0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(899)
Information Theory
(240)
Data Processing
(140)
Logic Design
(126)
Data Modeling
(94)
Cybernetics
(90)
Neural Networks
(29)
Natural Language Processing
(26)
Parallel
(8)
Sold By
Sold By
All Sellers
Fishpond
(1,531)
Age Range
Age Range
All Ranges
15+
(190)
All Ages
(43)
Country
Country
All Countries
Germany
(427)
United States
(356)
Switzerland
(260)
United Kingdom
(181)
Singapore
(45)
More...
Results for "Web Application Security"
Web Application Security
2,094 results
Filters
Refine By
Category
Category
General
(899)
Information Theory
(240)
Data Processing
(140)
Logic Design
(126)
Data Modeling
(94)
Cybernetics
(90)
Neural Networks
(29)
Natural Language Processing
(26)
Parallel
(8)
Sold By
Sold By
All Sellers
Fishpond
(1,531)
Age Range
Age Range
All Ranges
15+
(190)
All Ages
(43)
Country
Country
All Countries
Germany
(427)
United States
(356)
Switzerland
(260)
United Kingdom
(181)
Singapore
(45)
More...
2,094 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Smart Log Data Analytics (Techniques for Advanced Security Analysis)
By
Florian Skopik
,
Markus Wurzenberger
,
Max Landauer
Smart Log Data Analytics (Techniques for Advanced Security Analysis)
By
Florian Skopik
,
Markus Wurzenberger
,
Max Landauer
£118
Elsewhere
£129.99
Save £11.99 (9%)
Smart Log Data Analytics (Techniques for Advanced Security Analysis)
By
Florian Skopik
,
Markus Wurzenberger
,
Max Landauer
Smart Log Data Analytics (Techniques for Advanced Security Analysis)
By
Florian Skopik
,
Markus Wurzenberger
,
Max Landauer
£118
Elsewhere
£129.99
Save £11.99 (9%)
Electronic Government and the Information Systems Perspective (10th International Conference, EGOVIS 2021, Virtual Event, September 27–30, 2021, Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, ..)
By
Andrea Kö
,
Enrico Francesconi
,
Gabriele Kotsis
,
A Min Tjoa
Electronic Government and the Information Systems Perspective (10th International Conference, EGOVIS 2021, Virtual Event, September 27–30, 2021, Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, ..)
By
Andrea Kö
,
Enrico Francesconi
,
Gabriele Kotsis
,
A Min Tjoa
£44.98
Privacy, Security and Forensics in the Internet of Things (Iot)
By
Reza Montasari
,
Fiona Carroll
,
Ian Mitchell
Privacy, Security and Forensics in the Internet of Things (Iot)
By
Reza Montasari
,
Fiona Carroll
,
Ian Mitchell
£137
Elsewhere
£159.99
Save £22.99 (14%)
Web Engineering (22nd International Conference, ICWE 2022, Bari, Italy, July 5-8, 2022, Proceedings (Lecture Notes in Computer Science))
By
Tommaso Di Noia
,
In-Young Ko
,
Markus Schedl
,
Carmelo Ardito
Web Engineering (22nd International Conference, ICWE 2022, Bari, Italy, July 5-8, 2022, Proceedings (Lecture Notes in Computer Science))
By
Tommaso Di Noia
,
In-Young Ko
,
Markus Schedl
,
Carmelo Ardito
£69.19
Elsewhere
£74.99
Save £5.80 (8%)
Modern Cryptography (Applied Mathematics for Encryption and Information Security)
By
Easttom, William
Modern Cryptography (Applied Mathematics for Encryption and Information Security)
By
Easttom, William
£45.15
Elsewhere
£49.99
Save £4.84 (10%)
Cyber-Security Threats and Response Models in Nuclear Power Plants (SpringerBriefs in Computer Science)
By
Smidts, Carol
,
Ray, Indrajit
,
Quanyan Zhu
,
Pavan Kumar Vaddi
Cyber-Security Threats and Response Models in Nuclear Power Plants (SpringerBriefs in Computer Science)
By
Smidts, Carol
,
Ray, Indrajit
,
Quanyan Zhu
,
Pavan Kumar Vaddi
£35.47
Elsewhere
£39.99
Save £4.52 (11%)
Security, Trust and Privacy Models, and Architectures in IoT Environments (Internet of Things)
By
Lidia Fotia
,
Fabrizio Messina
,
Domenico Rosaci
,
Giuseppe M.L. Sarne
Security, Trust and Privacy Models, and Architectures in IoT Environments (Internet of Things)
By
Lidia Fotia
,
Fabrizio Messina
,
Domenico Rosaci
,
Giuseppe M.L. Sarne
£147
Elsewhere
£159.99
Save £12.99 (8%)
Securing Electronic Business Processes (Highlights of the Information Security Solutions Europe 2003 Conference)
By
Sachar Paulus
,
Norbert Pohlmann
,
Helmut Reimer
Securing Electronic Business Processes (Highlights of the Information Security Solutions Europe 2003 Conference)
By
Sachar Paulus
,
Norbert Pohlmann
,
Helmut Reimer
£45.01
ISSE 2004 - Securing Electronic Business Processes (Highlights of the Information Security Solutions Europe 2004 Conference: 2004)
By
Sachar Paulus
,
Norbert Pohlmann
,
Helmut Reimer
ISSE 2004 - Securing Electronic Business Processes (Highlights of the Information Security Solutions Europe 2004 Conference: 2004)
By
Sachar Paulus
,
Norbert Pohlmann
,
Helmut Reimer
£45.08
Perspectives on Web Services (Applying SOAP, WSDL, and UDDI to Real-World Projects (Springer Professional Computing))
By
Zimmermann, Olaf
,
Peuser, Stefan
,
Stefan Peuser
Perspectives on Web Services (Applying SOAP, WSDL, and UDDI to Real-World Projects (Springer Professional Computing))
By
Zimmermann, Olaf
,
Peuser, Stefan
,
Stefan Peuser
£45.63
The Semantic Web - ISWC 2003 (Second International Semantic Web Conference, Sanibel Island, FL, USA, October 20-23, 2003, Proceedings (Lecture Notes in Computer Science))
By
Dieter Fensel
,
Katia Sycara
,
John Mylopoulos
The Semantic Web - ISWC 2003 (Second International Semantic Web Conference, Sanibel Island, FL, USA, October 20-23, 2003, Proceedings (Lecture Notes in Computer Science))
By
Dieter Fensel
,
Katia Sycara
,
John Mylopoulos
£89.22
Intelligence and Security Informatics (Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings (Lecture Notes in Computer Science))
By
Hsinchun Chen
,
Reagan Moore
,
Daniel D. Zeng
,
John Leavitt
Intelligence and Security Informatics (Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings (Lecture Notes in Computer Science))
By
Hsinchun Chen
,
Reagan Moore
,
Daniel D. Zeng
,
John Leavitt
£88.72
Web Information Systems -- Wise 2004 (5th International Conference on Web Information Systems Engineering, Brisbane, Australia, November 22-24, 2004, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Xiaofang Zhou
,
Stanley Su
,
Mike P. Papazoglou
,
Maria E. Orlowska
Web Information Systems -- Wise 2004 (5th International Conference on Web Information Systems Engineering, Brisbane, Australia, November 22-24, 2004, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Xiaofang Zhou
,
Stanley Su
,
Mike P. Papazoglou
,
Maria E. Orlowska
£88.96
Information Security Practice and Experience (First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Robert H. Deng
,
Feng Bao
,
Hweehwa Pang
,
Jianying Zhou
Information Security Practice and Experience (First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Robert H. Deng
,
Feng Bao
,
Hweehwa Pang
,
Jianying Zhou
£45.03
Advances in Cryptology – EUROCRYPT 2005 (24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Ronald Cramer
Advances in Cryptology – EUROCRYPT 2005 (24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Ronald Cramer
£89.38
Data Warehousing and Knowledge Discovery (7th International Conference, DaWaK 2005, Copenhagen, Denmark, August 22-26, 2005 ; Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
A. Min Tjoa
,
Juan Trujillo
Data Warehousing and Knowledge Discovery (7th International Conference, DaWaK 2005, Copenhagen, Denmark, August 22-26, 2005 ; Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
A. Min Tjoa
,
Juan Trujillo
£45.11
Secure Data Management (Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Willem Jonker
,
Milan Petkovic
Secure Data Management (Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Willem Jonker
,
Milan Petkovic
£45.18
Cooperative Design, Visualization, and Engineering (Second International Conference, CDVE 2005, Palma de Mallorca, Spain, September 18-21, 2005, Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, ..)
By
Yuhua Luo
Cooperative Design, Visualization, and Engineering (Second International Conference, CDVE 2005, Palma de Mallorca, Spain, September 18-21, 2005, Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, ..)
By
Yuhua Luo
£45.05
Conceptual Modeling (ER 2005 : 24th International Conference on Conceptual Modeling, Klagenfurt, Austria, October 24-28, 2005 : Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Lois Delcambre
,
Christian Kop
,
H. C. Mayr
,
Alvaro de Albornoz
Conceptual Modeling (ER 2005 : 24th International Conference on Conceptual Modeling, Klagenfurt, Austria, October 24-28, 2005 : Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Lois Delcambre
,
Christian Kop
,
H. C. Mayr
,
Alvaro de Albornoz
£45.69
Advances in Multimedia Information Processing - PCM 2005 (6th Pacific Rim Conference on Multimedia, Jeju Island, Korea, November 11-13, 2005, Proceedings, Part I (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Comp ..)
By
Yo-Sung Ho
,
Hyoung Joong Kim
Advances in Multimedia Information Processing - PCM 2005 (6th Pacific Rim Conference on Multimedia, Jeju Island, Korea, November 11-13, 2005, Proceedings, Part I (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Comp ..)
By
Yo-Sung Ho
,
Hyoung Joong Kim
£94.31
Distributed Computing and Internet Technology (Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005 : Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Goutam Chakraborty
Distributed Computing and Internet Technology (Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005 : Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Goutam Chakraborty
£88.80
Information Security Practice and Experience (Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Kafei Chen
,
Robert Deng
,
Xueija Lai
,
Jianying Zhou
Information Security Practice and Experience (Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Kafei Chen
,
Robert Deng
,
Xueija Lai
,
Jianying Zhou
£45.58
Security in Pervasive Computing (Third International Conference, SPC 2006, York, UK, April 18-21, 2006 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
John A. Clark
,
Richard F. Paige
,
Fiona A. C. Polack
,
Phillip J. Brooke
Security in Pervasive Computing (Third International Conference, SPC 2006, York, UK, April 18-21, 2006 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
John A. Clark
,
Richard F. Paige
,
Fiona A. C. Polack
,
Phillip J. Brooke
£45.18
Previous Page
1
...
9
10
11
12
13
14
15
16
17
Next Page
Previous Page
1
...
9
10
11
12
13
14
15
16
17
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies