0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(204)
Information Theory
(61)
Data Modeling
(24)
Data Processing
(21)
Logic Design
(20)
Cybernetics
(18)
Neural Networks
(10)
Natural Language Processing
(7)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(340)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(108)
United States
(76)
Switzerland
(56)
United Kingdom
(38)
Singapore
(10)
More...
Results for "The Code Of Trust"
The Code Of Trust
408 results
Filters
Refine By
Category
Category
General
(204)
Information Theory
(61)
Data Modeling
(24)
Data Processing
(21)
Logic Design
(20)
Cybernetics
(18)
Neural Networks
(10)
Natural Language Processing
(7)
Parallel
(2)
Sold By
Sold By
All Sellers
Fishpond
(340)
Age Range
Age Range
All Ranges
15+
(40)
All Ages
(13)
Country
Country
All Countries
Germany
(108)
United States
(76)
Switzerland
(56)
United Kingdom
(38)
Singapore
(10)
More...
408 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Progress in Cryptology (INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : Proceedings (Lecture Notes in Computer Science))
By
Alfred Menezes
,
Palash Sarkar
Progress in Cryptology (INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : Proceedings (Lecture Notes in Computer Science))
By
Alfred Menezes
,
Palash Sarkar
£46.70
Computer Safety, Reliability, and Security (22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003 : Proceedings (Lecture Notes in Computer Science))
By
Stuart Anderson
,
Massimo Felici
,
Bev Littlewood
Computer Safety, Reliability, and Security (22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003 : Proceedings (Lecture Notes in Computer Science))
By
Stuart Anderson
,
Massimo Felici
,
Bev Littlewood
£45.03
Information and Communications Security (5th International Conference, Icics 2003, Huhehaote, China, October 10-13, 2003, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Petra Perner
,
Dieter Gollmann
,
Jianying Zhou
,
Petra Perner
Information and Communications Security (5th International Conference, Icics 2003, Huhehaote, China, October 10-13, 2003, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Petra Perner
,
Dieter Gollmann
,
Jianying Zhou
,
Petra Perner
£45.02
Information Security (6th International Conference, Isc 2003, Bristol, UK, October 1-3, 2003, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Colin Boyd
,
Wenbo Mao
Information Security (6th International Conference, Isc 2003, Bristol, UK, October 1-3, 2003, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Colin Boyd
,
Wenbo Mao
£45.03
Information Security Applications (4th International Workshop, Wisa 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Kijoon Chae
,
Moti Yung
Information Security Applications (4th International Workshop, Wisa 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Kijoon Chae
,
Moti Yung
£88.69
Information Security and Privacy (9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : Proceedings (Lecture Notes in Computer Science))
By
Huaxiong Wang
,
Josef Pieprzyk
,
Vijay Varadharajan
Information Security and Privacy (9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : Proceedings (Lecture Notes in Computer Science))
By
Huaxiong Wang
,
Josef Pieprzyk
,
Vijay Varadharajan
£89.48
Network and Parallel Computing (IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004. Proceedings (Lecture Notes in Computer Science))
By
Hai Jin
,
Guangrong Gao
,
Zhiwei Xu
,
Hao Chen
Network and Parallel Computing (IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004. Proceedings (Lecture Notes in Computer Science))
By
Hai Jin
,
Guangrong Gao
,
Zhiwei Xu
,
Hao Chen
£88.89
Information Security Practice and Experience (First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Robert H. Deng
,
Feng Bao
,
Hweehwa Pang
,
Jianying Zhou
Information Security Practice and Experience (First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Robert H. Deng
,
Feng Bao
,
Hweehwa Pang
,
Jianying Zhou
£45.02
Experimental and Efficient Algorithms (4th International Workshop, WEA 2005, Santorini Island, Greece, May 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Programming and Software Engineering))
By
Sotiris E. Nikoletseas
Experimental and Efficient Algorithms (4th International Workshop, WEA 2005, Santorini Island, Greece, May 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Programming and Software Engineering))
By
Sotiris E. Nikoletseas
£88.77
Computational Science -- ICCS 2005 (5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part I (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
V. S. Sunderam
,
Geert Dick van Albada
,
Peter M.A. Sloot
,
J. J. Dongarra
Computational Science -- ICCS 2005 (5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part I (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
V. S. Sunderam
,
Geert Dick van Albada
,
Peter M.A. Sloot
,
J. J. Dongarra
£104
Data and Applications Security XIX (19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Com ..)
By
Sushil Jajodia
,
Duminda Wijesekera
Data and Applications Security XIX (19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Com ..)
By
Sushil Jajodia
,
Duminda Wijesekera
£44.97
Database and Expert Systems Applications (16th International Conference, DEXA 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Kim V. Andersen
,
John Debenham
,
Roland Wagner
Database and Expert Systems Applications (16th International Conference, DEXA 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Kim V. Andersen
,
John Debenham
,
Roland Wagner
£101
Communications and Multimedia Security (9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19 - 21, 2005: Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Jana Dittmann
,
Stefan Katzenbeisser
,
Andreas Uhl
Communications and Multimedia Security (9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19 - 21, 2005: Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Jana Dittmann
,
Stefan Katzenbeisser
,
Andreas Uhl
£45.04
Computer Network Security (Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings (Lecture Notes in Computer Science) (Com ..)
By
Vladimir Gorodetsky
,
Igor Kotenko
,
Victor Skormin
Computer Network Security (Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings (Lecture Notes in Computer Science) (Com ..)
By
Vladimir Gorodetsky
,
Igor Kotenko
,
Victor Skormin
£45.09
Cryptology and Network Security (4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Yongging Li
,
Yvo G. Desmedt
,
Yi Mu
,
Yi Mu
Cryptology and Network Security (4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Yongging Li
,
Yvo G. Desmedt
,
Yi Mu
,
Yi Mu
£45.03
Mobile Ad-Hoc and Sensor Networks (First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005 : Proceedings (Lecture Notes in Computer Science / Computer Communication Networks and Telecommunications))
By
Xiaohua Jia
,
Jie Wu
,
Yanxiang He
Mobile Ad-Hoc and Sensor Networks (First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005 : Proceedings (Lecture Notes in Computer Science / Computer Communication Networks and Telecommunications))
By
Xiaohua Jia
,
Jie Wu
,
Yanxiang He
£129
Information and Communications Security (7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Sihan Qing
,
Wenbo Mao
,
Javier Lopez
,
Guilin Wang
Information and Communications Security (7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Sihan Qing
,
Wenbo Mao
,
Javier Lopez
,
Guilin Wang
£45.07
Digital Rights Management (Technologies, Issues, Challenges and Systems (Security and Cryptology) (Lecture Notes in Computer Science))
By
Reihaneh Safavi-Naini
,
Moti Yung
Digital Rights Management (Technologies, Issues, Challenges and Systems (Security and Cryptology) (Lecture Notes in Computer Science))
By
Reihaneh Safavi-Naini
,
Moti Yung
£45.04
Wireless Algorithms, Systems, and Applications (First International Conference, Wasa 2006, XI'an, China, August 15-17, 2006, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Xiuzhen Cheng
,
Wei Li
,
Taieb Znati
Wireless Algorithms, Systems, and Applications (First International Conference, Wasa 2006, XI'an, China, August 15-17, 2006, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Xiuzhen Cheng
,
Wei Li
,
Taieb Znati
£88.93
High Performance Computing and Communications (Second International Conference, HPCC 2006, Munich, Germany, September 13-15, 2006, Proceedings (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues))
By
Michael Gerndt
,
Dieter Kranzlmuller
High Performance Computing and Communications (Second International Conference, HPCC 2006, Munich, Germany, September 13-15, 2006, Proceedings (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues))
By
Michael Gerndt
,
Dieter Kranzlmuller
£101
Formal Approaches to Agent-Based Systems (Second International Workshop, FAABS 2002, Greenbelt, MD, USA, October 29-31, 2002, Revised Papers (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
Michael G. Hinchey
,
James L. Rash
,
Walter F. Truszkowski
,
Christopher A. Rouff
Formal Approaches to Agent-Based Systems (Second International Workshop, FAABS 2002, Greenbelt, MD, USA, October 29-31, 2002, Revised Papers (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
Michael G. Hinchey
,
James L. Rash
,
Walter F. Truszkowski
,
Christopher A. Rouff
£45.66
Modular Programming Languages (Joint Modular Languages Conference, JMLC 2003, Klagenfurt, Austria, August 25-27, 2003, Proceedings (Lecture Notes in Computer Science))
By
Laszlo Boszormenyi
,
Peter Schojer
Modular Programming Languages (Joint Modular Languages Conference, JMLC 2003, Klagenfurt, Austria, August 25-27, 2003, Proceedings (Lecture Notes in Computer Science))
By
Laszlo Boszormenyi
,
Peter Schojer
£44.92
Information Security and Privacy (6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001. Proceedings: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001.Proceedings (Lecture Notes in Computer Science / Lect)
By
Vijay Varadharajan
,
Yi Mu
Information Security and Privacy (6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001. Proceedings: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001.Proceedings (Lecture Notes in Computer Science / Lect)
By
Vijay Varadharajan
,
Yi Mu
£45.09
Information and Communications Security (Third International Conference, ICICS 2001, Xian China, November 13-16, 2001 Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Tatsuaki Okamoto
,
Jianying Zhou
,
Jianying Zhou
Information and Communications Security (Third International Conference, ICICS 2001, Xian China, November 13-16, 2001 Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Tatsuaki Okamoto
,
Jianying Zhou
,
Jianying Zhou
£45.68
Previous Page
1
...
6
7
8
9
10
11
12
13
14
Next Page
Previous Page
1
...
6
7
8
9
10
11
12
13
14
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies