0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(8)
Sold By
Sold By
All Sellers
Fishpond
(8)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
Switzerland
(4)
Germany
(2)
United States
(1)
Results for "Breakthrough Code"
Breakthrough Code
15 results
Filters
Refine By
Category
Category
Networking
(8)
Sold By
Sold By
All Sellers
Fishpond
(8)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
Switzerland
(4)
Germany
(2)
United States
(1)
15 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Cryptography Decrypted
By
Mel, H.X.
,
Burnett, Doris
,
Doris M. Baker
Cryptography Decrypted
By
Mel, H.X.
,
Burnett, Doris
,
Doris M. Baker
HK$348
Elsewhere
HK$418.09
Save HK$70.09 (17%)
1
Quantum Computing Environments
By
Sitharama S. Iyengar
,
Mario Mastriani
,
Kj Latesh Kumar
Quantum Computing Environments
By
Sitharama S. Iyengar
,
Mario Mastriani
,
Kj Latesh Kumar
HK$1,200
Quantum Computing Environments
By
Sitharama S. Iyengar
,
Mario Mastriani
,
KJ Latesh Kumar
Quantum Computing Environments
By
Sitharama S. Iyengar
,
Mario Mastriani
,
KJ Latesh Kumar
HK$1,200
AI Embedded Assurance for Cyber Systems
By
Cliff Wang
,
S.S. Iyengar
,
Kun Sun
AI Embedded Assurance for Cyber Systems
By
Cliff Wang
,
S.S. Iyengar
,
Kun Sun
HK$1,340
Intelligence and Security Informatics (First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings: v.2665 (Lecture Notes in Computer Science))
By
Hsinchun Chen
,
Richard Miranda
,
Daniel D. Zeng
,
Chris C. Demchak
Intelligence and Security Informatics (First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings: v.2665 (Lecture Notes in Computer Science))
By
Hsinchun Chen
,
Richard Miranda
,
Daniel D. Zeng
,
Chris C. Demchak
HK$678
Smart Grid and Innovative Frontiers in Telecommunications (Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunicatio)
By
Peter Han Joo Chong
,
Boon-Chong Seet
,
Michael Chai
,
Saeed Ur Rehman
Smart Grid and Innovative Frontiers in Telecommunications (Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunicatio)
By
Peter Han Joo Chong
,
Boon-Chong Seet
,
Michael Chai
,
Saeed Ur Rehman
HK$558
Advanced Infocomm Technology (5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papers (Computer Communication Networks and Telecommunications))
By
Vincent Guyot
Advanced Infocomm Technology (5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papers (Computer Communication Networks and Telecommunications))
By
Vincent Guyot
HK$575
Practical Guide to Trusted Computing , A
By
David Challener
,
Kent Yoder
,
Ryan Catherman
Practical Guide to Trusted Computing , A
By
David Challener
,
Kent Yoder
,
Ryan Catherman
Currently
Unavailable
A Short Course on Computer Viruses
By
Frederick B. Cohen
A Short Course on Computer Viruses
By
Frederick B. Cohen
Currently
Unavailable
Cryptography (Theory and Practice, Third Edition (Discrete Mathematics and Its Applications))
By
Douglas R. Stinson
Cryptography (Theory and Practice, Third Edition (Discrete Mathematics and Its Applications))
By
Douglas R. Stinson
1
Currently
Unavailable
Intercept (The Secret History of Computers and Spies)
By
Corera, Gordon
Intercept (The Secret History of Computers and Spies)
By
Corera, Gordon
193
Currently
Unavailable
AI Embedded Assurance for Cyber Systems
By
Cliff Wang
,
S.S. Iyengar
,
Kun Sun
AI Embedded Assurance for Cyber Systems
By
Cliff Wang
,
S.S. Iyengar
,
Kun Sun
Currently
Unavailable
Securing the Borderless Network (Security for the Web 2.0 World)
By
Tom Gillis
Securing the Borderless Network (Security for the Web 2.0 World)
By
Tom Gillis
1
Currently
Unavailable
Securing the Borderless Network (Security for the Web 2.0 World)
By
Tom Gillis
Securing the Borderless Network (Security for the Web 2.0 World)
By
Tom Gillis
Currently
Unavailable