0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(32)
Data Modeling
(4)
Information Theory
(4)
Data Processing
(2)
Logic Design
(2)
Cybernetics
(1)
Sold By
Sold By
All Sellers
Fishpond
(40)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(38)
Switzerland
(1)
United States
(1)
Results for "The Code Of Trust"
The Code Of Trust
49 results
Filters
Refine By
Category
Category
General
(32)
Data Modeling
(4)
Information Theory
(4)
Data Processing
(2)
Logic Design
(2)
Cybernetics
(1)
Sold By
Sold By
All Sellers
Fishpond
(40)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(38)
Switzerland
(1)
United States
(1)
49 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Autonomic and Trusted Computing (4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Bin Xiao
,
Laurence Tianruo Yang
,
Christian Muller-Schloer
,
Christian Muller-Schloer
Autonomic and Trusted Computing (4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Bin Xiao
,
Laurence Tianruo Yang
,
Christian Muller-Schloer
,
Christian Muller-Schloer
£46.33
Human Aspects of Information Security, Privacy, and Trust (Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Information Systems and Applications, incl. Internet/ ..)
By
Theodore Tryfonas
,
Ioannis Askoxylakis
Human Aspects of Information Security, Privacy, and Trust (Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Information Systems and Applications, incl. Internet/ ..)
By
Theodore Tryfonas
,
Ioannis Askoxylakis
£46.24
Denarius - A New World Currency (a Concise Denarius History Book)
By
Christopher P. Thompson
Denarius - A New World Currency (a Concise Denarius History Book)
By
Christopher P. Thompson
£6.86
Experimental and Efficient Algorithms (4th International Workshop, WEA 2005, Santorini Island, Greece, May 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Programming and Software Engineering))
By
Sotiris E. Nikoletseas
Experimental and Efficient Algorithms (4th International Workshop, WEA 2005, Santorini Island, Greece, May 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Programming and Software Engineering))
By
Sotiris E. Nikoletseas
£91.11
Computational Science -- ICCS 2005 (5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part I (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
V. S. Sunderam
,
Geert Dick van Albada
,
Peter M.A. Sloot
,
J. J. Dongarra
Computational Science -- ICCS 2005 (5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part I (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
V. S. Sunderam
,
Geert Dick van Albada
,
Peter M.A. Sloot
,
J. J. Dongarra
£103
Data and Applications Security XIX (19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Com ..)
By
Sushil Jajodia
,
Duminda Wijesekera
Data and Applications Security XIX (19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Com ..)
By
Sushil Jajodia
,
Duminda Wijesekera
£46.14
Communications and Multimedia Security (9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19 - 21, 2005: Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Jana Dittmann
,
Stefan Katzenbeisser
,
Andreas Uhl
Communications and Multimedia Security (9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19 - 21, 2005: Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Jana Dittmann
,
Stefan Katzenbeisser
,
Andreas Uhl
£46.22
Cryptology and Network Security (4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Yongging Li
,
Yvo G. Desmedt
,
Yi Mu
,
Yi Mu
Cryptology and Network Security (4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Yongging Li
,
Yvo G. Desmedt
,
Yi Mu
,
Yi Mu
£46.21
Information and Communications Security (7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Sihan Qing
,
Wenbo Mao
,
Javier Lopez
,
Guilin Wang
Information and Communications Security (7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Sihan Qing
,
Wenbo Mao
,
Javier Lopez
,
Guilin Wang
£46.24
Digital Rights Management (Technologies, Issues, Challenges and Systems (Security and Cryptology) (Lecture Notes in Computer Science))
By
Reihaneh Safavi-Naini
,
Moti Yung
Digital Rights Management (Technologies, Issues, Challenges and Systems (Security and Cryptology) (Lecture Notes in Computer Science))
By
Reihaneh Safavi-Naini
,
Moti Yung
£46.22
Formal Approaches to Agent-Based Systems (Second International Workshop, FAABS 2002, Greenbelt, MD, USA, October 29-31, 2002, Revised Papers (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
Michael G. Hinchey
,
James L. Rash
,
Walter F. Truszkowski
,
Christopher A. Rouff
Formal Approaches to Agent-Based Systems (Second International Workshop, FAABS 2002, Greenbelt, MD, USA, October 29-31, 2002, Revised Papers (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
Michael G. Hinchey
,
James L. Rash
,
Walter F. Truszkowski
,
Christopher A. Rouff
£46.82
On the Move to Meaningful Internet Systems 2006 (CoopIS, DOA, GADA, and ODBASE: OTM Confederated International Conferences, CoopIS, DOA, GADA, and ODBASE 2006, Montpellier, France, October 29 - November 3, 2006, Proceedings, Part II (Information System ..)
By
Robert Meersman
,
Zahir Tari
On the Move to Meaningful Internet Systems 2006 (CoopIS, DOA, GADA, and ODBASE: OTM Confederated International Conferences, CoopIS, DOA, GADA, and ODBASE 2006, Montpellier, France, October 29 - November 3, 2006, Proceedings, Part II (Information System ..)
By
Robert Meersman
,
Zahir Tari
£85.66
Elsewhere
£89.99
Save £4.33 (5%)
Information Security and Cryptology -ICISC 2006 (9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Min Surp Rhee
,
Byoungcheon Lee
Information Security and Cryptology -ICISC 2006 (9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Min Surp Rhee
,
Byoungcheon Lee
£46.24
Cryptology and Network Security (5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
David Pointcheval
,
Yi Mu
,
Kefei Chen
Cryptology and Network Security (5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
David Pointcheval
,
Yi Mu
,
Kefei Chen
£46.19
Universal Access in Human-Computer Interaction. Applications and Services (4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, held as Part of HCi International 2007, Beijing,China, July 22-27, 2007, Proceedings, Pa)
By
Constantine Stephanidis
Universal Access in Human-Computer Interaction. Applications and Services (4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, held as Part of HCi International 2007, Beijing,China, July 22-27, 2007, Proceedings, Pa)
By
Constantine Stephanidis
£91.80
Public Key Infrastructure (4th European PKI Workshop - Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Javier Lopez
,
Pierangela Samarati
,
Josep L. Ferrer
Public Key Infrastructure (4th European PKI Workshop - Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Javier Lopez
,
Pierangela Samarati
,
Josep L. Ferrer
£46.19
Computational Intelligence and Security (International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers (Lecture Notes in Computer Science) (Lecture Notes in Artificial Intelligence))
By
Yunping Wang
,
Yiu-Ming Cheung
,
Hailin Liu
Computational Intelligence and Security (International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers (Lecture Notes in Computer Science) (Lecture Notes in Artificial Intelligence))
By
Yunping Wang
,
Yiu-Ming Cheung
,
Hailin Liu
£132
Computational Science and Its Applications - ICCSA 2007 (International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
Osvaldo Gervasi
,
Marina Gavrilova
Computational Science and Its Applications - ICCSA 2007 (International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
Osvaldo Gervasi
,
Marina Gavrilova
£123
Elsewhere
£129.99
Save £6.99 (5%)
Theoretical Aspects of Computing - ICTAC 2007 (4th International Colloquium, Macau, China, September 26-28, 2007, Proceedings (Lecture Notes in Computer Science))
By
Cliff B. Jones
,
Zhiming Liu
,
Jim Woodcock
Theoretical Aspects of Computing - ICTAC 2007 (4th International Colloquium, Macau, China, September 26-28, 2007, Proceedings (Lecture Notes in Computer Science))
By
Cliff B. Jones
,
Zhiming Liu
,
Jim Woodcock
£46.26
Financial Cryptography and Data Security (11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers (Security and Cryptology) (Lec ..)
By
Sven Dietrich
,
Rachna Dhamija
Financial Cryptography and Data Security (11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers (Security and Cryptology) (Lec ..)
By
Sven Dietrich
,
Rachna Dhamija
£46.20
Computer Performance Engineering (5th European Performance Engineering Workshop, EPEW 2008, Palma de Mallorca, Spain, September 24-25, 2008, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Nigel Thomas
,
Carlos Juiz
Computer Performance Engineering (5th European Performance Engineering Workshop, EPEW 2008, Palma de Mallorca, Spain, September 24-25, 2008, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Nigel Thomas
,
Carlos Juiz
£46.18
Computer Security - ESORICS 2008 (13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Jajodia, Sushil
,
Lopez, Javier
Computer Security - ESORICS 2008 (13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Jajodia, Sushil
,
Lopez, Javier
£46.33
Research in Cryptology (Second Western European Workshop, WEWORC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology))
By
Stefan Lucks
,
Ahmad-Reza Sadeghi
,
Christopher Wolf
Research in Cryptology (Second Western European Workshop, WEWORC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology))
By
Stefan Lucks
,
Ahmad-Reza Sadeghi
,
Christopher Wolf
£46.16
On the Move to Meaningful Internet Systems (OTM 2008: OTM Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008 Proceedings, Part II (Information Systems and Applications, incl. Internet/Web)
By
Robert Meersman
,
Zahir Tari
On the Move to Meaningful Internet Systems (OTM 2008: OTM Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008 Proceedings, Part II (Information Systems and Applications, incl. Internet/Web)
By
Robert Meersman
,
Zahir Tari
£43.65
1
2
3
Next Page
1
2
3
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies