0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Programming
Algorithms
Filters
Sold By
Sold By
All Sellers
Fishpond
(18)
Age Range
Age Range
All Ranges
15+
(2)
Country
Country
All Countries
Germany
(9)
United States
(6)
Switzerland
(3)
Results for "Sushil"
Sushil
19 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(18)
Age Range
Age Range
All Ranges
15+
(2)
Country
Country
All Countries
Germany
(9)
United States
(6)
Switzerland
(3)
19 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Intrusion Detection in Distributed Systems (An Abstraction-Based Approach (Advances in Information Security))
By
Jajodia, Sushil
,
Peng Ning
,
Xiaoyang Sean Wang
Intrusion Detection in Distributed Systems (An Abstraction-Based Approach (Advances in Information Security))
By
Jajodia, Sushil
,
Peng Ning
,
Xiaoyang Sean Wang
HK$482
Applications of Data Mining in Computer Security (Advances in Information Security)
By
Daniel Barbara
,
Sushil Jajodia
Applications of Data Mining in Computer Security (Advances in Information Security)
By
Daniel Barbara
,
Sushil Jajodia
HK$900
Multilevel Secure Transaction Processing (Advances in Database Systems)
By
Vijay Atluri
,
Sushil Jajodia
,
Binto George
Multilevel Secure Transaction Processing (Advances in Database Systems)
By
Vijay Atluri
,
Sushil Jajodia
,
Binto George
HK$1,260
Elsewhere
HK$1,335.53
Save HK$75.53 (6%)
Advanced Transaction Models and Architectures
By
Sushil Jajodia
,
Larry Kerschberg
Advanced Transaction Models and Architectures
By
Sushil Jajodia
,
Larry Kerschberg
HK$1,300
Integrity and Internal Control in Information Systems (IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 1)
By
Sushil Jajodia
,
William List
,
Graeme W. McGregor
,
Leon A. M. Strous
Integrity and Internal Control in Information Systems (IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 1)
By
Sushil Jajodia
,
William List
,
Graeme W. McGregor
,
Leon A. M. Strous
HK$1,775
Elsewhere
HK$1,982.91
Save HK$207.91 (10%)
Moving Target Defense II (Application of Game Theory and Adversarial Modeling (Advances in Information Security))
By
Sushil Jajodia
,
Anup K. Ghosh
,
V. S. Subrahmanian
,
Vipin Swarup
Moving Target Defense II (Application of Game Theory and Adversarial Modeling (Advances in Information Security))
By
Sushil Jajodia
,
Anup K. Ghosh
,
V. S. Subrahmanian
,
Vipin Swarup
HK$1,200
Data and Applications Security XIX (19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Com ..)
By
Sushil Jajodia
,
Duminda Wijesekera
Data and Applications Security XIX (19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Com ..)
By
Sushil Jajodia
,
Duminda Wijesekera
HK$500
Algorithms (Design and Analysis (De Gruyter Textbook))
By
Sushil C. Dimri
,
Preeti Malik
,
Mangey Ram
Algorithms (Design and Analysis (De Gruyter Textbook))
By
Sushil C. Dimri
,
Preeti Malik
,
Mangey Ram
HK$417
Elsewhere
HK$544.53
Save HK$127.53 (23%)
Algorithms (Big Data, Optimization Techniques, Cyber Security (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences))
By
Sushil C. Dimri
,
Abhay Saxena
,
Bhuvan Unhelkar
,
Akshay Kumar
Algorithms (Big Data, Optimization Techniques, Cyber Security (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences))
By
Sushil C. Dimri
,
Abhay Saxena
,
Bhuvan Unhelkar
,
Akshay Kumar
HK$640
Elsewhere
HK$1,027.41
Save HK$387.41 (38%)
Information Systems Security (11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Sushil Jajodia
,
Chandan Mazumdar
Information Systems Security (11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Sushil Jajodia
,
Chandan Mazumdar
HK$900
Graphical Models for Security (Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers (Lecture Notes in Computer Science))
By
Sjouke Mauw
,
Sushil Jajodia
Graphical Models for Security (Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers (Lecture Notes in Computer Science))
By
Sjouke Mauw
,
Sushil Jajodia
HK$660
Theory and Models for Cyber Situation Awareness (Programming and Software Engineering)
By
Peng Liu
,
Sushil Jajodia
,
Cliff Wang
Theory and Models for Cyber Situation Awareness (Programming and Software Engineering)
By
Peng Liu
,
Sushil Jajodia
,
Cliff Wang
HK$540
Time Granularities in Databases, Data Mining, and Temporal Reasoning
By
Bettini, Claudio
,
Jajodia, Sushil
,
Sean Wang
Time Granularities in Databases, Data Mining, and Temporal Reasoning
By
Bettini, Claudio
,
Jajodia, Sushil
,
Sean Wang
HK$500
Security and Privacy in Communication Networks (6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Sushil Jajodia
,
Jianying Zhou
Security and Privacy in Communication Networks (6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Sushil Jajodia
,
Jianying Zhou
HK$977
High Performance Computing -- HiPC 2003 (10th International Conference, Hyderabad, India, December 17-20, 2003, Proceedings (Lecture Notes in Computer Science))
By
Timothy Mark Pinkston
,
Viktor K. Prasanna
High Performance Computing -- HiPC 2003 (10th International Conference, Hyderabad, India, December 17-20, 2003, Proceedings (Lecture Notes in Computer Science))
By
Timothy Mark Pinkston
,
Viktor K. Prasanna
HK$972
High Performance Computing - HiPC 2004 (11th International Conference, Bangalore, India, December 19-22, 2004, Proceedings (Lecture Notes in Computer Science))
By
Luc Bouge
,
Viktor K. Prasanna
High Performance Computing - HiPC 2004 (11th International Conference, Bangalore, India, December 19-22, 2004, Proceedings (Lecture Notes in Computer Science))
By
Luc Bouge
,
Viktor K. Prasanna
HK$560
High Performance Computing – HiPC 2005 (12th International Conference, Goa, India, December 18-21, 2005, Proceedings (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
David A. Bader
,
Manish Parashar
,
V. Sridhar
,
Viktor K. Prasanna
High Performance Computing – HiPC 2005 (12th International Conference, Goa, India, December 18-21, 2005, Proceedings (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
David A. Bader
,
Manish Parashar
,
V. Sridhar
,
Viktor K. Prasanna
HK$576
Information and Communication Security (Second International Conference, ICICS '99, Sydney, Australia, November 9-11, 1999, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Vijay Varadharajan
,
Yi Mu
Information and Communication Security (Second International Conference, ICICS '99, Sydney, Australia, November 9-11, 1999, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Vijay Varadharajan
,
Yi Mu
HK$500
Data and Applications Security and Privacy XXIV (24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings (Lecture Notes in Computer Science))
By
Sara Foresti
,
Sushil Jajodia
Data and Applications Security and Privacy XXIV (24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings (Lecture Notes in Computer Science))
By
Sara Foresti
,
Sushil Jajodia
Currently
Unavailable