0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Operating Systems
Filters
Refine By
Category
Category
General
(82)
Windows
(7)
Linux
(5)
Unix
(4)
MacOS
(1)
Sold By
Sold By
All Sellers
Fishpond
(92)
Age Range
Age Range
All Ranges
15+
(16)
All Ages
(3)
Country
Country
All Countries
Germany
(40)
United States
(27)
United Kingdom
(9)
Switzerland
(3)
USA
(2)
More...
Results for "Risk Modeling"
Risk Modeling
124 results
Filters
Refine By
Category
Category
General
(82)
Windows
(7)
Linux
(5)
Unix
(4)
MacOS
(1)
Sold By
Sold By
All Sellers
Fishpond
(92)
Age Range
Age Range
All Ranges
15+
(16)
All Ages
(3)
Country
Country
All Countries
Germany
(40)
United States
(27)
United Kingdom
(9)
Switzerland
(3)
USA
(2)
More...
Related Searches:
correlation risk modeling and management
124 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Data and Applications Security (20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings: v. 20 (Lecture Notes in Computer Science / Information Systems and Applications,)
By
Ernesto Damiani
,
Peng Liu
Data and Applications Security (20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings: v. 20 (Lecture Notes in Computer Science / Information Systems and Applications,)
By
Ernesto Damiani
,
Peng Liu
£50.83
Trust and Privacy in Digital Business (Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Siimone Fischer-Hubner
,
Stevel Furnell
,
Costas Lambrinoudakis
Trust and Privacy in Digital Business (Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Siimone Fischer-Hubner
,
Stevel Furnell
,
Costas Lambrinoudakis
£46.37
Autonomic and Trusted Computing (Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006 (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Laurence Tianruo Yang
,
Hai Jin
,
Theo Ungerer
,
Theo Ungerer
Autonomic and Trusted Computing (Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006 (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Laurence Tianruo Yang
,
Hai Jin
,
Theo Ungerer
,
Theo Ungerer
£91.14
Recent Advances in Intrusion Detection (9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Diego Zamboni
,
Christopher Kruegel
Recent Advances in Intrusion Detection (9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Diego Zamboni
,
Christopher Kruegel
£46.53
Information and Communications Security (Third International Conference, ICICS 2001, Xian China, November 13-16, 2001 Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Tatsuaki Okamoto
,
Jianying Zhou
,
Jianying Zhou
Information and Communications Security (Third International Conference, ICICS 2001, Xian China, November 13-16, 2001 Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Tatsuaki Okamoto
,
Jianying Zhou
,
Jianying Zhou
£46.87
Infrastructure Security (International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings (Lecture Notes in Computer Science))
By
George Davida
,
Yair Frankel
,
Owen Rees
Infrastructure Security (International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings (Lecture Notes in Computer Science))
By
George Davida
,
Yair Frankel
,
Owen Rees
£46.22
Cooperative Design, Visualization, and Engineering (Third International Conference, CDVE 2006, Mallorca, Spain, September 17-20, 2006, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Yuhua Luo
Cooperative Design, Visualization, and Engineering (Third International Conference, CDVE 2006, Mallorca, Spain, September 17-20, 2006, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Yuhua Luo
£46.70
Fault Diagnosis and Tolerance in Cryptography (Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Luca Breveglieri
,
Israel Koren
,
David Naccache
,
Jean-Pierre Seifert
Fault Diagnosis and Tolerance in Cryptography (Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Luca Breveglieri
,
Israel Koren
,
David Naccache
,
Jean-Pierre Seifert
£46.33
Trends in Distributed Systems (CORBA and Beyond: International Workshop TreDS '96 Aachen, Germany, October 1 - 2, 1996; Proceedings (Lecture Notes in Computer Science))
By
Otto Spaniol
,
Claudia Linnhoff-Popien
,
Bernd Meyer
Trends in Distributed Systems (CORBA and Beyond: International Workshop TreDS '96 Aachen, Germany, October 1 - 2, 1996; Proceedings (Lecture Notes in Computer Science))
By
Otto Spaniol
,
Claudia Linnhoff-Popien
,
Bernd Meyer
£46.18
Advanced Information Systems Engineering (11th International Conference, CAiSE'99, Heidelberg, Germany, June 14-18, 1999 : Proceedings (Lecture Notes in Computer Science))
By
Matthias Jarke
,
Andreas Oberweis
Advanced Information Systems Engineering (11th International Conference, CAiSE'99, Heidelberg, Germany, June 14-18, 1999 : Proceedings (Lecture Notes in Computer Science))
By
Matthias Jarke
,
Andreas Oberweis
£46.85
Secure Networking - CQRE (Secure) '99 (International Exhibition and Congress Dusseldorf, Germany, November 30 - December 2, 1999, Proceedings (Lecture Notes in Computer Science))
By
Rainer Baumgart
Secure Networking - CQRE (Secure) '99 (International Exhibition and Congress Dusseldorf, Germany, November 30 - December 2, 1999, Proceedings (Lecture Notes in Computer Science))
By
Rainer Baumgart
£46.22
Cooperative Design, Visualization, and Engineering (4th International Conference, CDVE 2007, Shanghai,China, September 16-20, 2007 (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Yuhua Luo
Cooperative Design, Visualization, and Engineering (4th International Conference, CDVE 2007, Shanghai,China, September 16-20, 2007 (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer Science))
By
Yuhua Luo
£46.24
Formal Aspects in Security and Trust (Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology))
By
Theo Dimitrakos
,
Fabio Martinelli
,
Peter Y. A. Ryan
,
Steve Schneider
Formal Aspects in Security and Trust (Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology))
By
Theo Dimitrakos
,
Fabio Martinelli
,
Peter Y. A. Ryan
,
Steve Schneider
£46.20
Life Cycle Management for Dependability
By
Felix Redmill
,
Chris Dale
,
Chris Dale
Life Cycle Management for Dependability
By
Felix Redmill
,
Chris Dale
,
Chris Dale
£88.49
Secure Data Management (5th Vldb Workshop, Sdm 2008, Auckland, New Zealand, August 24, 2008. Proceedings (Lecture Notes in Computer Science))
By
Willem Jonker
,
Milan Petkovic
Secure Data Management (5th Vldb Workshop, Sdm 2008, Auckland, New Zealand, August 24, 2008. Proceedings (Lecture Notes in Computer Science))
By
Willem Jonker
,
Milan Petkovic
£49.65
Current Trends in Computer Science and Mechanical Automation Vol.1 (Selected Papers from Csma2016)
By
Shawn X Wang
Current Trends in Computer Science and Mechanical Automation Vol.1 (Selected Papers from Csma2016)
By
Shawn X Wang
£158
Elsewhere
£207.00
Save £49.00 (24%)
Engineering Secure Software and Systems (First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Fabio Massacci
,
Samuel T. Redwine
,
Nicola Zannone
Engineering Secure Software and Systems (First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Fabio Massacci
,
Samuel T. Redwine
,
Nicola Zannone
£46.18
Intelligence and Security Informatics (Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Hsinchun Chen
,
Christopher C. Yang
,
Michael Chau
,
Shu-Hsing Li
Intelligence and Security Informatics (Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Hsinchun Chen
,
Christopher C. Yang
,
Michael Chau
,
Shu-Hsing Li
£46.16
Information and Communications Security (11th International Conference, ICICS 2009 (Lecture Notes in Computer Science / Security and Cryptology))
By
Sihan Qing
,
Chris J. Mitchell
,
Guilin Wang
Information and Communications Security (11th International Conference, ICICS 2009 (Lecture Notes in Computer Science / Security and Cryptology))
By
Sihan Qing
,
Chris J. Mitchell
,
Guilin Wang
£91.07
Blockchain and Trustworthy Systems (5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part II (Communications in Computer and Information Science))
By
Jiachi Chen
,
Bin Wen
,
Ting Chen
Blockchain and Trustworthy Systems (5th International Conference, BlockSys 2023, Haikou, China, August 8–10, 2023, Proceedings, Part II (Communications in Computer and Information Science))
By
Jiachi Chen
,
Bin Wen
,
Ting Chen
£65.92
Elsewhere
£69.99
Save £4.07 (6%)
Threat Modeling
By
Frank Swiderski
,
Window Snyder
Threat Modeling
By
Frank Swiderski
,
Window Snyder
Currently
Unavailable
Building Secure Servers with Linux
By
Michael D. Bauer
Building Secure Servers with Linux
By
Michael D. Bauer
25
Currently
Unavailable
Systems Engineering Principles and Practice, Third Edition
By
A Kossiakoff
Systems Engineering Principles and Practice, Third Edition
By
A Kossiakoff
Currently
Unavailable
Service-Oriented Computing (18th Symposium and Summer School, SummerSOC 2024, Crete, Greece, June 24–29, 2024, Revised Selected Papers (Communications in Computer and Information Science))
By
Marco Aiello
,
Johanna Barzen
,
Schahram Dustdar
,
Frank Leymann
Service-Oriented Computing (18th Symposium and Summer School, SummerSOC 2024, Crete, Greece, June 24–29, 2024, Revised Selected Papers (Communications in Computer and Information Science))
By
Marco Aiello
,
Johanna Barzen
,
Schahram Dustdar
,
Frank Leymann
Currently
Unavailable
Previous Page
1
2
3
4
5
6
Next Page
Previous Page
1
2
3
4
5
6
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies