0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(78)
Sold By
Sold By
All Sellers
Fishpond
(80)
Age Range
Age Range
All Ranges
15+
(11)
All Ages
(3)
Country
Country
All Countries
Germany
(25)
Singapore
(21)
Switzerland
(21)
United States
(7)
India
(2)
More...
Results for "Graph Theory Programming"
Graph Theory Programming
103 results
Filters
Refine By
Category
Category
Networking
(78)
Sold By
Sold By
All Sellers
Fishpond
(80)
Age Range
Age Range
All Ranges
15+
(11)
All Ages
(3)
Country
Country
All Countries
Germany
(25)
Singapore
(21)
Switzerland
(21)
United States
(7)
India
(2)
More...
103 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
HK$551
Elsewhere
HK$1,132.78
Save HK$581.78 (51%)
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
HK$500
Elsewhere
HK$1,132.78
Save HK$632.78 (56%)
Applied Math for Security (A Pythonic Introduction to Graph Theory and Computational Geometry)
By
Reilly, Daniel
Applied Math for Security (A Pythonic Introduction to Graph Theory and Computational Geometry)
By
Reilly, Daniel
HK$301
Elsewhere
HK$494.24
Save HK$193.24 (39%)
Cryptography and Cryptanalysis in MATLAB (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
Cryptography and Cryptanalysis in MATLAB (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
HK$425
Elsewhere
HK$566.34
Save HK$141.34 (25%)
Differential Privacy (From Theory to Practice)
By
Ninghui Li
,
Min Lyu
,
Dong Su
Differential Privacy (From Theory to Practice)
By
Ninghui Li
,
Min Lyu
,
Dong Su
HK$274
Elsewhere
HK$566.34
Save HK$292.34 (52%)
Machine Learning Safety (Artificial Intelligence (Foundations, Theory, and Algorithms))
By
Huang, Xiaowei
,
Jin, Gaojie
,
Wenjie Ruan
Machine Learning Safety (Artificial Intelligence (Foundations, Theory, and Algorithms))
By
Huang, Xiaowei
,
Jin, Gaojie
,
Wenjie Ruan
HK$633
SOFSEM 2016 (Theory and Practice of Computer Science: 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings (Theoretical Computer Science and General Issues))
By
Rusins Martins Freivalds
,
Gregor Engels
,
Barbara Catania
SOFSEM 2016 (Theory and Practice of Computer Science: 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings (Theoretical Computer Science and General Issues))
By
Rusins Martins Freivalds
,
Gregor Engels
,
Barbara Catania
HK$592
Computer Performance Engineering (15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Rena Bakhshi
,
Paolo Ballarini
,
Benoît Barbot
,
Hind Castel-Taleb
Computer Performance Engineering (15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Rena Bakhshi
,
Paolo Ballarini
,
Benoît Barbot
,
Hind Castel-Taleb
HK$491
Theory of Cryptography (Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Joe Kilian
Theory of Cryptography (Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Joe Kilian
HK$1,000
Automata, Languages and Programming: 22nd International Colloquium, ICALP 95, Szeged, Hungary, July 10 - 14, 1995. Proceedings (22nd: International Colloquium, ICALP 95, Szeged, Hungary, July 10-14, 1995 - Proceedings (Lecture Notes in Computer Science))
By
Zoltan Fulop
,
Ferenc Gecseg
Automata, Languages and Programming: 22nd International Colloquium, ICALP 95, Szeged, Hungary, July 10 - 14, 1995. Proceedings (22nd: International Colloquium, ICALP 95, Szeged, Hungary, July 10-14, 1995 - Proceedings (Lecture Notes in Computer Science))
By
Zoltan Fulop
,
Ferenc Gecseg
HK$1,100
Concurrency and Parallelism, Programming, Networking and Security (Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996 - Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Joxan Jaffar
,
Roland H. C. Yap
Concurrency and Parallelism, Programming, Networking and Security (Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996 - Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Joxan Jaffar
,
Roland H. C. Yap
HK$540
Advances in Cryptology – ASIACRYPT 2005 (11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Bimal Kumar Roy
Advances in Cryptology – ASIACRYPT 2005 (11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Bimal Kumar Roy
HK$600
Coding Theory and Applications (2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Proceedings (Lecture Notes in Computer Science))
By
Angela Barbero
Coding Theory and Applications (2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Proceedings (Lecture Notes in Computer Science))
By
Angela Barbero
HK$500
Advances in Cryptology – EUROCRYPT 2013 (32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Thomas Johansson
,
Phong Q. Nguyen
Advances in Cryptology – EUROCRYPT 2013 (32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Thomas Johansson
,
Phong Q. Nguyen
HK$600
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
HK$1,534
Hacker's Delight
By
Jr. Warren, Henry S.
Hacker's Delight
By
Jr. Warren, Henry S.
HK$424
Elsewhere
HK$458.20
Save HK$34.20 (7%)
1,132
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
HK$1,438
Theoretical Cybersecurity (Principles and Advanced Concepts)
By
Oakley, Jacob G.
,
Butler, Michael
,
Wayne York
Theoretical Cybersecurity (Principles and Advanced Concepts)
By
Oakley, Jacob G.
,
Butler, Michael
,
Wayne York
HK$370
Elsewhere
HK$411.85
Save HK$41.85 (10%)
Digital Image Security (Techniques and Applications)
By
Amit Kumar Singh
,
Stefano Berretti
,
Ashima Anand
Digital Image Security (Techniques and Applications)
By
Amit Kumar Singh
,
Stefano Berretti
,
Ashima Anand
HK$1,240
Elsewhere
HK$1,905.30
Save HK$665.30 (35%)
Computational Intelligence, Cyber Security and Computational Models (Proceedings of ICC3 2015 (Advances in Intelligent Systems and Computing))
By
Anthony Bonato
,
Muthukrishnan Senthilkumar
,
Vijayalakshmi Ramasamy
,
Shina Sheen
Computational Intelligence, Cyber Security and Computational Models (Proceedings of ICC3 2015 (Advances in Intelligent Systems and Computing))
By
Anthony Bonato
,
Muthukrishnan Senthilkumar
,
Vijayalakshmi Ramasamy
,
Shina Sheen
HK$2,080
Elsewhere
HK$2,265.66
Save HK$185.66 (8%)
Proceedings of the International Congress on Information and Communication Technology (ICICT 2015: Volume 2 (Advances in Intelligent Systems and Computing))
By
Suresh Chandra Satapathy
,
Yogesh Chandra Bhatt
,
Amit Joshi
,
Durgesh Kumar Mishra
Proceedings of the International Congress on Information and Communication Technology (ICICT 2015: Volume 2 (Advances in Intelligent Systems and Computing))
By
Suresh Chandra Satapathy
,
Yogesh Chandra Bhatt
,
Amit Joshi
,
Durgesh Kumar Mishra
HK$1,800
Advanced Computing and Systems for Security (Volume Four (Advances in Intelligent Systems and Computing))
By
Rituparna Chaki
,
Khalid Saeed
,
Agostino Cortesi
,
Nabendu Chaki
Advanced Computing and Systems for Security (Volume Four (Advances in Intelligent Systems and Computing))
By
Rituparna Chaki
,
Khalid Saeed
,
Agostino Cortesi
,
Nabendu Chaki
HK$751
Advanced Computing and Systems for Security (Volume Three (Advances in Intelligent Systems and Computing))
By
Rituparna Chaki
,
Khalid Saeed
,
Agostino Cortesi
,
Nabendu Chaki
Advanced Computing and Systems for Security (Volume Three (Advances in Intelligent Systems and Computing))
By
Rituparna Chaki
,
Khalid Saeed
,
Agostino Cortesi
,
Nabendu Chaki
HK$785
Data Science and Big Data Analytics (ACM-WIR 2018 (Lecture Notes on Data Engineering and Communications Technologies))
By
Durgesh Kumar Mishra
,
Xin-She Yang
,
Aynur Unal
Data Science and Big Data Analytics (ACM-WIR 2018 (Lecture Notes on Data Engineering and Communications Technologies))
By
Durgesh Kumar Mishra
,
Xin-She Yang
,
Aynur Unal
HK$1,300
1
2
3
4
5
Next Page
1
2
3
4
5
Next Page