0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(13)
Logic Design
(1)
Sold By
Sold By
All Sellers
Fishpond
(13)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(11)
Switzerland
(1)
United Kingdom
(1)
Results for "The Code Of Trust"
The Code Of Trust
27 results
Filters
Refine By
Category
Category
General
(13)
Logic Design
(1)
Sold By
Sold By
All Sellers
Fishpond
(13)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(11)
Switzerland
(1)
United Kingdom
(1)
27 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Artificial Intelligence for Cybersecurity (Develop AI approaches to solve cybersecurity problems in your organization)
By
Bojan Kolosnjaji
,
Huang Xiao
,
Peng Xu
Artificial Intelligence for Cybersecurity (Develop AI approaches to solve cybersecurity problems in your organization)
By
Bojan Kolosnjaji
,
Huang Xiao
,
Peng Xu
£34.96
Information Security Practice and Experience (First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Robert H. Deng
,
Feng Bao
,
Hweehwa Pang
,
Jianying Zhou
Information Security Practice and Experience (First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Robert H. Deng
,
Feng Bao
,
Hweehwa Pang
,
Jianying Zhou
£45.02
Computer Network Security (Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings (Lecture Notes in Computer Science) (Com ..)
By
Vladimir Gorodetsky
,
Igor Kotenko
,
Victor Skormin
Computer Network Security (Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings (Lecture Notes in Computer Science) (Com ..)
By
Vladimir Gorodetsky
,
Igor Kotenko
,
Victor Skormin
£45.09
Mobile Ad-hoc and Sensor Networks (Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings (Lecture Notes in Computer Science) (Computer Communication Networks and Telecommunications))
By
Jiannong Cao
,
Ivan Stojmenovic
,
Xiaohua Jia
,
Sajal Kumar Das
Mobile Ad-hoc and Sensor Networks (Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings (Lecture Notes in Computer Science) (Computer Communication Networks and Telecommunications))
By
Jiannong Cao
,
Ivan Stojmenovic
,
Xiaohua Jia
,
Sajal Kumar Das
£89.22
Post-Quantum Cryptography
By
Daniel J. Bernstein
,
Johannes Buchmann
,
Erik Dahmen
Post-Quantum Cryptography
By
Daniel J. Bernstein
,
Johannes Buchmann
,
Erik Dahmen
£118
Elsewhere
£140.50
Save £22.50 (16%)
High Performance Computing - HiPC 2008 (15th International Conference, Bangalore, India, December 17-20, 2008, Proceedings (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
P. Sadayappan
,
Manish Parashar
,
Ramamurthy Badrinath
,
Viktor K. Prasanna
High Performance Computing - HiPC 2008 (15th International Conference, Bangalore, India, December 17-20, 2008, Proceedings (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
P. Sadayappan
,
Manish Parashar
,
Ramamurthy Badrinath
,
Viktor K. Prasanna
£88.79
Formal Methods for Components and Objects (6th International Symposium, FMCO 2007, Amsterdam, the Netherlands, October 24-26, 2007, Revised Lectures (Lecture Notes in Computer Science / Programming and Software Engineering))
By
Willem-Paul de Roever
,
Frank S. de Boer
,
Marcello M. Bonsangue
,
Susanne Graf
Formal Methods for Components and Objects (6th International Symposium, FMCO 2007, Amsterdam, the Netherlands, October 24-26, 2007, Revised Lectures (Lecture Notes in Computer Science / Programming and Software Engineering))
By
Willem-Paul de Roever
,
Frank S. de Boer
,
Marcello M. Bonsangue
,
Susanne Graf
£45.03
Handbook of Biometric Anti-Spoofing (Presentation Attack Detection (Advances in Computer Vision and Pattern Recognition))
By
Sebastien Marcel
,
Mark S. Nixon
,
Julian Fierrez
,
Nicholas Evans
Handbook of Biometric Anti-Spoofing (Presentation Attack Detection (Advances in Computer Vision and Pattern Recognition))
By
Sebastien Marcel
,
Mark S. Nixon
,
Julian Fierrez
,
Nicholas Evans
£108
Elsewhere
£129.99
Save £21.99 (17%)
Formal Methods for Components and Objects (7th International Symposium, FMCO 2008, Sophia Antipolis, France, October 21-23, 2008, State of the Art Survey (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Frank S. de Boer
,
Marcello M. Bonsangue
,
Eric Madelaine
Formal Methods for Components and Objects (7th International Symposium, FMCO 2008, Sophia Antipolis, France, October 21-23, 2008, State of the Art Survey (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Frank S. de Boer
,
Marcello M. Bonsangue
,
Eric Madelaine
£45.02
Stabilization, Safety, and Security of Distributed Systems (11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
Rachid Guerraoui
,
Franck Petit
Stabilization, Safety, and Security of Distributed Systems (11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
Rachid Guerraoui
,
Franck Petit
£89.17
Post-Quantum Cryptography
By
Daniel J. Bernstein
,
Johannes Buchmann
,
Erik Dahmen
Post-Quantum Cryptography
By
Daniel J. Bernstein
,
Johannes Buchmann
,
Erik Dahmen
£108
Elsewhere
£140.50
Save £32.50 (23%)
Theoretical Aspects of Distributed Computing in Sensor Networks (Monographs in Theoretical Computer Science. An EATCS Series)
By
Sotiris Nikoletseas
,
Jose D. P. Rolim
Theoretical Aspects of Distributed Computing in Sensor Networks (Monographs in Theoretical Computer Science. An EATCS Series)
By
Sotiris Nikoletseas
,
Jose D. P. Rolim
£89.46
Formal Methods and Software Engineering (15th International Conference on Formal EngineeringMethods, ICFEM 2013, Queenstown, New Zealand, October 29 - November 1, 2013, Proceedings (Programming and Software Engineering))
By
Lindsay Groves
,
Jing Sun
Formal Methods and Software Engineering (15th International Conference on Formal EngineeringMethods, ICFEM 2013, Queenstown, New Zealand, October 29 - November 1, 2013, Proceedings (Programming and Software Engineering))
By
Lindsay Groves
,
Jing Sun
£45.05
Turbo Coding, Turbo Equalisation and Space–Time Coding for Transmission Over Fading Channels
By
L Hanzo
Turbo Coding, Turbo Equalisation and Space–Time Coding for Transmission Over Fading Channels
By
L Hanzo
Currently
Unavailable
Code (Collaborative Ownership and the Digital Economy (Leonardo Book S.))
By
Rishab Aiyer Ghosh
Code (Collaborative Ownership and the Digital Economy (Leonardo Book S.))
By
Rishab Aiyer Ghosh
Currently
Unavailable
Turbo Coding, Turbo Equalisation and Space-Time Coding (EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels (Wiley - IEEE))
By
Lajos L. Hanzo
,
T. H. Liew
,
B. L. Yeap
Turbo Coding, Turbo Equalisation and Space-Time Coding (EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels (Wiley - IEEE))
By
Lajos L. Hanzo
,
T. H. Liew
,
B. L. Yeap
Currently
Unavailable
Turbo Coding, Turbo Equalisation and Space-Time Coding (EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels (IEEE Press))
By
Lajos Hanzo
,
T. H. Liew
,
B. L. Yeap
,
R. Y. S. Tee
Turbo Coding, Turbo Equalisation and Space-Time Coding (EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels (IEEE Press))
By
Lajos Hanzo
,
T. H. Liew
,
B. L. Yeap
,
R. Y. S. Tee
Currently
Unavailable
Turbo Coding, Turbo Equalisation and Space-Time Coding (EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels (IEEE Press))
By
Lajos Hanzo
,
T. H. Liew
,
B. L. Yeap
,
R. Y. S. Tee
Turbo Coding, Turbo Equalisation and Space-Time Coding (EXIT-Chart-Aided Near-Capacity Designs for Wireless Channels (IEEE Press))
By
Lajos Hanzo
,
T. H. Liew
,
B. L. Yeap
,
R. Y. S. Tee
Currently
Unavailable
Source Code China – The New Global Hub of IT (Information Technology) Outsourcing
By
C Eltschinger
Source Code China – The New Global Hub of IT (Information Technology) Outsourcing
By
C Eltschinger
Currently
Unavailable
Digital Government (Technology and Public Sector Performance)
By
Darrell M. West
Digital Government (Technology and Public Sector Performance)
By
Darrell M. West
Currently
Unavailable
Configuration Management Best Practices (Practical Methods That Work in the Real World (Adobe Reader))
By
Robert Aiello
,
Leslie Sachs
Configuration Management Best Practices (Practical Methods That Work in the Real World (Adobe Reader))
By
Robert Aiello
,
Leslie Sachs
Currently
Unavailable
Dependable Computing (Design and Assessment (Wiley - IEEE))
By
Ravishankar K Iyer
,
Zbigniew T Kalbarczyk
,
Nithin M Nakka
Dependable Computing (Design and Assessment (Wiley - IEEE))
By
Ravishankar K Iyer
,
Zbigniew T Kalbarczyk
,
Nithin M Nakka
Currently
Unavailable
Agent-Based Computational Sociology
By
Flaminio Squazzoni
Agent-Based Computational Sociology
By
Flaminio Squazzoni
Currently
Unavailable
High Performance Computing – Paradigm and Infrastructure
By
LT Yang
High Performance Computing – Paradigm and Infrastructure
By
LT Yang
Currently
Unavailable
1
2
Next Page
1
2
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies