0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(465)
Sold By
Sold By
All Sellers
Fishpond
(499)
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(4)
Country
Country
All Countries
United Kingdom
(90)
Switzerland
(84)
Singapore
(73)
United States
(58)
Germany
(4)
More...
Results for "Machine Learning Books"
Machine Learning Books
704 results
Filters
Refine By
Category
Category
Networking
(465)
Sold By
Sold By
All Sellers
Fishpond
(499)
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(4)
Country
Country
All Countries
United Kingdom
(90)
Switzerland
(84)
Singapore
(73)
United States
(58)
Germany
(4)
More...
704 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Cyber-Physical Systems (Integrated Computing and Engineering Design)
By
Hu, Fei
Cyber-Physical Systems (Integrated Computing and Engineering Design)
By
Hu, Fei
HK$999
Elsewhere
HK$1,380.63
Save HK$381.63 (28%)
Customer Data and Privacy (The Insights You Need from Harvard Business Review (HBR Insights Series))
By
Harvard Business Review
,
Timothy Morey
,
Andrew Burt
,
Christine Moorman
Customer Data and Privacy (The Insights You Need from Harvard Business Review (HBR Insights Series))
By
Harvard Business Review
,
Timothy Morey
,
Andrew Burt
,
Christine Moorman
HK$287
Elsewhere
HK$337.39
Save HK$50.39 (15%)
From Exposed to Secure (The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe)
By
Featuring Cybersecurity And Compliance Experts From Around The W
From Exposed to Secure (The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe)
By
Featuring Cybersecurity And Compliance Experts From Around The W
HK$133
Plunkett's Cybersecurity, Digital ID & Online Fraud Industry Almanac 2024 (Cybersecurity, Digital ID & Online Fraud Industry Market Research, Statistics, Trends and Leading Companies)
By
Jack W. Plunkett
Plunkett's Cybersecurity, Digital ID & Online Fraud Industry Almanac 2024 (Cybersecurity, Digital ID & Online Fraud Industry Market Research, Statistics, Trends and Leading Companies)
By
Jack W. Plunkett
HK$3,380
Analyzing and Securing Social Networks
By
Thuraisingham, Bhavani
,
Satyen Abrol
,
Raymond Heatherly
,
Murat Kantarcioglu
Analyzing and Securing Social Networks
By
Thuraisingham, Bhavani
,
Satyen Abrol
,
Raymond Heatherly
,
Murat Kantarcioglu
HK$1,158
Elsewhere
HK$1,278.36
Save HK$120.36 (9%)
Practical Hive (A Guide to Hadoop's Data Warehouse System: 2016)
By
Scott Shaw
,
Andreas Franocois Vermeulen
,
David Kjerrumgaard
,
Andreas Francois Vermeulen
Practical Hive (A Guide to Hadoop's Data Warehouse System: 2016)
By
Scott Shaw
,
Andreas Franocois Vermeulen
,
David Kjerrumgaard
,
Andreas Francois Vermeulen
HK$600
Blockchain Basics (A Non-Technical Introduction in 25 Steps)
By
Drescher, Daniel
Blockchain Basics (A Non-Technical Introduction in 25 Steps)
By
Drescher, Daniel
HK$238
Elsewhere
HK$286.25
Save HK$48.25 (17%)
843
Building Digital Experience Platforms (A Guide to Developing Next-Generation Enterprise Applications)
By
Sethii, Sourabhh
,
Shivakumar, Shailesh Kumar
Building Digital Experience Platforms (A Guide to Developing Next-Generation Enterprise Applications)
By
Sethii, Sourabhh
,
Shivakumar, Shailesh Kumar
HK$422
Elsewhere
HK$562.38
Save HK$140.38 (25%)
Privileged Attack Vectors (Building Effective Cyber-Defense Strategies to Protect Organizations)
By
Haber, Morey J.
Privileged Attack Vectors (Building Effective Cyber-Defense Strategies to Protect Organizations)
By
Haber, Morey J.
HK$535
Elsewhere
HK$664.65
Save HK$129.65 (20%)
Building an Anonymization Pipeline (Creating Safe Data)
By
Arbuckle, Luk
,
El Emam, Khaled
Building an Anonymization Pipeline (Creating Safe Data)
By
Arbuckle, Luk
,
El Emam, Khaled
HK$319
Elsewhere
HK$460.11
Save HK$141.11 (31%)
Touchless Fingerprint Biometrics (Series in Security, Privacy and Trust)
By
Ruggero Donida Labati
,
Vincenzo Piuri
,
Fabio Scotti
Touchless Fingerprint Biometrics (Series in Security, Privacy and Trust)
By
Ruggero Donida Labati
,
Vincenzo Piuri
,
Fabio Scotti
HK$1,234
Elsewhere
HK$1,431.77
Save HK$197.77 (14%)
Anti-Spam Techniques Based on Artificial Immune System
By
Tan, Ying
Anti-Spam Techniques Based on Artificial Immune System
By
Tan, Ying
HK$1,400
Elsewhere
HK$1,636.30
Save HK$236.30 (14%)
DDoS Attacks (Evolution, Detection, Prevention, Reaction, and Tolerance)
By
Bhattacharyya, Dhruba Kumar
,
Kalita, Jugal Kumar (University of Colorado, Colorado Springs, U
DDoS Attacks (Evolution, Detection, Prevention, Reaction, and Tolerance)
By
Bhattacharyya, Dhruba Kumar
,
Kalita, Jugal Kumar (University of Colorado, Colorado Springs, U
HK$889
Elsewhere
HK$991.91
Save HK$102.91 (10%)
Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications
By
Saqib Saeed
,
Abdullah M. Almuhaideb
,
Neeraj Kumar
,
Noor Zaman
Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications
By
Saqib Saeed
,
Abdullah M. Almuhaideb
,
Neeraj Kumar
,
Noor Zaman
HK$2,634
Recent Advancements in Multimedia Data Processing and Security (Issues, Challenges, and Techniques)
By
Abd El-Latif, Ahmed A.
,
Ahmad Wani, Mudasir
Recent Advancements in Multimedia Data Processing and Security (Issues, Challenges, and Techniques)
By
Abd El-Latif, Ahmed A.
,
Ahmad Wani, Mudasir
HK$2,372
Elsewhere
HK$2,536.27
Save HK$164.27 (6%)
Advances in Cyberology and the Advent of the Next-Gen Information Revolution
By
Mohd Shahid Husain
,
Mohammad Faisal
,
Halima Sadia
Advances in Cyberology and the Advent of the Next-Gen Information Revolution
By
Mohd Shahid Husain
,
Mohammad Faisal
,
Halima Sadia
HK$1,760
Security Risk Management for the Internet of Things (Technologies and Techniques for IoT Security, Privacy and Data Protection (NowOpen))
By
John Soldatos
Security Risk Management for the Internet of Things (Technologies and Techniques for IoT Security, Privacy and Data Protection (NowOpen))
By
John Soldatos
HK$839
Elsewhere
HK$961.33
Save HK$122.33 (13%)
Cyber-Physical Threat Intelligence for Critical Infrastructures Security (A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures (NowOpen))
By
John Soldatos
,
James Philpot
,
Gabriele Giunta
Cyber-Physical Threat Intelligence for Critical Infrastructures Security (A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures (NowOpen))
By
John Soldatos
,
James Philpot
,
Gabriele Giunta
HK$858
Elsewhere
HK$961.33
Save HK$103.33 (11%)
Cyber-Physical Threat Intelligence for Critical Infrastructures Security (Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry (NowOpen))
By
John Soldatos
,
Isabel Praca
,
Aleksandar Jovanovic
Cyber-Physical Threat Intelligence for Critical Infrastructures Security (Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry (NowOpen))
By
John Soldatos
,
Isabel Praca
,
Aleksandar Jovanovic
HK$1,160
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation (NowOpen)
By
Gohar Sargsyan
,
Dimitrios Kavallieros
,
Nicholas Kolokotronis
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation (NowOpen)
By
Gohar Sargsyan
,
Dimitrios Kavallieros
,
Nicholas Kolokotronis
HK$800
Elsewhere
HK$879.51
Save HK$79.51 (9%)
Algorithms of Armageddon (The Impact of Artificial Intelligence on Future Wars)
By
George Galdorisi
,
Sam J Tangredi USN
Algorithms of Armageddon (The Impact of Artificial Intelligence on Future Wars)
By
George Galdorisi
,
Sam J Tangredi USN
HK$170
Ethical Hacking (A Hands-On Introduction to Breaking in)
By
Graham, Daniel G.
Ethical Hacking (A Hands-On Introduction to Breaking in)
By
Graham, Daniel G.
HK$310
Elsewhere
HK$460.11
Save HK$150.11 (33%)
Our Next Reality (How the AI-Powered Metaverse Will Reshape the World)
By
Graylin, Alvin Wang
,
Rosenberg, Louis
,
Neal Stephenson
Our Next Reality (How the AI-Powered Metaverse Will Reshape the World)
By
Graylin, Alvin Wang
,
Rosenberg, Louis
,
Neal Stephenson
HK$225
Elsewhere
HK$255.57
Save HK$30.57 (12%)
Our Next Reality (How the AI-powered Metaverse Will Reshape the World)
By
Graylin, Alvin Wang
,
Rosenberg, Louis
,
Neal Stephenson
Our Next Reality (How the AI-powered Metaverse Will Reshape the World)
By
Graylin, Alvin Wang
,
Rosenberg, Louis
,
Neal Stephenson
HK$180
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page