0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Networking
Filters
Sold By
Sold By
All Sellers
Fishpond
(189)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
Singapore
(46)
United Kingdom
(35)
Switzerland
(28)
United States
(15)
India
(5)
More...
Results for "ACM Books Programming"
ACM Books Programming
266 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(189)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
Singapore
(46)
United Kingdom
(35)
Switzerland
(28)
United States
(15)
India
(5)
More...
266 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Rising Threats in Expert Applications and Solutions (Proceedings of FICR-TEAS 2020 (Advances in Intelligent Systems and Computing))
By
Vijay Singh Rathore
,
Nilanjan Dey
,
Vincenzo Piuri
Rising Threats in Expert Applications and Solutions (Proceedings of FICR-TEAS 2020 (Advances in Intelligent Systems and Computing))
By
Vijay Singh Rathore
,
Nilanjan Dey
,
Vincenzo Piuri
Currently
Unavailable
AI-Driven Cybersecurity (Revolutionizing Threat Detection and Defence Systems)
By
Hooman Razavi
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Haïfa Nakouri
AI-Driven Cybersecurity (Revolutionizing Threat Detection and Defence Systems)
By
Hooman Razavi
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Haïfa Nakouri
Currently
Unavailable
AI-Driven Cybersecurity (Revolutionizing Threat Detection and Defence Systems)
By
Hooman Razavi
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Haïfa Nakouri
AI-Driven Cybersecurity (Revolutionizing Threat Detection and Defence Systems)
By
Hooman Razavi
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Haïfa Nakouri
Currently
Unavailable
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
By
Sniatala, Pawel
,
Ramani, Sanjeev Kaushik
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
By
Sniatala, Pawel
,
Ramani, Sanjeev Kaushik
Currently
Unavailable
ICT: Innovation and Computing (Proceedings of ICTCS 2023, Volume 5 (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
,
S. Karthik
ICT: Innovation and Computing (Proceedings of ICTCS 2023, Volume 5 (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
,
S. Karthik
Currently
Unavailable
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Currently
Unavailable
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Currently
Unavailable
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Currently
Unavailable
Exam Ref SC-300 Microsoft Identity and Access Administrator
By
Razi Rais
,
Ilya Lushnikov
,
Jeevan Bisht
,
Padma Chilakapati
Exam Ref SC-300 Microsoft Identity and Access Administrator
By
Razi Rais
,
Ilya Lushnikov
,
Jeevan Bisht
,
Padma Chilakapati
Currently
Unavailable
Exam Ref SC-300 Microsoft Identity and Access Administrator
By
Razi Rais
,
Ilya Lushnikov
,
Jeevan Bisht
,
Padma Chilakapati
Exam Ref SC-300 Microsoft Identity and Access Administrator
By
Razi Rais
,
Ilya Lushnikov
,
Jeevan Bisht
,
Padma Chilakapati
Currently
Unavailable
Principles of Social Networking (The New Horizon and Emerging Challenges (Smart Innovation, Systems and Technologies))
By
Anupam Biswas
,
Ripon Patgiri
,
Bhaskar Biswas
Principles of Social Networking (The New Horizon and Emerging Challenges (Smart Innovation, Systems and Technologies))
By
Anupam Biswas
,
Ripon Patgiri
,
Bhaskar Biswas
Currently
Unavailable
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Currently
Unavailable
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Currently
Unavailable
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Currently
Unavailable
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Currently
Unavailable
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Currently
Unavailable
Emerging Trends in Expert Applications and Security (Proceedings of 2nd ICETEAS 2023, Volume 2 (Lecture Notes in Networks and Systems))
By
Vijay Singh Rathore
,
Vincenzo Piuri
,
Rosalina Babo
Emerging Trends in Expert Applications and Security (Proceedings of 2nd ICETEAS 2023, Volume 2 (Lecture Notes in Networks and Systems))
By
Vijay Singh Rathore
,
Vincenzo Piuri
,
Rosalina Babo
Currently
Unavailable
Data Mining and Information Security (Proceedings of ICDMIS 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Abhishek Bhattacharya
,
Soumi Dutta
,
Sheng-Lung Peng
,
Xin She Yang
Data Mining and Information Security (Proceedings of ICDMIS 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Abhishek Bhattacharya
,
Soumi Dutta
,
Sheng-Lung Peng
,
Xin She Yang
Currently
Unavailable
Proceedings of the Tenth International Conference on Mathematics and Computing (ICMC 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Debasis Giri
,
Jaideep Vaidya
,
S. Ponnusamy
,
Zhiqiang Lin
Proceedings of the Tenth International Conference on Mathematics and Computing (ICMC 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Debasis Giri
,
Jaideep Vaidya
,
S. Ponnusamy
,
Zhiqiang Lin
Currently
Unavailable
Proceedings of International Conference on Frontiers in Computing and Systems (COMSYS 2022 (Lecture Notes in Networks and Systems))
By
Ram Sarkar
,
Sujata Pal
,
Subhadip Basu
,
Dariusz Plewczynski
Proceedings of International Conference on Frontiers in Computing and Systems (COMSYS 2022 (Lecture Notes in Networks and Systems))
By
Ram Sarkar
,
Sujata Pal
,
Subhadip Basu
,
Dariusz Plewczynski
Currently
Unavailable
Software Security Engineering (A Guide for Project Managers)
By
Nancy R. Mead
,
Julia H. Allen
,
Sean Barnum
Software Security Engineering (A Guide for Project Managers)
By
Nancy R. Mead
,
Julia H. Allen
,
Sean Barnum
Currently
Unavailable
Introduction to Computer Security (International Edition)
By
Michael Goodrich
,
Roberto Tamassia
Introduction to Computer Security (International Edition)
By
Michael Goodrich
,
Roberto Tamassia
76
Currently
Unavailable
Proceedings of International Conference on Recent Trends in Computing (ICRTC 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Rajendra Prasad Mahapatra
,
Sudip Roy
,
Pritee Parwekar
Proceedings of International Conference on Recent Trends in Computing (ICRTC 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Rajendra Prasad Mahapatra
,
Sudip Roy
,
Pritee Parwekar
Currently
Unavailable
Data Mining and Information Security (Proceedings of ICDMIS 2024, Volume 2 (Lecture Notes in Networks and Systems))
By
Abhishek Bhattacharya
,
Soumi Dutta
,
Md Abdur Razzak
,
Debabrata Samanta
Data Mining and Information Security (Proceedings of ICDMIS 2024, Volume 2 (Lecture Notes in Networks and Systems))
By
Abhishek Bhattacharya
,
Soumi Dutta
,
Md Abdur Razzak
,
Debabrata Samanta
Currently
Unavailable
Previous Page
1
...
6
7
8
9
10
11
Next Page
Previous Page
1
...
6
7
8
9
10
11
Next Page