0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(190)
Sold By
Sold By
All Sellers
Fishpond
(203)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
Singapore
(48)
United Kingdom
(36)
Switzerland
(34)
United States
(17)
India
(5)
More...
Results for "ACM Books Programming"
ACM Books Programming
287 results
Filters
Refine By
Category
Category
Networking
(190)
Sold By
Sold By
All Sellers
Fishpond
(203)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
Singapore
(48)
United Kingdom
(36)
Switzerland
(34)
United States
(17)
India
(5)
More...
287 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Currently
Unavailable
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Currently
Unavailable
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Harnessing Quantum Cryptography for Next-Generation Security Solutions
By
Nirbhay Kumar Chaubey
,
Neha Chaubey
Currently
Unavailable
Exam Ref SC-300 Microsoft Identity and Access Administrator
By
Razi Rais
,
Ilya Lushnikov
,
Jeevan Bisht
,
Padma Chilakapati
Exam Ref SC-300 Microsoft Identity and Access Administrator
By
Razi Rais
,
Ilya Lushnikov
,
Jeevan Bisht
,
Padma Chilakapati
Currently
Unavailable
Exam Ref SC-300 Microsoft Identity and Access Administrator
By
Razi Rais
,
Ilya Lushnikov
,
Jeevan Bisht
,
Padma Chilakapati
Exam Ref SC-300 Microsoft Identity and Access Administrator
By
Razi Rais
,
Ilya Lushnikov
,
Jeevan Bisht
,
Padma Chilakapati
Currently
Unavailable
Principles of Social Networking (The New Horizon and Emerging Challenges (Smart Innovation, Systems and Technologies))
By
Anupam Biswas
,
Ripon Patgiri
,
Bhaskar Biswas
Principles of Social Networking (The New Horizon and Emerging Challenges (Smart Innovation, Systems and Technologies))
By
Anupam Biswas
,
Ripon Patgiri
,
Bhaskar Biswas
Currently
Unavailable
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Currently
Unavailable
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Currently
Unavailable
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Convergence of Cybersecurity and Cloud Computing (Advances in Information Security, Privacy, and Ethics)
By
J. Avanija
,
Sam Goundar
,
Reddy Madhavi Konduru
Currently
Unavailable
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Currently
Unavailable
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Currently
Unavailable
Emerging Trends in Expert Applications and Security (Proceedings of 2nd ICETEAS 2023, Volume 2 (Lecture Notes in Networks and Systems))
By
Vijay Singh Rathore
,
Vincenzo Piuri
,
Rosalina Babo
Emerging Trends in Expert Applications and Security (Proceedings of 2nd ICETEAS 2023, Volume 2 (Lecture Notes in Networks and Systems))
By
Vijay Singh Rathore
,
Vincenzo Piuri
,
Rosalina Babo
Currently
Unavailable
Data Mining and Information Security (Proceedings of ICDMIS 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Abhishek Bhattacharya
,
Soumi Dutta
,
Sheng-Lung Peng
,
Xin She Yang
Data Mining and Information Security (Proceedings of ICDMIS 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Abhishek Bhattacharya
,
Soumi Dutta
,
Sheng-Lung Peng
,
Xin She Yang
Currently
Unavailable
Proceedings of the Tenth International Conference on Mathematics and Computing (ICMC 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Debasis Giri
,
Jaideep Vaidya
,
S. Ponnusamy
,
Zhiqiang Lin
Proceedings of the Tenth International Conference on Mathematics and Computing (ICMC 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Debasis Giri
,
Jaideep Vaidya
,
S. Ponnusamy
,
Zhiqiang Lin
Currently
Unavailable
Proceedings of International Conference on Frontiers in Computing and Systems (COMSYS 2022 (Lecture Notes in Networks and Systems))
By
Ram Sarkar
,
Sujata Pal
,
Subhadip Basu
,
Dariusz Plewczynski
Proceedings of International Conference on Frontiers in Computing and Systems (COMSYS 2022 (Lecture Notes in Networks and Systems))
By
Ram Sarkar
,
Sujata Pal
,
Subhadip Basu
,
Dariusz Plewczynski
Currently
Unavailable
Software Security Engineering (A Guide for Project Managers)
By
Nancy R. Mead
,
Julia H. Allen
,
Sean Barnum
Software Security Engineering (A Guide for Project Managers)
By
Nancy R. Mead
,
Julia H. Allen
,
Sean Barnum
Currently
Unavailable
Introduction to Computer Security (International Edition)
By
Michael Goodrich
,
Roberto Tamassia
Introduction to Computer Security (International Edition)
By
Michael Goodrich
,
Roberto Tamassia
76
Currently
Unavailable
Proceedings of International Conference on Recent Trends in Computing (ICRTC 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Rajendra Prasad Mahapatra
,
Sudip Roy
,
Pritee Parwekar
Proceedings of International Conference on Recent Trends in Computing (ICRTC 2024, Volume 1 (Lecture Notes in Networks and Systems))
By
Rajendra Prasad Mahapatra
,
Sudip Roy
,
Pritee Parwekar
Currently
Unavailable
Decision Making and Security Risk Management for IoT Environments (Advances in Information Security)
By
Wadii Boulila
,
Jawad Ahmad
,
Anis Koubaa
,
Maha Driss
Decision Making and Security Risk Management for IoT Environments (Advances in Information Security)
By
Wadii Boulila
,
Jawad Ahmad
,
Anis Koubaa
,
Maha Driss
Currently
Unavailable
Data Mining and Information Security (Proceedings of ICDMIS 2024, Volume 2 (Lecture Notes in Networks and Systems))
By
Abhishek Bhattacharya
,
Soumi Dutta
,
Md Abdur Razzak
,
Debabrata Samanta
Data Mining and Information Security (Proceedings of ICDMIS 2024, Volume 2 (Lecture Notes in Networks and Systems))
By
Abhishek Bhattacharya
,
Soumi Dutta
,
Md Abdur Razzak
,
Debabrata Samanta
Currently
Unavailable
Data Mining and Information Security (Proceedings of ICDMIS 2024, Volume 4 (Lecture Notes in Networks and Systems))
By
Soumi Dutta
,
Abhishek Bhattacharya
,
Valentina E. Balas
,
Mohammad Kamrul Hasan
Data Mining and Information Security (Proceedings of ICDMIS 2024, Volume 4 (Lecture Notes in Networks and Systems))
By
Soumi Dutta
,
Abhishek Bhattacharya
,
Valentina E. Balas
,
Mohammad Kamrul Hasan
Currently
Unavailable
Cybersecurity in Knowledge Management (Cyberthreats and Solutions)
By
Narasimha Rao Vajjhala
,
Kenneth David Strang
Cybersecurity in Knowledge Management (Cyberthreats and Solutions)
By
Narasimha Rao Vajjhala
,
Kenneth David Strang
Currently
Unavailable
Cybersecurity in Knowledge Management (Cyberthreats and Solutions)
By
Narasimha Rao Vajjhala
,
Kenneth David Strang
Cybersecurity in Knowledge Management (Cyberthreats and Solutions)
By
Narasimha Rao Vajjhala
,
Kenneth David Strang
Currently
Unavailable
Cyber Security and Intelligent Systems (Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 1 (Lecture Notes in Networks and Systems))
By
Vikrant Bhateja
,
Hong Lin
,
Milan Simic
,
Muhammad Attique Khan
Cyber Security and Intelligent Systems (Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 1 (Lecture Notes in Networks and Systems))
By
Vikrant Bhateja
,
Hong Lin
,
Milan Simic
,
Muhammad Attique Khan
Currently
Unavailable
Previous Page
1
...
7
8
9
10
11
Next Page
Previous Page
1
...
7
8
9
10
11
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies