0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Networking
Filters
Sold By
Sold By
All Sellers
Fishpond
(189)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
Singapore
(46)
United Kingdom
(35)
Switzerland
(28)
United States
(15)
India
(5)
More...
Results for "ACM Books Programming"
ACM Books Programming
266 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(189)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
Singapore
(46)
United Kingdom
(35)
Switzerland
(28)
United States
(15)
India
(5)
More...
266 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Robust Machine Learning (Distributed Methods for Safe AI (Machine Learning: Foundations, Methodologies, and Applications))
By
Guerraoui, Rachid
,
Gupta, Nirupam
,
Rafael Pinot
Robust Machine Learning (Distributed Methods for Safe AI (Machine Learning: Foundations, Methodologies, and Applications))
By
Guerraoui, Rachid
,
Gupta, Nirupam
,
Rafael Pinot
HK$940
Elsewhere
HK$1,235.81
Save HK$295.81 (24%)
Proceedings of the Tenth International Conference on Mathematics and Computing (ICMC 2024, Volume 2 (Lecture Notes in Networks and Systems))
By
Debasis Giri
,
Jaideep Vaidya
,
S. Ponnusamy
,
Zhiqiang Lin
Proceedings of the Tenth International Conference on Mathematics and Computing (ICMC 2024, Volume 2 (Lecture Notes in Networks and Systems))
By
Debasis Giri
,
Jaideep Vaidya
,
S. Ponnusamy
,
Zhiqiang Lin
HK$1,471
Elsewhere
HK$2,059.75
Save HK$588.75 (29%)
Data Economy in the Digital Age (Data-Intensive Research)
By
Shukla, Samiksha
,
Bashir, Shahid
,
Kapil Tiwari
,
Shahid Bashir
Data Economy in the Digital Age (Data-Intensive Research)
By
Shukla, Samiksha
,
Bashir, Shahid
,
Kapil Tiwari
,
Shahid Bashir
HK$1,140
Elsewhere
HK$1,338.80
Save HK$198.80 (15%)
Data Science and Big Data Analytics (Proceedings of IDBA 2023 (Data-Intensive Research))
By
Durgesh Mishra
,
Xin She Yang
,
Aynur Unal
,
Dharm Singh Jat
Data Science and Big Data Analytics (Proceedings of IDBA 2023 (Data-Intensive Research))
By
Durgesh Mishra
,
Xin She Yang
,
Aynur Unal
,
Dharm Singh Jat
HK$1,790
Elsewhere
HK$2,265.74
Save HK$475.74 (21%)
Advancing Cyber Security Through Quantum Cryptography (Advances in Information Security, Privacy, and Ethics)
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Advancing Cyber Security Through Quantum Cryptography (Advances in Information Security, Privacy, and Ethics)
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
HK$1,787
Elsewhere
HK$2,811.70
Save HK$1,024.70 (36%)
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
HK$1,872
Harnessing Quantum Cryptography for Next-Generation Security Solutions (Advances in Information Security, Privacy, and Ethics)
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Harnessing Quantum Cryptography for Next-Generation Security Solutions (Advances in Information Security, Privacy, and Ethics)
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
HK$1,833
Cyber Security in India (Education, Research and Training (IITK Directions))
By
Sandeep Kumar Shukla
,
Manindra Agrawal
Cyber Security in India (Education, Research and Training (IITK Directions))
By
Sandeep Kumar Shukla
,
Manindra Agrawal
Currently
Unavailable
Blockchain (Empowering Secure Data Sharing)
By
Meng Shen
,
Liehuang Zhu
,
Ke Xu
Blockchain (Empowering Secure Data Sharing)
By
Meng Shen
,
Liehuang Zhu
,
Ke Xu
Currently
Unavailable
Computer Security and the Internet (Tools and Jewels (Information Security and Cryptography))
By
Oorschot, Paul C. van
Computer Security and the Internet (Tools and Jewels (Information Security and Cryptography))
By
Oorschot, Paul C. van
Currently
Unavailable
Previous Page
1
...
4
5
6
7
8
9
10
11
Next Page
Previous Page
1
...
4
5
6
7
8
9
10
11
Next Page