0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Networking
Filters
Sold By
Sold By
All Sellers
Fishpond
(190)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
Singapore
(46)
United Kingdom
(35)
Switzerland
(28)
United States
(15)
India
(5)
More...
Results for "ACM Books Programming"
ACM Books Programming
269 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(190)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
Singapore
(46)
United Kingdom
(35)
Switzerland
(28)
United States
(15)
India
(5)
More...
269 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Computer Security and the Internet (Tools and Jewels (Information Security and Cryptography))
By
Oorschot, Paul C. van
Computer Security and the Internet (Tools and Jewels (Information Security and Cryptography))
By
Oorschot, Paul C. van
Currently
Unavailable
Fluidware (Novel Approaches for Large-Scale IoT Systems (Internet of Things))
By
Franco Zambonelli
,
Giancarlo Fortino
,
Barbara Re
,
Mirko Viroli
Fluidware (Novel Approaches for Large-Scale IoT Systems (Internet of Things))
By
Franco Zambonelli
,
Giancarlo Fortino
,
Barbara Re
,
Mirko Viroli
Currently
Unavailable
Hardware Security Training, Hands-on!
By
Mark Tehranipoor
,
N. Nalla Anandakumar
,
Farimah Farahmandi
Hardware Security Training, Hands-on!
By
Mark Tehranipoor
,
N. Nalla Anandakumar
,
Farimah Farahmandi
Currently
Unavailable
Encyclopedia of Cryptography and Security. 2 Bände
By
Henk C. A. van Tilborg
,
Sushil Jajodia
Encyclopedia of Cryptography and Security. 2 Bände
By
Henk C. A. van Tilborg
,
Sushil Jajodia
Currently
Unavailable
Proceedings of the First International Conference on Intelligent Computing and Communication (Advances in Intelligent Systems and Computing)
By
Jyotsna Kumar Mandal
,
Suresh Chandra Satapathy
,
Manas Kumar Sanyal
,
Vikrant Bhateja
Proceedings of the First International Conference on Intelligent Computing and Communication (Advances in Intelligent Systems and Computing)
By
Jyotsna Kumar Mandal
,
Suresh Chandra Satapathy
,
Manas Kumar Sanyal
,
Vikrant Bhateja
Currently
Unavailable
Computer Security (Principles and Practice)
By
William Stallings
,
Lawrie Brown
Computer Security (Principles and Practice)
By
William Stallings
,
Lawrie Brown
Currently
Unavailable
Emerging Trends in Expert Applications and Security (Proceedings of ICETEAS 2018 (Advances in Intelligent Systems and Computing))
By
Vijay Singh Rathore
,
Marcel Worring
,
Durgesh Kumar Mishra
,
Amit Joshi
Emerging Trends in Expert Applications and Security (Proceedings of ICETEAS 2018 (Advances in Intelligent Systems and Computing))
By
Vijay Singh Rathore
,
Marcel Worring
,
Durgesh Kumar Mishra
,
Amit Joshi
Currently
Unavailable
Proceedings of the Eleventh International Conference on Mathematics and Computing (ICMC 2025, Volume 1 (Lecture Notes in Networks and Systems))
By
Debasis Giri
,
Indrakshi Ray
,
S. Ponnusamy
,
Rakesh M. Verma
Proceedings of the Eleventh International Conference on Mathematics and Computing (ICMC 2025, Volume 1 (Lecture Notes in Networks and Systems))
By
Debasis Giri
,
Indrakshi Ray
,
S. Ponnusamy
,
Rakesh M. Verma
Currently
Unavailable
Encyclopedia of Cryptography, Security and Privacy
By
Sushil Jajodia
,
Pierangela Samarati
,
Moti Yung
Encyclopedia of Cryptography, Security and Privacy
By
Sushil Jajodia
,
Pierangela Samarati
,
Moti Yung
Currently
Unavailable
Information and Communication Technology for Competitive Strategies (ICTCS 2022) (ICT: Applications and Social Interfaces (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
Information and Communication Technology for Competitive Strategies (ICTCS 2022) (ICT: Applications and Social Interfaces (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
Currently
Unavailable
Research Advances in Cloud Computing
By
Sanjay Chaudhary
,
Gaurav Somani
,
Rajkumar Buyya
Research Advances in Cloud Computing
By
Sanjay Chaudhary
,
Gaurav Somani
,
Rajkumar Buyya
Currently
Unavailable
Computer Security (Principles and Practice, Global Edition)
By
William Stallings
,
Lawrie Brown
Computer Security (Principles and Practice, Global Edition)
By
William Stallings
,
Lawrie Brown
Currently
Unavailable
Computer Security (Principles and Practice, Global Edition)
By
William Stallings
,
Lawrie Brown
Computer Security (Principles and Practice, Global Edition)
By
William Stallings
,
Lawrie Brown
Currently
Unavailable
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
By
Sniatala, Pawel
,
Ramani, Sanjeev Kaushik
,
Sanjeev Kaushik Ramani
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
By
Sniatala, Pawel
,
Ramani, Sanjeev Kaushik
,
Sanjeev Kaushik Ramani
Currently
Unavailable
Exploiting Machine Learning for Robust Security
By
Minakshi
,
Anchit Bijalwan
,
Tarun Kumar
Exploiting Machine Learning for Robust Security
By
Minakshi
,
Anchit Bijalwan
,
Tarun Kumar
Currently
Unavailable
Exploiting Machine Learning for Robust Security
By
Minakshi
,
Anchit Bijalwan
,
Tarun Kumar
Exploiting Machine Learning for Robust Security
By
Minakshi
,
Anchit Bijalwan
,
Tarun Kumar
Currently
Unavailable
Exploiting Machine Learning for Robust Security
By
Minakshi
,
Anchit Bijalwan
,
Tarun Kumar
Exploiting Machine Learning for Robust Security
By
Minakshi
,
Anchit Bijalwan
,
Tarun Kumar
Currently
Unavailable
Resilience of Cyber-Physical Systems (From Risk Modelling to Threat Counteraction (Advanced Sciences and Technologies for Security Applications))
By
Francesco Flammini
Resilience of Cyber-Physical Systems (From Risk Modelling to Threat Counteraction (Advanced Sciences and Technologies for Security Applications))
By
Francesco Flammini
Currently
Unavailable
Cyber Deception (Techniques, Strategies, and Human Aspects (Advances in Information Security))
By
Tiffany Bao
,
Milind Tambe
,
Cliff Wang
Cyber Deception (Techniques, Strategies, and Human Aspects (Advances in Information Security))
By
Tiffany Bao
,
Milind Tambe
,
Cliff Wang
Currently
Unavailable
Usable Security (History, Themes, and Challenges (Synthesis Lectures on Information Security, Privacy, and Trust))
By
Simson Garfinkel
,
Heather Richter Lipford
Usable Security (History, Themes, and Challenges (Synthesis Lectures on Information Security, Privacy, and Trust))
By
Simson Garfinkel
,
Heather Richter Lipford
Currently
Unavailable
Defending the Metaverse (Cybersecurity Strategies for the Next Generation Internet (Advances in Cybersecurity Management))
By
Ravi Sheth
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Edeh Michael Onyema
Defending the Metaverse (Cybersecurity Strategies for the Next Generation Internet (Advances in Cybersecurity Management))
By
Ravi Sheth
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Edeh Michael Onyema
Currently
Unavailable
Defending the Metaverse (Cybersecurity Strategies for the Next Generation Internet (Advances in Cybersecurity Management))
By
Ravi Sheth
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Edeh Michael Onyema
Defending the Metaverse (Cybersecurity Strategies for the Next Generation Internet (Advances in Cybersecurity Management))
By
Ravi Sheth
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Edeh Michael Onyema
Currently
Unavailable
ICT: Applications and Social Interfaces (Proceedings of ICTCS 2023, Volume 1 (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
,
S. Kartik
ICT: Applications and Social Interfaces (Proceedings of ICTCS 2023, Volume 1 (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
,
S. Kartik
Currently
Unavailable
Reversible Digital Watermarking (Theory and Practices (Synthesis Lectures on Information Security, Privacy, and Trust))
By
Chakraborty, Rajat Subhra
,
Naskar, Ruchira
Reversible Digital Watermarking (Theory and Practices (Synthesis Lectures on Information Security, Privacy, and Trust))
By
Chakraborty, Rajat Subhra
,
Naskar, Ruchira
Currently
Unavailable
Previous Page
1
...
5
6
7
8
9
10
11
Next Page
Previous Page
1
...
5
6
7
8
9
10
11
Next Page