0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Networking
Filters
Sold By
Sold By
All Sellers
Fishpond
(187)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
Singapore
(46)
United Kingdom
(35)
Switzerland
(28)
United States
(15)
India
(5)
More...
Results for "ACM Books Programming"
ACM Books Programming
266 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(187)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
Singapore
(46)
United Kingdom
(35)
Switzerland
(28)
United States
(15)
India
(5)
More...
266 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Encyclopedia of Cryptography and Security. 2 Bände
By
Henk C. A. van Tilborg
,
Sushil Jajodia
Encyclopedia of Cryptography and Security. 2 Bände
By
Henk C. A. van Tilborg
,
Sushil Jajodia
Currently
Unavailable
Proceedings of the First International Conference on Intelligent Computing and Communication (Advances in Intelligent Systems and Computing)
By
Jyotsna Kumar Mandal
,
Suresh Chandra Satapathy
,
Manas Kumar Sanyal
,
Vikrant Bhateja
Proceedings of the First International Conference on Intelligent Computing and Communication (Advances in Intelligent Systems and Computing)
By
Jyotsna Kumar Mandal
,
Suresh Chandra Satapathy
,
Manas Kumar Sanyal
,
Vikrant Bhateja
Currently
Unavailable
Computer Security (Principles and Practice)
By
William Stallings
,
Lawrie Brown
Computer Security (Principles and Practice)
By
William Stallings
,
Lawrie Brown
Currently
Unavailable
Emerging Trends in Expert Applications and Security (Proceedings of ICETEAS 2018 (Advances in Intelligent Systems and Computing))
By
Vijay Singh Rathore
,
Marcel Worring
,
Durgesh Kumar Mishra
,
Amit Joshi
Emerging Trends in Expert Applications and Security (Proceedings of ICETEAS 2018 (Advances in Intelligent Systems and Computing))
By
Vijay Singh Rathore
,
Marcel Worring
,
Durgesh Kumar Mishra
,
Amit Joshi
Currently
Unavailable
Proceedings of the Eleventh International Conference on Mathematics and Computing (ICMC 2025, Volume 1 (Lecture Notes in Networks and Systems))
By
Debasis Giri
,
Indrakshi Ray
,
S. Ponnusamy
,
Rakesh M. Verma
Proceedings of the Eleventh International Conference on Mathematics and Computing (ICMC 2025, Volume 1 (Lecture Notes in Networks and Systems))
By
Debasis Giri
,
Indrakshi Ray
,
S. Ponnusamy
,
Rakesh M. Verma
Currently
Unavailable
Encyclopedia of Cryptography, Security and Privacy
By
Sushil Jajodia
,
Pierangela Samarati
,
Moti Yung
Encyclopedia of Cryptography, Security and Privacy
By
Sushil Jajodia
,
Pierangela Samarati
,
Moti Yung
Currently
Unavailable
Information and Communication Technology for Competitive Strategies (ICTCS 2022) (ICT: Applications and Social Interfaces (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
Information and Communication Technology for Competitive Strategies (ICTCS 2022) (ICT: Applications and Social Interfaces (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
Currently
Unavailable
Research Advances in Cloud Computing
By
Sanjay Chaudhary
,
Gaurav Somani
,
Rajkumar Buyya
Research Advances in Cloud Computing
By
Sanjay Chaudhary
,
Gaurav Somani
,
Rajkumar Buyya
Currently
Unavailable
Computer Security (Principles and Practice, Global Edition)
By
William Stallings
,
Lawrie Brown
Computer Security (Principles and Practice, Global Edition)
By
William Stallings
,
Lawrie Brown
Currently
Unavailable
Computer Security (Principles and Practice, Global Edition)
By
William Stallings
,
Lawrie Brown
Computer Security (Principles and Practice, Global Edition)
By
William Stallings
,
Lawrie Brown
Currently
Unavailable
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
By
Sniatala, Pawel
,
Ramani, Sanjeev Kaushik
,
Sanjeev Kaushik Ramani
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
By
Sniatala, Pawel
,
Ramani, Sanjeev Kaushik
,
Sanjeev Kaushik Ramani
Currently
Unavailable
Resilience of Cyber-Physical Systems (From Risk Modelling to Threat Counteraction (Advanced Sciences and Technologies for Security Applications))
By
Francesco Flammini
Resilience of Cyber-Physical Systems (From Risk Modelling to Threat Counteraction (Advanced Sciences and Technologies for Security Applications))
By
Francesco Flammini
Currently
Unavailable
Cyber Deception (Techniques, Strategies, and Human Aspects (Advances in Information Security))
By
Tiffany Bao
,
Milind Tambe
,
Cliff Wang
Cyber Deception (Techniques, Strategies, and Human Aspects (Advances in Information Security))
By
Tiffany Bao
,
Milind Tambe
,
Cliff Wang
Currently
Unavailable
Usable Security (History, Themes, and Challenges (Synthesis Lectures on Information Security, Privacy, and Trust))
By
Simson Garfinkel
,
Heather Richter Lipford
Usable Security (History, Themes, and Challenges (Synthesis Lectures on Information Security, Privacy, and Trust))
By
Simson Garfinkel
,
Heather Richter Lipford
Currently
Unavailable
Defending the Metaverse (Cybersecurity Strategies for the Next Generation Internet (Advances in Cybersecurity Management))
By
Ravi Sheth
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Edeh Michael Onyema
Defending the Metaverse (Cybersecurity Strategies for the Next Generation Internet (Advances in Cybersecurity Management))
By
Ravi Sheth
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Edeh Michael Onyema
Currently
Unavailable
Defending the Metaverse (Cybersecurity Strategies for the Next Generation Internet (Advances in Cybersecurity Management))
By
Ravi Sheth
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Edeh Michael Onyema
Defending the Metaverse (Cybersecurity Strategies for the Next Generation Internet (Advances in Cybersecurity Management))
By
Ravi Sheth
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Edeh Michael Onyema
Currently
Unavailable
ICT: Applications and Social Interfaces (Proceedings of ICTCS 2023, Volume 1 (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
,
S. Kartik
ICT: Applications and Social Interfaces (Proceedings of ICTCS 2023, Volume 1 (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
,
S. Kartik
Currently
Unavailable
Proceedings of Fourth International Conference on Computing and Communication Networks (ICCCN 2024, Volume 3 (Lecture Notes in Networks and Systems))
By
Akshi Kumar
,
Abhishek Swaroop
,
Pancham Shukla
Proceedings of Fourth International Conference on Computing and Communication Networks (ICCCN 2024, Volume 3 (Lecture Notes in Networks and Systems))
By
Akshi Kumar
,
Abhishek Swaroop
,
Pancham Shukla
Currently
Unavailable
Proceedings of Fourth International Conference on Computing and Communication Networks (ICCCN 2024, Volume 5 (Lecture Notes in Networks and Systems))
By
Akshi Kumar
,
Abhishek Swaroop
,
Pancham Shukla
Proceedings of Fourth International Conference on Computing and Communication Networks (ICCCN 2024, Volume 5 (Lecture Notes in Networks and Systems))
By
Akshi Kumar
,
Abhishek Swaroop
,
Pancham Shukla
Currently
Unavailable
Reversible Digital Watermarking (Theory and Practices (Synthesis Lectures on Information Security, Privacy, and Trust))
By
Chakraborty, Rajat Subhra
,
Naskar, Ruchira
Reversible Digital Watermarking (Theory and Practices (Synthesis Lectures on Information Security, Privacy, and Trust))
By
Chakraborty, Rajat Subhra
,
Naskar, Ruchira
Currently
Unavailable
Emerging Trends in Expert Applications and Security (Proceedings of ICE-TEAS 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Vijay Singh Rathore
,
João Manuel R. S. Tavares
,
Eva Tuba
,
Vladan Devedzic
Emerging Trends in Expert Applications and Security (Proceedings of ICE-TEAS 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Vijay Singh Rathore
,
João Manuel R. S. Tavares
,
Eva Tuba
,
Vladan Devedzic
Currently
Unavailable
ICT: Cyber Security and Applications (Proceedings of ICTCS 2023, Volume 3 (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
,
S. Kartik
ICT: Cyber Security and Applications (Proceedings of ICTCS 2023, Volume 3 (Lecture Notes in Networks and Systems))
By
Amit Joshi
,
Mufti Mahmud
,
Roshan G. Ragel
,
S. Kartik
Currently
Unavailable
Emerging Trends in Expert Applications and Security (Proceedings of ICE-TEAS 2024, Volume 2 (Lecture Notes in Networks and Systems))
By
Vijay Singh Rathore
,
Vincenzo Piuri
,
Rosalina Babo
,
Vivek Tiwari
Emerging Trends in Expert Applications and Security (Proceedings of ICE-TEAS 2024, Volume 2 (Lecture Notes in Networks and Systems))
By
Vijay Singh Rathore
,
Vincenzo Piuri
,
Rosalina Babo
,
Vivek Tiwari
Currently
Unavailable
Rising Threats in Expert Applications and Solutions (Proceedings of FICR-TEAS 2020 (Advances in Intelligent Systems and Computing))
By
Vijay Singh Rathore
,
Nilanjan Dey
,
Vincenzo Piuri
Rising Threats in Expert Applications and Solutions (Proceedings of FICR-TEAS 2020 (Advances in Intelligent Systems and Computing))
By
Vijay Singh Rathore
,
Nilanjan Dey
,
Vincenzo Piuri
Currently
Unavailable
Previous Page
1
...
5
6
7
8
9
10
11
Next Page
Previous Page
1
...
5
6
7
8
9
10
11
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies