0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(8)
Sold By
Sold By
All Sellers
Fishpond
(8)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
Switzerland
(4)
Germany
(2)
United States
(1)
Results for "Breakthrough Code"
Breakthrough Code
15 results
Filters
Refine By
Category
Category
Networking
(8)
Sold By
Sold By
All Sellers
Fishpond
(8)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
Switzerland
(4)
Germany
(2)
United States
(1)
15 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Quantum Computing Environments
By
Sitharama S. Iyengar
,
Mario Mastriani
,
Kj Latesh Kumar
Quantum Computing Environments
By
Sitharama S. Iyengar
,
Mario Mastriani
,
Kj Latesh Kumar
£108
Quantum Computing Environments
By
Sitharama S. Iyengar
,
Mario Mastriani
,
KJ Latesh Kumar
Quantum Computing Environments
By
Sitharama S. Iyengar
,
Mario Mastriani
,
KJ Latesh Kumar
£108
AI Embedded Assurance for Cyber Systems
By
Cliff Wang
,
S.S. Iyengar
,
Kun Sun
AI Embedded Assurance for Cyber Systems
By
Cliff Wang
,
S.S. Iyengar
,
Kun Sun
£118
Intelligence and Security Informatics (First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings: v.2665 (Lecture Notes in Computer Science))
By
Hsinchun Chen
,
Richard Miranda
,
Daniel D. Zeng
,
Chris C. Demchak
Intelligence and Security Informatics (First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings: v.2665 (Lecture Notes in Computer Science))
By
Hsinchun Chen
,
Richard Miranda
,
Daniel D. Zeng
,
Chris C. Demchak
£45.57
Smart Grid and Innovative Frontiers in Telecommunications (Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunicatio)
By
Peter Han Joo Chong
,
Boon-Chong Seet
,
Michael Chai
,
Saeed Ur Rehman
Smart Grid and Innovative Frontiers in Telecommunications (Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunicatio)
By
Peter Han Joo Chong
,
Boon-Chong Seet
,
Michael Chai
,
Saeed Ur Rehman
£45.01
Advanced Infocomm Technology (5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papers (Computer Communication Networks and Telecommunications))
By
Vincent Guyot
Advanced Infocomm Technology (5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papers (Computer Communication Networks and Telecommunications))
By
Vincent Guyot
£45.07
Practical Guide to Trusted Computing , A
By
David Challener
,
Kent Yoder
,
Ryan Catherman
Practical Guide to Trusted Computing , A
By
David Challener
,
Kent Yoder
,
Ryan Catherman
Currently
Unavailable
A Short Course on Computer Viruses
By
Frederick B. Cohen
A Short Course on Computer Viruses
By
Frederick B. Cohen
Currently
Unavailable
Cryptography (Theory and Practice, Third Edition (Discrete Mathematics and Its Applications))
By
Douglas R. Stinson
Cryptography (Theory and Practice, Third Edition (Discrete Mathematics and Its Applications))
By
Douglas R. Stinson
1
Currently
Unavailable
Intercept (The Secret History of Computers and Spies)
By
Corera, Gordon
Intercept (The Secret History of Computers and Spies)
By
Corera, Gordon
193
Currently
Unavailable
AI Embedded Assurance for Cyber Systems
By
Cliff Wang
,
S.S. Iyengar
,
Kun Sun
AI Embedded Assurance for Cyber Systems
By
Cliff Wang
,
S.S. Iyengar
,
Kun Sun
Currently
Unavailable
Securing the Borderless Network (Security for the Web 2.0 World)
By
Tom Gillis
Securing the Borderless Network (Security for the Web 2.0 World)
By
Tom Gillis
1
Currently
Unavailable
Securing the Borderless Network (Security for the Web 2.0 World)
By
Tom Gillis
Securing the Borderless Network (Security for the Web 2.0 World)
By
Tom Gillis
Currently
Unavailable
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies