0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Reference & Language
Movies
Music
All Products
\n
Books
Reference & Language
Movies
Music
Reference & La...
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Reference & Language
Filters
Refine By
Category
Category
General
(23)
Yearbooks & Annuals
(22)
Research
(17)
Questions & Answers
(9)
Languages
(8)
Almanacs
(7)
Atlases
(4)
Encyclopedia
(2)
Etiquette
(2)
Dictionaries & Thesauruses
(1)
Survival & Emergency Preparedness
(1)
Personal & Practical Guides
(1)
Handbooks & Manuals
(1)
Bibliographies & Indexes
(1)
Sold By
Sold By
All Sellers
Fishpond
(91)
Age Range
Age Range
All Ranges
15+
(6)
All Ages
(6)
Country
Country
All Countries
United Kingdom
(37)
United States
(35)
Germany
(7)
Netherlands
(5)
Switzerland
(1)
Results for "Networking Protocol"
Networking Protocol
127 results
Filters
Refine By
Category
Category
General
(23)
Yearbooks & Annuals
(22)
Research
(17)
Questions & Answers
(9)
Languages
(8)
Almanacs
(7)
Atlases
(4)
Encyclopedia
(2)
Etiquette
(2)
Dictionaries & Thesauruses
(1)
Survival & Emergency Preparedness
(1)
Personal & Practical Guides
(1)
Handbooks & Manuals
(1)
Bibliographies & Indexes
(1)
Sold By
Sold By
All Sellers
Fishpond
(91)
Age Range
Age Range
All Ranges
15+
(6)
All Ages
(6)
Country
Country
All Countries
United Kingdom
(37)
United States
(35)
Germany
(7)
Netherlands
(5)
Switzerland
(1)
127 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Introduction to Metadata 3e (BIBLIOTHECA PAEDIATRICA REF KARGER)
By
Baca, Murtha
Introduction to Metadata 3e (BIBLIOTHECA PAEDIATRICA REF KARGER)
By
Baca, Murtha
HK$305
Applied Probability-Computer Science (The Interface Volume 1 (Progress in Computer Science and Applied Logic))
By
Disney, Ralph L.
,
Ott, Teunis J.
Applied Probability-Computer Science (The Interface Volume 1 (Progress in Computer Science and Applied Logic))
By
Disney, Ralph L.
,
Ott, Teunis J.
HK$557
Computer-Aided Engineering for Manufacture
By
Milner, Douglas A.
Computer-Aided Engineering for Manufacture
By
Milner, Douglas A.
HK$493
Advances in Cryptology (Proceedings of Crypto 82)
By
David Chaum
Advances in Cryptology (Proceedings of Crypto 82)
By
David Chaum
HK$532
Research Directions in Data and Applications Security
By
Ehud Gudes
,
Sujeet Shenoi
Research Directions in Data and Applications Security
By
Ehud Gudes
,
Sujeet Shenoi
HK$471
Research Directions in Data and Applications Security (IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK (IFIP Advances in Information and Communication Technology))
By
Ehud Gudes
,
Sujeet Shenoi
Research Directions in Data and Applications Security (IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK (IFIP Advances in Information and Communication Technology))
By
Ehud Gudes
,
Sujeet Shenoi
HK$939
Wireless Personal Communications (Emerging Technologies for Enhanced Communications (The Springer International Series in Engineering and Computer Science))
By
William H. Tranter
,
Theodore S. Rappaport
,
Brian D. Woerner
,
Jeffrey H. Reed
Wireless Personal Communications (Emerging Technologies for Enhanced Communications (The Springer International Series in Engineering and Computer Science))
By
William H. Tranter
,
Theodore S. Rappaport
,
Brian D. Woerner
,
Jeffrey H. Reed
HK$1,300
Applications of Social Research Methods to Questions in Information and Library Science, 2nd Edition
By
Barbara M. Wildemuth
Applications of Social Research Methods to Questions in Information and Library Science, 2nd Edition
By
Barbara M. Wildemuth
HK$800
Evidence-Based Practice in Exercise Science (The Six-Step Approach)
By
Amonette, William E.
,
English, Kirk L.
,
William J. Kraemer
Evidence-Based Practice in Exercise Science (The Six-Step Approach)
By
Amonette, William E.
,
English, Kirk L.
,
William J. Kraemer
HK$700
Elsewhere
HK$787.47
Save HK$87.47 (11%)
Mobile Communications (Within the Deepwater Lifelines)
By
Franklin C. Kostenko
Mobile Communications (Within the Deepwater Lifelines)
By
Franklin C. Kostenko
HK$130
Qualitative Dissertation Methodology (A Guide for Research Design and Methods)
By
Nathan Richard Durdella
Qualitative Dissertation Methodology (A Guide for Research Design and Methods)
By
Nathan Richard Durdella
HK$795
Elsewhere
HK$859.06
Save HK$64.06 (7%)
Four Studies on Effects of Environmental Factors on the Quality of National Atmospheric Deposition Program Measurements
By
U. S. Department of the Interior
Four Studies on Effects of Environmental Factors on the Quality of National Atmospheric Deposition Program Measurements
By
U. S. Department of the Interior
HK$150
Nist Special Publication 800-119 (Guidelines for the Secure Deployment of Ipv6)
Nist Special Publication 800-119 (Guidelines for the Secure Deployment of Ipv6)
HK$183
Media Research Methods (Understanding Metric and Interpretive Approaches)
By
Anderson, James A.
Media Research Methods (Understanding Metric and Interpretive Approaches)
By
Anderson, James A.
HK$940
Elsewhere
HK$1,165.86
Save HK$225.86 (19%)
Dictionary of Privacy, Data Protection and Information Security
By
Mark Elliot
,
Anna M. Mandalari
,
Miranda Mourby
,
Kieron O’Hara
Dictionary of Privacy, Data Protection and Information Security
By
Mark Elliot
,
Anna M. Mandalari
,
Miranda Mourby
,
Kieron O’Hara
HK$2,300
Research Directions in Data and Applications Security (16th Annual Ifip Wg 11.3 Conference on Data and Application Security, Held at King's College, Cambridge in July 2002 (IFIP Advances in Information and Communication Technology))
By
Ehud Gudes
,
Sujeet Shenoi
Research Directions in Data and Applications Security (16th Annual Ifip Wg 11.3 Conference on Data and Application Security, Held at King's College, Cambridge in July 2002 (IFIP Advances in Information and Communication Technology))
By
Ehud Gudes
,
Sujeet Shenoi
HK$1,100
Progress on Cryptography (25 Years of Cryptography in China (The Springer International Series in Engineering and Computer Science))
By
Kefei Chen
Progress on Cryptography (25 Years of Cryptography in China (The Springer International Series in Engineering and Computer Science))
By
Kefei Chen
HK$1,040
Teaching and Researching Writing (Applied Linguistics in Action)
By
Ken Hyland
Teaching and Researching Writing (Applied Linguistics in Action)
By
Ken Hyland
HK$1,156
Elsewhere
HK$1,482.89
Save HK$326.89 (22%)
Teaching and Researching Writing (Applied Linguistics in Action)
By
Hyland, Ken
Teaching and Researching Writing (Applied Linguistics in Action)
By
Hyland, Ken
HK$399
Drones in Iot-Enabled Spaces
By
Al-Turjman, Fadi
Drones in Iot-Enabled Spaces
By
Al-Turjman, Fadi
HK$367
Elsewhere
HK$470.33
Save HK$103.33 (22%)
Cybersecurity and Privacy in Cyber Physical Systems
By
Yassine Maleh
,
Mohammad Shojafar
,
Ashraf Darwish
,
Abdelkrim Haqiq
Cybersecurity and Privacy in Cyber Physical Systems
By
Yassine Maleh
,
Mohammad Shojafar
,
Ashraf Darwish
,
Abdelkrim Haqiq
HK$420
Elsewhere
HK$480.56
Save HK$60.56 (13%)
A Dictionary of Social Research Methodology
By
Hammersley, Martyn
A Dictionary of Social Research Methodology
By
Hammersley, Martyn
HK$335
Elsewhere
HK$388.52
Save HK$53.52 (14%)
A Dictionary of Social Research Methodology
By
Hammersley, Martyn
A Dictionary of Social Research Methodology
By
Hammersley, Martyn
HK$1,100
Elsewhere
HK$1,482.89
Save HK$382.89 (26%)
Previous Page
1
2
3
4
5
6
Next Page
Previous Page
1
2
3
4
5
6
Next Page