))
By
Yucel Karabulut
,
John C. Mitchell
,
Peter Herrmann
,
Christian Jensen
Trust Management II (Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway (IFIP Advances in Information and Communication Technology))
By
Yucel Karabulut
,
John C. Mitchell
,
Peter Herrmann
,
Christian Jensen
HK$960
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
HK$1,437
Security and Privacy in the Age of Ubiquitous Computing (IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (IFIP Advances in Information and Communication Technology))
By
Ryoichi Sasaki
,
Eiji Okamoto
,
Hiroshi Yoshiura
,
Hiroshi Yoshiura
Security and Privacy in the Age of Ubiquitous Computing (IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (IFIP Advances in Information and Communication Technology))
By
Ryoichi Sasaki
,
Eiji Okamoto
,
Hiroshi Yoshiura
,
Hiroshi Yoshiura
HK$1,400
Security and Privacy in Dynamic Environments (Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden (IFIP Advances in Information and Communication Technology))
By
Simone Fischer-Hubner
,
Kai Rannenberg
,
Louise Yngstrom
,
Stefan Lindskog
Security and Privacy in Dynamic Environments (Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden (IFIP Advances in Information and Communication Technology))
By
Simone Fischer-Hubner
,
Kai Rannenberg
,
Louise Yngstrom
,
Stefan Lindskog
HK$1,284
Elsewhere
HK$1,338.56
Save HK$54.56 (4%)
Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012 (Volume 3 (Lecture Notes in Electrical Engineering))
By
Zhicai Zhong
Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012 (Volume 3 (Lecture Notes in Electrical Engineering))
By
Zhicai Zhong
HK$1,900
Programming Elastic Mapreduce (Using Aws Services to Build an End-To-End Application)
By
Kevin Schmidt
,
Christopher Phillips
Programming Elastic Mapreduce (Using Aws Services to Build an End-To-End Application)
By
Kevin Schmidt
,
Christopher Phillips
HK$214
Elsewhere
HK$288.22
Save HK$74.22 (26%)
High Performance Computing Systems and Applications (The Springer International Series in Engineering and Computer Science)
By
Robert D. Kent
,
Todd W. Sands
High Performance Computing Systems and Applications (The Springer International Series in Engineering and Computer Science)
By
Robert D. Kent
,
Todd W. Sands
HK$1,300
Multi-Modal User Interactions in Controlled Environments (Multimedia Systems and Applications)
By
Benabbas, Yassine
,
Djeraba, Chaabane
,
Yassine Benabbas
Multi-Modal User Interactions in Controlled Environments (Multimedia Systems and Applications)
By
Benabbas, Yassine
,
Djeraba, Chaabane
,
Yassine Benabbas
HK$1,133
Previous Page
1
...
13
14
15
16
17
18
19
20
21
Next Page
Previous Page
1
...
13
14
15
16
17
18
19
20
21
Next Page