0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(54)
Sold By
Sold By
All Sellers
Fishpond
(58)
Age Range
Age Range
All Ranges
15+
(7)
All Ages
(2)
Country
Country
All Countries
United States
(23)
Germany
(14)
United Kingdom
(9)
Switzerland
(4)
Singapore
(1)
More...
Results for "Java Database Computers"
Java Database Computers
81 results
Filters
Refine By
Category
Category
Networking
(54)
Sold By
Sold By
All Sellers
Fishpond
(58)
Age Range
Age Range
All Ranges
15+
(7)
All Ages
(2)
Country
Country
All Countries
United States
(23)
Germany
(14)
United Kingdom
(9)
Switzerland
(4)
Singapore
(1)
More...
81 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Java Cryptography
By
Knudsen, Jonathan
Java Cryptography
By
Knudsen, Jonathan
HK$285
Elsewhere
HK$370.54
Save HK$85.54 (23%)
Hacking Exposed J2EE and Java (Developing Secure Web Applications with Java Technology (Hacking Exposed))
By
Art Taylor
,
Brian Buege
,
Randy Layman
Hacking Exposed J2EE and Java (Developing Secure Web Applications with Java Technology (Hacking Exposed))
By
Art Taylor
,
Brian Buege
,
Randy Layman
HK$414
15
Computer Security 3E
By
Gollmann, Dieter
Computer Security 3E
By
Gollmann, Dieter
HK$557
82
Computer Security (Principles and Practice [With Access Code])
By
William Stallings
,
Lawrie Brown
Computer Security (Principles and Practice [With Access Code])
By
William Stallings
,
Lawrie Brown
HK$2,459
1
Internet Forensics (Using Digital Evidence to Solve Computer Crime)
By
Jones, Robert
Internet Forensics (Using Digital Evidence to Solve Computer Crime)
By
Jones, Robert
HK$240
Elsewhere
HK$329.36
Save HK$89.36 (27%)
1
SOFSEM 2015 (Theory and Practice of Computer Science: 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015, Proceedings (Lecture Notes in Computer Science) (The ..)
By
Giuseppe F. Italiano
,
Tiziana Margaria-Steffen
,
Jaroslav Pokorný
,
Jean-Jacques Quisquater
SOFSEM 2015 (Theory and Practice of Computer Science: 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015, Proceedings (Lecture Notes in Computer Science) (The ..)
By
Giuseppe F. Italiano
,
Tiziana Margaria-Steffen
,
Jaroslav Pokorný
,
Jean-Jacques Quisquater
HK$936
An Information Security Handbook (Computer Communications and Networks)
By
Hunter, John M.
An Information Security Handbook (Computer Communications and Networks)
By
Hunter, John M.
HK$560
Computer Performance Engineering (20th European Workshop, EPEW 2024, Venice, Italy, June 14, 2024, Revised Selected Papers (Lecture Notes in Computer Science))
By
Josu Doncel
,
Anne Remke
,
Daniele Di Pompeo
Computer Performance Engineering (20th European Workshop, EPEW 2024, Venice, Italy, June 14, 2024, Revised Selected Papers (Lecture Notes in Computer Science))
By
Josu Doncel
,
Anne Remke
,
Daniele Di Pompeo
HK$482
Computer Security - ESORICS 2005 (10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Sabrina De Capitani Di Vimercati
,
Paul Syverson
,
Dieter Gollmann
Computer Security - ESORICS 2005 (10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Sabrina De Capitani Di Vimercati
,
Paul Syverson
,
Dieter Gollmann
HK$700
Computer Security - ESORICS 98 (5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998 : Proceedings (Lecture Notes in Computer Science))
By
Jean-Jacques Quisquater
,
Yves Deswarte
,
Catherine Meadows
,
Dieter Gollmann
Computer Security - ESORICS 98 (5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998 : Proceedings (Lecture Notes in Computer Science))
By
Jean-Jacques Quisquater
,
Yves Deswarte
,
Catherine Meadows
,
Dieter Gollmann
HK$633
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
HK$1,534
Networking Security and Standards (The Springer International Series in Engineering and Computer Science)
By
Weidong Kou
Networking Security and Standards (The Springer International Series in Engineering and Computer Science)
By
Weidong Kou
HK$1,300
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
HK$1,437
Emerging Information Security and Applications (Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers (Communications in Computer and Information Science))
By
Weizhi Meng
,
Sokratis K. Katsikas
Emerging Information Security and Applications (Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers (Communications in Computer and Information Science))
By
Weizhi Meng
,
Sokratis K. Katsikas
HK$586
Codes, Cryptology and Information Security (4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings (Lecture Notes in Computer Science))
By
Said El Hajji
,
Sihem Mesnager
,
El Mamoun Souidi
Codes, Cryptology and Information Security (4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings (Lecture Notes in Computer Science))
By
Said El Hajji
,
Sihem Mesnager
,
El Mamoun Souidi
HK$700
Mobile, Secure, and Programmable Networking (9th International Conference, MSPN 2023, Paris, France, October 26–27, 2023, Revised Selected Papers (Lecture Notes in Computer Science))
By
Samia Bouzefrane
,
Soumya Banerjee
,
Fabrice Mourlin
,
Selma Boumerdassi
Mobile, Secure, and Programmable Networking (9th International Conference, MSPN 2023, Paris, France, October 26–27, 2023, Revised Selected Papers (Lecture Notes in Computer Science))
By
Samia Bouzefrane
,
Soumya Banerjee
,
Fabrice Mourlin
,
Selma Boumerdassi
HK$491
Elsewhere
HK$566.16
Save HK$75.16 (13%)
Information and Communication Security (4th International Conference, ICICS 2002, Singapore, December 9-12, 2002 : Proceedings (Lecture Notes in Computer Science))
By
Robert H. Deng
,
Jiaju Zhou
,
Sihan Qing
,
Jianying Zhou
Information and Communication Security (4th International Conference, ICICS 2002, Singapore, December 9-12, 2002 : Proceedings (Lecture Notes in Computer Science))
By
Robert H. Deng
,
Jiaju Zhou
,
Sihan Qing
,
Jianying Zhou
HK$700
Topics in Cryptology -- CT-RSA 2005 (The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Alfred John Menezes
Topics in Cryptology -- CT-RSA 2005 (The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Alfred John Menezes
HK$534
Information Security and Privacy (Third Australasian Conference, ACISP '98, Brisbane, Australia July 13-15, 1998, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Colin Boyd
,
Ed Dawson
Information Security and Privacy (Third Australasian Conference, ACISP '98, Brisbane, Australia July 13-15, 1998, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Colin Boyd
,
Ed Dawson
HK$538
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks (Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings (Lecture Notes in Computer Science))
By
Olivier Markowitch
,
Angelos Bilas
,
Jaap-Henk Hoepman
,
Chris J. Mitchell
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks (Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings (Lecture Notes in Computer Science))
By
Olivier Markowitch
,
Angelos Bilas
,
Jaap-Henk Hoepman
,
Chris J. Mitchell
HK$486
Biometric ID Management and Multimodal Communication (Joint COST 2101 and 2102 International Conference, BioID_MultiComm 2009, Madrid, Spain, September 16-18, 2009, Proceedings (Lecture Notes in Computer Science) (Image Processing, Computer Vision, Pat ..)
By
Julian Fierrez
,
Javier Ortega-Garcia
,
Anna Esposito
,
Andrzej Drygajlo
Biometric ID Management and Multimodal Communication (Joint COST 2101 and 2102 International Conference, BioID_MultiComm 2009, Madrid, Spain, September 16-18, 2009, Proceedings (Lecture Notes in Computer Science) (Image Processing, Computer Vision, Pat ..)
By
Julian Fierrez
,
Javier Ortega-Garcia
,
Anna Esposito
,
Andrzej Drygajlo
HK$532
On the Move to Meaningful Internet Systems (OTM 2009: Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I (Lecture Notes in Computer Science) (Information Systems and Ap ..)
By
Robert Meersman
,
Tharam S. Dillon
,
Pilar Herrero
On the Move to Meaningful Internet Systems (OTM 2009: Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I (Lecture Notes in Computer Science) (Information Systems and Ap ..)
By
Robert Meersman
,
Tharam S. Dillon
,
Pilar Herrero
HK$1,057
Future Generation Information Technology (First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12,2009, Proceedings (Computer Communication Networks and Telecommunications))
By
Young Hoon Lee
,
Dominik Slezak
Future Generation Information Technology (First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12,2009, Proceedings (Computer Communication Networks and Telecommunications))
By
Young Hoon Lee
,
Dominik Slezak
HK$500
Information Systems Security (5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings (Lecture Notes in Computer Science))
By
Atul Prakash
Information Systems Security (5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings (Lecture Notes in Computer Science))
By
Atul Prakash
HK$500
1
2
3
4
Next Page
1
2
3
4
Next Page