0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Computer Science
Cybernetics
Filters
Sold By
Sold By
All Sellers
Fishpond
(9)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United States
(3)
United Kingdom
(2)
UK
(1)
Results for "Design Reading Program Books"
Design Reading Program Books
16 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(9)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United States
(3)
United Kingdom
(2)
UK
(1)
16 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Techgnosis (Myth, Magic, and Mysticism in the Age of Information)
By
Erik Davis
,
Eugene Thacker
Techgnosis (Myth, Magic, and Mysticism in the Age of Information)
By
Erik Davis
,
Eugene Thacker
£10.84
Elsewhere
£19.99
Save £9.15 (46%)
768
Natural-Born Cyborgs (Minds, Technologies, and the Future of Human Intelligence)
By
Andy Clark
Natural-Born Cyborgs (Minds, Technologies, and the Future of Human Intelligence)
By
Andy Clark
£18.06
380
Sourcebook of Control Systems Engineering
By
Westphal, Louis C.
Sourcebook of Control Systems Engineering
By
Westphal, Louis C.
£178
Introduction to Evolutionary Algorithms (Decision Engineering)
By
Gen, Mitsuo
,
Yu, Xinjie
Introduction to Evolutionary Algorithms (Decision Engineering)
By
Gen, Mitsuo
,
Yu, Xinjie
£147
Cybernetical Intelligence (Engineering Cybernetics with Machine Intelligence)
By
Kelvin K. L. Wong
Cybernetical Intelligence (Engineering Cybernetics with Machine Intelligence)
By
Kelvin K. L. Wong
£95.75
Elsewhere
£107.00
Save £11.25 (11%)
Introduction to Evolutionary Algorithms (Decision Engineering)
By
Yu, Xinjie
,
Gen, Mitsuo
Introduction to Evolutionary Algorithms (Decision Engineering)
By
Yu, Xinjie
,
Gen, Mitsuo
£147
Elsewhere
£159.99
Save £12.99 (8%)
ICT Analysis and Applications (Proceedings of ICT4SD 2024, Volume 3 (Lecture Notes in Networks and Systems))
By
Simon Fong
,
Nilanjan Dey
,
Amit Joshi
ICT Analysis and Applications (Proceedings of ICT4SD 2024, Volume 3 (Lecture Notes in Networks and Systems))
By
Simon Fong
,
Nilanjan Dey
,
Amit Joshi
£183
Elsewhere
£199.99
Save £16.99 (8%)
ICT Analysis and Applications (Proceedings of ICT4SD 2024, Volume 4 (Lecture Notes in Networks and Systems))
By
Simon Fong
,
Nilanjan Dey
,
Amit Joshi
ICT Analysis and Applications (Proceedings of ICT4SD 2024, Volume 4 (Lecture Notes in Networks and Systems))
By
Simon Fong
,
Nilanjan Dey
,
Amit Joshi
£183
Elsewhere
£199.99
Save £16.99 (8%)
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
ICT Analysis and Applications (Proceedings of ICT4SD 2024, Volume 8 (Lecture Notes in Networks and Systems))
By
Simon Fong
,
Nilanjan Dey
,
Amit Joshi
ICT Analysis and Applications (Proceedings of ICT4SD 2024, Volume 8 (Lecture Notes in Networks and Systems))
By
Simon Fong
,
Nilanjan Dey
,
Amit Joshi
Currently
Unavailable
ICT Analysis and Applications (Proceedings of ICT4SD 2023, Volume 2 (Lecture Notes in Networks and Systems))
By
Simon Fong
,
Nilanjan Dey
,
Amit Joshi
ICT Analysis and Applications (Proceedings of ICT4SD 2023, Volume 2 (Lecture Notes in Networks and Systems))
By
Simon Fong
,
Nilanjan Dey
,
Amit Joshi
Currently
Unavailable
ICT Analysis and Applications (Proceedings of ICT4SD 2022 (Lecture Notes in Networks and Systems))
By
Simon Fong
,
Nilanjan Dey
,
Amit Joshi
ICT Analysis and Applications (Proceedings of ICT4SD 2022 (Lecture Notes in Networks and Systems))
By
Simon Fong
,
Nilanjan Dey
,
Amit Joshi
Currently
Unavailable
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies