0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Programming
Filters
Refine By
Category
Category
Software Development
(141)
General
(71)
Algorithms
(62)
Systems Design
(24)
Compilers
(22)
Visual Basic
(4)
Object Oriented
(4)
C#
(3)
Java
(3)
CGI
(3)
SQL
(2)
Mac General
(2)
Perl
(1)
PHP
(1)
Python
(1)
HTML
(1)
XML
(1)
Sold By
Sold By
All Sellers
Fishpond
(210)
Age Range
Age Range
All Ranges
10-14
(1)
15+
(210)
All Ages
(90)
Country
Country
All Countries
Germany
(141)
United States
(37)
Switzerland
(27)
Netherlands
(2)
India
(1)
More...
Results for "Web Application Security"
Web Application Security
621 results
Filters
Refine By
Category
Category
Software Development
(141)
General
(71)
Algorithms
(62)
Systems Design
(24)
Compilers
(22)
Visual Basic
(4)
Object Oriented
(4)
C#
(3)
Java
(3)
CGI
(3)
SQL
(2)
Mac General
(2)
Perl
(1)
PHP
(1)
Python
(1)
HTML
(1)
XML
(1)
Sold By
Sold By
All Sellers
Fishpond
(210)
Age Range
Age Range
All Ranges
10-14
(1)
15+
(210)
All Ages
(90)
Country
Country
All Countries
Germany
(141)
United States
(37)
Switzerland
(27)
Netherlands
(2)
India
(1)
More...
621 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Information Security Theory and Practices (Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings (Security and Cryptology) (Lecture Notes in Com ..)
By
Pierangela Samarati
,
Michael Tunstall
,
Joachim Posegga
,
Konstantinos Markantonakis
Information Security Theory and Practices (Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings (Security and Cryptology) (Lecture Notes in Com ..)
By
Pierangela Samarati
,
Michael Tunstall
,
Joachim Posegga
,
Konstantinos Markantonakis
£50.87
Advanced Information Systems Engineering (22nd International Conference, CAiSE 2010, Hammamet, Tunisia, June 7-9, 2010 : Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Barbara Pernici
Advanced Information Systems Engineering (22nd International Conference, CAiSE 2010, Hammamet, Tunisia, June 7-9, 2010 : Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Barbara Pernici
£93.16
Data Warehousing and Knowledge Discovery (14th International Conference, DaWaK 2012, Vienna, Austria, September 3-6, 2012, Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Alfredo Cuzzocrea
,
Umeshwar Dayal
Data Warehousing and Knowledge Discovery (14th International Conference, DaWaK 2012, Vienna, Austria, September 3-6, 2012, Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Alfredo Cuzzocrea
,
Umeshwar Dayal
£45.07
Information and Communication Technologies (18th EUNICE/IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Robert Szabo
,
Attila Vidacs
Information and Communication Technologies (18th EUNICE/IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Robert Szabo
,
Attila Vidacs
£45.04
Computer Information Systems and Industrial Management (11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Agostino Cortesi
,
Nabendu Chaki
,
Khalid Saeed
,
Slawomir Wierzchon
Computer Information Systems and Industrial Management (11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012, Proceedings (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Agostino Cortesi
,
Nabendu Chaki
,
Khalid Saeed
,
Slawomir Wierzchon
£45.05
On the Move to Meaningful Internet Systems: OTM 2012 (Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part I (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Robert Meersman
,
Herve Panetto
,
Tharam Dillon
,
Stefanie Rinderle-Ma
On the Move to Meaningful Internet Systems: OTM 2012 (Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part I (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Robert Meersman
,
Herve Panetto
,
Tharam Dillon
,
Stefanie Rinderle-Ma
£46.15
Microservices (Patterns and Applications: Designing Fine-Grained Services by Applying Patterns)
By
Lucas Krause
Microservices (Patterns and Applications: Designing Fine-Grained Services by Applying Patterns)
By
Lucas Krause
£18.05
Elsewhere
£20.71
Save £2.66 (13%)
90
Getting Started with Spring Framework (A Hands-On Guide to Begin Developing Applications Using Spring Framework)
By
J. Sharma
,
Ashish Sarin
Getting Started with Spring Framework (A Hands-On Guide to Begin Developing Applications Using Spring Framework)
By
J. Sharma
,
Ashish Sarin
£19.58
1
Wireless Algorithms, Systems, and Applications (14th International Conference, WASA 2019, Honolulu, HI, USA, June 24-26, 2019, Proceedings (Theoretical Computer Science and General Issues))
By
Edoardo S. Biagioni
,
Yao Zheng
,
Siyao Cheng
Wireless Algorithms, Systems, and Applications (14th International Conference, WASA 2019, Honolulu, HI, USA, June 24-26, 2019, Proceedings (Theoretical Computer Science and General Issues))
By
Edoardo S. Biagioni
,
Yao Zheng
,
Siyao Cheng
£45.31
Artificial Intelligence and Security (5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV (Security and Cryptology) (Lecture Notes in Computer Science))
By
Xingming Sun
,
Zhaoqing Pan
,
Elisa Bertino
Artificial Intelligence and Security (5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV (Security and Cryptology) (Lecture Notes in Computer Science))
By
Xingming Sun
,
Zhaoqing Pan
,
Elisa Bertino
£45.17
Security@Work [German] (Pragmatische Konzeption und Implementierung von IT-Sicherheit mit Loesungsbeispielen auf Open-Source-Basis (X.systems.press))
By
Jörg Eschweiler
,
Daniel E. Atencio Psille
,
J Rg Eschweiler
Security@Work [German] (Pragmatische Konzeption und Implementierung von IT-Sicherheit mit Loesungsbeispielen auf Open-Source-Basis (X.systems.press))
By
Jörg Eschweiler
,
Daniel E. Atencio Psille
,
J Rg Eschweiler
£16.94
Elsewhere
£17.99
Save £1.05 (6%)
Topics in Cryptology -- CT-RSA 2005 (The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Alfred John Menezes
Topics in Cryptology -- CT-RSA 2005 (The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Alfred John Menezes
£45.01
Formal Techniques for Computer Systems and Business Processes (European Performance Engineering Workshop, EPEW 2005 and International Workshop on Web Services and Formal Methods, WS-FM 2005, Versailles, France, September 1-3, 2005, Proceedings (Theoret ..)
By
Mario Bavetti
,
Leila Kloul
,
Gianluigi Zavattaro
Formal Techniques for Computer Systems and Business Processes (European Performance Engineering Workshop, EPEW 2005 and International Workshop on Web Services and Formal Methods, WS-FM 2005, Versailles, France, September 1-3, 2005, Proceedings (Theoret ..)
By
Mario Bavetti
,
Leila Kloul
,
Gianluigi Zavattaro
£45.53
Advanced Data Mining and Applications (Second International Conference, ADMA 2006, Xi'an, China, August 14-16, 2006, Proceedings (Lecture Notes in Computer Science))
By
Xue Li
,
Osmar R. Zaiane
,
Zhanhuai Li
Advanced Data Mining and Applications (Second International Conference, ADMA 2006, Xi'an, China, August 14-16, 2006, Proceedings (Lecture Notes in Computer Science))
By
Xue Li
,
Osmar R. Zaiane
,
Zhanhuai Li
£89.28
Web Services and Formal Methods (Third International Workshop, WS-FM 2006, Vienna, Austria, September 8-9, 2006, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Mario Bravetti
,
Manuel Núñez
,
Gianluigi Zavattaro
Web Services and Formal Methods (Third International Workshop, WS-FM 2006, Vienna, Austria, September 8-9, 2006, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Mario Bravetti
,
Manuel Núñez
,
Gianluigi Zavattaro
£45.18
Applications and Theory of Petri Nets (29th International Conference, PETRI NETS 2008, Xi'an, China, June 23-27, 2008, Proceedings (Theoretical Computer Science and General Issues))
By
Kees van Hee
,
Rudiger Valk
Applications and Theory of Petri Nets (29th International Conference, PETRI NETS 2008, Xi'an, China, June 23-27, 2008, Proceedings (Theoretical Computer Science and General Issues))
By
Kees van Hee
,
Rudiger Valk
£45.05
Public Key Infrastructure (4th European PKI Workshop - Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Javier Lopez
,
Pierangela Samarati
,
Josep L. Ferrer
Public Key Infrastructure (4th European PKI Workshop - Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Javier Lopez
,
Pierangela Samarati
,
Josep L. Ferrer
£45.02
Web Services and Formal Methods (4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007, Proceedings (Programming and Software Engineering))
By
Marlon Dumas
,
Reiko Heckel
Web Services and Formal Methods (4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007, Proceedings (Programming and Software Engineering))
By
Marlon Dumas
,
Reiko Heckel
£44.99
Information and Communications Security (15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings (Lecture Notes in Computer Science))
By
Sihan Qing
,
Jianying Zhou
,
Dongmei Liu
Information and Communications Security (15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings (Lecture Notes in Computer Science))
By
Sihan Qing
,
Jianying Zhou
,
Dongmei Liu
£45.04
Leveraging Applications of Formal Methods, Verification and Validation (Discussion, Dissemination, Applications: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II (Lecture Notes in Computer Science)
By
Tiziana Margaria
,
Bernhard Steffen
Leveraging Applications of Formal Methods, Verification and Validation (Discussion, Dissemination, Applications: 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II (Lecture Notes in Computer Science)
By
Tiziana Margaria
,
Bernhard Steffen
£45.59
Applied Reconfigurable Computing. Architectures, Tools, and Applications (14th International Symposium, ARC 2018, Santorini, Greece, May 2-4, 2018, Proceedings (Theoretical Computer Science and General Issues))
By
Nikolaos Voros
,
Michael Huebner
,
Georgios Keramidas
,
Diana Goehringer
Applied Reconfigurable Computing. Architectures, Tools, and Applications (14th International Symposium, ARC 2018, Santorini, Greece, May 2-4, 2018, Proceedings (Theoretical Computer Science and General Issues))
By
Nikolaos Voros
,
Michael Huebner
,
Georgios Keramidas
,
Diana Goehringer
£45.54
Engineering Secure Software and Systems (First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Fabio Massacci
,
Samuel T. Redwine
,
Nicola Zannone
Engineering Secure Software and Systems (First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Fabio Massacci
,
Samuel T. Redwine
,
Nicola Zannone
£44.99
Advances in Information Security and Assurance (Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Lecture Notes in Computer Science))
By
James
,
Hsiao-Hwa Chen
,
Mohammed Atiquzzaman
,
Mohammed Atiquzzaman
Advances in Information Security and Assurance (Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Lecture Notes in Computer Science))
By
James
,
Hsiao-Hwa Chen
,
Mohammed Atiquzzaman
,
Mohammed Atiquzzaman
£89.20
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies