0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Programming
Algorithms
Filters
Sold By
Sold By
All Sellers
Fishpond
(18)
Age Range
Age Range
All Ranges
15+
(2)
Country
Country
All Countries
Germany
(9)
United States
(6)
Switzerland
(3)
Results for "Sushil"
Sushil
19 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(18)
Age Range
Age Range
All Ranges
15+
(2)
Country
Country
All Countries
Germany
(9)
United States
(6)
Switzerland
(3)
19 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Intrusion Detection in Distributed Systems (An Abstraction-Based Approach (Advances in Information Security))
By
Jajodia, Sushil
,
Peng Ning
,
Xiaoyang Sean Wang
Intrusion Detection in Distributed Systems (An Abstraction-Based Approach (Advances in Information Security))
By
Jajodia, Sushil
,
Peng Ning
,
Xiaoyang Sean Wang
£46.15
Applications of Data Mining in Computer Security (Advances in Information Security)
By
Daniel Barbara
,
Sushil Jajodia
Applications of Data Mining in Computer Security (Advances in Information Security)
By
Daniel Barbara
,
Sushil Jajodia
£90.96
Multilevel Secure Transaction Processing (Advances in Database Systems)
By
Vijay Atluri
,
Sushil Jajodia
,
Binto George
Multilevel Secure Transaction Processing (Advances in Database Systems)
By
Vijay Atluri
,
Sushil Jajodia
,
Binto George
£131
Advanced Transaction Models and Architectures
By
Sushil Jajodia
,
Larry Kerschberg
Advanced Transaction Models and Architectures
By
Sushil Jajodia
,
Larry Kerschberg
£131
Integrity and Internal Control in Information Systems (IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 1)
By
Sushil Jajodia
,
William List
,
Graeme W. McGregor
,
Leon A. M. Strous
Integrity and Internal Control in Information Systems (IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 1)
By
Sushil Jajodia
,
William List
,
Graeme W. McGregor
,
Leon A. M. Strous
£165
Elsewhere
£193.00
Save £28.00 (15%)
Moving Target Defense II (Application of Game Theory and Adversarial Modeling (Advances in Information Security))
By
Sushil Jajodia
,
Anup K. Ghosh
,
V. S. Subrahmanian
,
Vipin Swarup
Moving Target Defense II (Application of Game Theory and Adversarial Modeling (Advances in Information Security))
By
Sushil Jajodia
,
Anup K. Ghosh
,
V. S. Subrahmanian
,
Vipin Swarup
£92.30
Data and Applications Security XIX (19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Com ..)
By
Sushil Jajodia
,
Duminda Wijesekera
Data and Applications Security XIX (19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Com ..)
By
Sushil Jajodia
,
Duminda Wijesekera
£46.15
Time Granularities in Databases, Data Mining, and Temporal Reasoning
By
Bettini, Claudio
,
Jajodia, Sushil
,
Sean Wang
Time Granularities in Databases, Data Mining, and Temporal Reasoning
By
Bettini, Claudio
,
Jajodia, Sushil
,
Sean Wang
£46.24
Security and Privacy in Communication Networks (6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Sushil Jajodia
,
Jianying Zhou
Security and Privacy in Communication Networks (6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Sushil Jajodia
,
Jianying Zhou
£91.07
Algorithms (Design and Analysis (De Gruyter Textbook))
By
Sushil C. Dimri
,
Preeti Malik
,
Mangey Ram
Algorithms (Design and Analysis (De Gruyter Textbook))
By
Sushil C. Dimri
,
Preeti Malik
,
Mangey Ram
£44.14
Elsewhere
£53.00
Save £8.86 (17%)
Algorithms (Big Data, Optimization Techniques, Cyber Security (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences))
By
Sushil C. Dimri
,
Abhay Saxena
,
Bhuvan Unhelkar
,
Akshay Kumar
Algorithms (Big Data, Optimization Techniques, Cyber Security (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences))
By
Sushil C. Dimri
,
Abhay Saxena
,
Bhuvan Unhelkar
,
Akshay Kumar
£68.29
Elsewhere
£100.00
Save £31.71 (32%)
Information Systems Security (11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Sushil Jajodia
,
Chandan Mazumdar
Information Systems Security (11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Sushil Jajodia
,
Chandan Mazumdar
£49.39
Graphical Models for Security (Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers (Lecture Notes in Computer Science))
By
Sjouke Mauw
,
Sushil Jajodia
Graphical Models for Security (Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers (Lecture Notes in Computer Science))
By
Sjouke Mauw
,
Sushil Jajodia
£39.86
Theory and Models for Cyber Situation Awareness (Programming and Software Engineering)
By
Peng Liu
,
Sushil Jajodia
,
Cliff Wang
Theory and Models for Cyber Situation Awareness (Programming and Software Engineering)
By
Peng Liu
,
Sushil Jajodia
,
Cliff Wang
£51.27
High Performance Computing -- HiPC 2003 (10th International Conference, Hyderabad, India, December 17-20, 2003, Proceedings (Lecture Notes in Computer Science))
By
Timothy Mark Pinkston
,
Viktor K. Prasanna
High Performance Computing -- HiPC 2003 (10th International Conference, Hyderabad, India, December 17-20, 2003, Proceedings (Lecture Notes in Computer Science))
By
Timothy Mark Pinkston
,
Viktor K. Prasanna
£91.06
High Performance Computing - HiPC 2004 (11th International Conference, Bangalore, India, December 19-22, 2004, Proceedings (Lecture Notes in Computer Science))
By
Luc Bouge
,
Viktor K. Prasanna
High Performance Computing - HiPC 2004 (11th International Conference, Bangalore, India, December 19-22, 2004, Proceedings (Lecture Notes in Computer Science))
By
Luc Bouge
,
Viktor K. Prasanna
£46.29
High Performance Computing – HiPC 2005 (12th International Conference, Goa, India, December 18-21, 2005, Proceedings (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
David A. Bader
,
Manish Parashar
,
V. Sridhar
,
Viktor K. Prasanna
High Performance Computing – HiPC 2005 (12th International Conference, Goa, India, December 18-21, 2005, Proceedings (Lecture Notes in Computer Science) (Theoretical Computer Science and General Issues))
By
David A. Bader
,
Manish Parashar
,
V. Sridhar
,
Viktor K. Prasanna
£46.33
Information and Communication Security (Second International Conference, ICICS '99, Sydney, Australia, November 9-11, 1999, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Vijay Varadharajan
,
Yi Mu
Information and Communication Security (Second International Conference, ICICS '99, Sydney, Australia, November 9-11, 1999, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Vijay Varadharajan
,
Yi Mu
£46.14
Data and Applications Security and Privacy XXIV (24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings (Lecture Notes in Computer Science))
By
Sara Foresti
,
Sushil Jajodia
Data and Applications Security and Privacy XXIV (24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings (Lecture Notes in Computer Science))
By
Sara Foresti
,
Sushil Jajodia
Currently
Unavailable
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies