0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Networking
Filters
Refine By
Category
Category
General
(334)
Networking Protocols
(5)
Intranets & Extranets
(4)
Local Area Networks
(4)
Bulletin Boards
(1)
Wide Area Networks
(1)
Sold By
Sold By
All Sellers
Fishpond
(341)
Age Range
Age Range
All Ranges
15+
(48)
All Ages
(14)
Country
Country
All Countries
Germany
(114)
United States
(99)
Switzerland
(49)
United Kingdom
(23)
Singapore
(13)
More...
Results for "The Code Of Trust"
The Code Of Trust
464 results
Filters
Refine By
Category
Category
General
(334)
Networking Protocols
(5)
Intranets & Extranets
(4)
Local Area Networks
(4)
Bulletin Boards
(1)
Wide Area Networks
(1)
Sold By
Sold By
All Sellers
Fishpond
(341)
Age Range
Age Range
All Ranges
15+
(48)
All Ages
(14)
Country
Country
All Countries
Germany
(114)
United States
(99)
Switzerland
(49)
United Kingdom
(23)
Singapore
(13)
More...
464 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Trusted Computing Platforms (Design and Applications)
By
Smith, Sean W.
Trusted Computing Platforms (Design and Applications)
By
Smith, Sean W.
HK$900
Big Data Recommender Systems (Algorithms, Architectures, Big Data, Security and Trust, Volume 1 (Computing and Networks))
By
Osman Khalid
,
Samee U. Khan
,
Albert Y. Zomaya
Big Data Recommender Systems (Algorithms, Architectures, Big Data, Security and Trust, Volume 1 (Computing and Networks))
By
Osman Khalid
,
Samee U. Khan
,
Albert Y. Zomaya
HK$1,100
Elsewhere
HK$1,259.59
Save HK$159.59 (13%)
Exploiting Software (How to Break Code)
By
Greg Hoglund
,
Gary R. McGraw
,
Aviel D. Rubin
Exploiting Software (How to Break Code)
By
Greg Hoglund
,
Gary R. McGraw
,
Aviel D. Rubin
HK$852
1
Scalable Computing and Communications (Theory and Practice (Wiley Series on Parallel and Distributed Computing))
By
Samee U. Khan
,
Albert Y.
,
Lizhe Wang
Scalable Computing and Communications (Theory and Practice (Wiley Series on Parallel and Distributed Computing))
By
Samee U. Khan
,
Albert Y.
,
Lizhe Wang
HK$1,660
1
AI Applications to Communications and Information Technologies (The Role of Ultra Deep Neural Networks)
By
Minoli, Daniel (Stevens Institute of Technology, AT&T, Red Bank,
,
Benedict Occhiogrosso
AI Applications to Communications and Information Technologies (The Role of Ultra Deep Neural Networks)
By
Minoli, Daniel (Stevens Institute of Technology, AT&T, Red Bank,
,
Benedict Occhiogrosso
HK$900
Elsewhere
HK$992.56
Save HK$92.56 (9%)
Cyber-Vigilance and Digital Trust (Cyber Security in the Era of Cloud Computing and IoT)
By
Wiem Tounsi
Cyber-Vigilance and Digital Trust (Cyber Security in the Era of Cloud Computing and IoT)
By
Wiem Tounsi
HK$1,391
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
By
Thomas, Tony
,
Surendran, Roopak
,
Teenu John
,
Mamoun Alazab
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
By
Thomas, Tony
,
Surendran, Roopak
,
Teenu John
,
Mamoun Alazab
HK$678
Elsewhere
HK$745.58
Save HK$67.58 (9%)
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
By
Richard Brooks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
By
Richard Brooks
HK$1,000
Elsewhere
HK$1,511.51
Save HK$511.51 (34%)
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
By
Tony Thomas
,
Roopak Surendran
,
Teenu John
,
Mamoun Alazab
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
By
Tony Thomas
,
Roopak Surendran
,
Teenu John
,
Mamoun Alazab
HK$360
Elsewhere
HK$443.27
Save HK$83.27 (19%)
The Privacy Engineer's Manifesto (Getting from Policy to Code to Qa to Value)
By
Dennedy, Michelle
,
Finneran, Tom
,
Tom Finneran
The Privacy Engineer's Manifesto (Getting from Policy to Code to Qa to Value)
By
Dennedy, Michelle
,
Finneran, Tom
,
Tom Finneran
HK$467
Trust, Privacy and Security in Digital Business (4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Costas Lambrinoudakis
,
Gunther Pernul
,
Min A. Tjoa
Trust, Privacy and Security in Digital Business (4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Costas Lambrinoudakis
,
Gunther Pernul
,
Min A. Tjoa
HK$500
Trust, Privacy and Security in Digital Business (12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Simone Fischer-Hübner
,
Costas Lambrinoudakis
,
Javier López
Trust, Privacy and Security in Digital Business (12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Simone Fischer-Hübner
,
Costas Lambrinoudakis
,
Javier López
HK$456
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
HK$299
Elsewhere
HK$352.69
Save HK$53.69 (15%)
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
HK$400
Policy Design in the Age of Digital Adoption (Explore how PolicyOps can drive Policy as Code adoption in an organization's digital transformation)
By
Ricardo Ferreira
Policy Design in the Age of Digital Adoption (Explore how PolicyOps can drive Policy as Code adoption in an organization's digital transformation)
By
Ricardo Ferreira
HK$457
Autonomic and Trusted Computing (4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Bin Xiao
,
Laurence Tianruo Yang
,
Christian Muller-Schloer
,
Christian Muller-Schloer
Autonomic and Trusted Computing (4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Bin Xiao
,
Laurence Tianruo Yang
,
Christian Muller-Schloer
,
Christian Muller-Schloer
HK$560
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Lopez, Javier
,
Gritzalis, Dimitris
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Lopez, Javier
,
Gritzalis, Dimitris
HK$960
Privacy, Security, and Trust in KDD (Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Francesco Bonchi
,
Elena Ferrari
,
Wei Jiang
,
Bradley Malin
Privacy, Security, and Trust in KDD (Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Francesco Bonchi
,
Elena Ferrari
,
Wei Jiang
,
Bradley Malin
HK$500
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Gritzalis, Dimitris
,
Lopez, Javier
Emerging Challenges for Security, Privacy and Trust (24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (IFIP Advances in Information and Communication Technology))
By
Gritzalis, Dimitris
,
Lopez, Javier
HK$987
The Design of Sites, (Patterns for Creating Winning Web Sites)
By
Duyne, Douglas K.Van
,
Landay, James A.
,
Jason I. Hong
The Design of Sites, (Patterns for Creating Winning Web Sites)
By
Duyne, Douglas K.Van
,
Landay, James A.
,
Jason I. Hong
HK$391
Elsewhere
HK$483.58
Save HK$92.58 (19%)
1
The Cloud Computing Book (The Future of Computing Explained)
By
Comer, Douglas E.
The Cloud Computing Book (The Future of Computing Explained)
By
Comer, Douglas E.
HK$1,033
Elsewhere
HK$1,158.82
Save HK$125.82 (11%)
The Cloud Computing Book (The Future of Computing Explained)
By
Douglas Comer
The Cloud Computing Book (The Future of Computing Explained)
By
Douglas Comer
HK$445
Elsewhere
HK$463.43
Save HK$18.43 (4%)
Towards Next Generation Grids (Proceedings of the Coregrid Symposium 2007)
By
Thierry Priol
,
Marco Vanneschi
Towards Next Generation Grids (Proceedings of the Coregrid Symposium 2007)
By
Thierry Priol
,
Marco Vanneschi
HK$1,300
The Craft of System Security,
By
Smith, Sean
,
Marchesini, John
The Craft of System Security,
By
Smith, Sean
,
Marchesini, John
HK$983
1
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page