0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Filters
Refine By
Category
Category
Security
(7)
Networking
(7)
Artificial Intelligence
(5)
Hardware
(4)
Programming
(4)
Computer Science
(4)
General
(2)
Special Topics
(1)
Internet
(1)
Mathematical & Statistical Softw
(1)
Social Aspects
(1)
Graphics & Design
(1)
Sold By
Sold By
All Sellers
Fishpond
(11)
Country
Country
All Countries
United States
(5)
Switzerland
(4)
Germany
(1)
United Kingdom
(1)
Results for "George Cybenko"
George Cybenko
11 results
Filters
Refine By
Category
Category
Security
(7)
Networking
(7)
Artificial Intelligence
(5)
Hardware
(4)
Programming
(4)
Computer Science
(4)
General
(2)
Special Topics
(1)
Internet
(1)
Mathematical & Statistical Softw
(1)
Social Aspects
(1)
Graphics & Design
(1)
Sold By
Sold By
All Sellers
Fishpond
(11)
Country
Country
All Countries
United States
(5)
Switzerland
(4)
Germany
(1)
United Kingdom
(1)
11 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
The Mathematics of Information Coding, Extraction and Distribution (v. 107 (The IMA Volumes in Mathematics and Its Applications))
By
George Cybenko
,
Dianne P. O'Leary
,
Jorma Rissanen
The Mathematics of Information Coding, Extraction and Distribution (v. 107 (The IMA Volumes in Mathematics and Its Applications))
By
George Cybenko
,
Dianne P. O'Leary
,
Jorma Rissanen
HK$900
The Mathematics of Information Coding, Extraction and Distribution (IMA Volumes in Mathematics and its Applications The)
By
George Cybenko
,
Dianne P. O'Leary
,
Jorma Rissanen
The Mathematics of Information Coding, Extraction and Distribution (IMA Volumes in Mathematics and its Applications The)
By
George Cybenko
,
Dianne P. O'Leary
,
Jorma Rissanen
HK$879
Graphical Models for Security (5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers (Security and Cryptology))
By
George Cybenko
,
David Pym
,
Barbara Fila
Graphical Models for Security (5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers (Security and Cryptology))
By
George Cybenko
,
David Pym
,
Barbara Fila
HK$470
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense (Control- and Game-Theoretic Approaches to Cyber Security (Security and Cryptology) (Lecture Notes in Computer Science))
By
Sushil Jajodia
,
George Cybenko
,
Peng Liu
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense (Control- and Game-Theoretic Approaches to Cyber Security (Security and Cryptology) (Lecture Notes in Computer Science))
By
Sushil Jajodia
,
George Cybenko
,
Peng Liu
HK$540
Adaptive Autonomous Secure Cyber Systems
By
Sushil Jajodia
,
George Cybenko
,
V.S. Subrahmanian
,
Vipin Swarup
Adaptive Autonomous Secure Cyber Systems
By
Sushil Jajodia
,
George Cybenko
,
V.S. Subrahmanian
,
Vipin Swarup
HK$1,300
Elsewhere
HK$1,409.67
Save HK$109.67 (8%)
Adaptive Autonomous Secure Cyber Systems
By
Sushil Jajodia
,
George Cybenko
,
V. S. Subrahmanian
Adaptive Autonomous Secure Cyber Systems
By
Sushil Jajodia
,
George Cybenko
,
V. S. Subrahmanian
HK$1,286
Elsewhere
HK$1,414.80
Save HK$128.80 (9%)
Exploiting Software (How to Break Code)
By
Greg Hoglund
,
Gary R. McGraw
,
Aviel D. Rubin
Exploiting Software (How to Break Code)
By
Greg Hoglund
,
Gary R. McGraw
,
Aviel D. Rubin
HK$851
1
Modeling and Design of Secure Internet of Things
By
Charles A. Kamhoua
,
Laurent L. Njilla
,
Alexander Kott
,
Sachin Shetty
Modeling and Design of Secure Internet of Things
By
Charles A. Kamhoua
,
Laurent L. Njilla
,
Alexander Kott
,
Sachin Shetty
HK$1,197
Game Theory and Machine Learning for Cyber Security
By
Kamhoua, Charles A.
,
Kiekintveld, Christopher D.
,
Fei Fang
Game Theory and Machine Learning for Cyber Security
By
Kamhoua, Charles A.
,
Kiekintveld, Christopher D.
,
Fei Fang
HK$1,240
Darkweb Cyber Threat Intelligence Mining
By
John Robertson
,
Ahmad Diab
,
Ericsson Marin
Darkweb Cyber Threat Intelligence Mining
By
John Robertson
,
Ahmad Diab
,
Ericsson Marin
HK$533
Elsewhere
HK$604.09
Save HK$71.09 (12%)
Neural Networks (EURASIP Workshop 1990 Sesimbra, Portugal, February 15-17, 1990. Proceedings (Lecture Notes in Computer Science))
By
Luis B. Almeida
,
Christian J. Wellekens
Neural Networks (EURASIP Workshop 1990 Sesimbra, Portugal, February 15-17, 1990. Proceedings (Lecture Notes in Computer Science))
By
Luis B. Almeida
,
Christian J. Wellekens
HK$450