0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(25)
Sold By
Sold By
All Sellers
Fishpond
(29)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United States
(15)
Germany
(4)
Switzerland
(3)
United Kingdom
(3)
USA
(1)
Results for "Computer Science For Kids"
Computer Science For Kids
34 results
Filters
Refine By
Category
Category
Networking
(25)
Sold By
Sold By
All Sellers
Fishpond
(29)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United States
(15)
Germany
(4)
Switzerland
(3)
United Kingdom
(3)
USA
(1)
34 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Cryptographic Hardware and Embedded Systems - Ches 2000 (Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Cetin K. Koc
,
Christof Paar
Cryptographic Hardware and Embedded Systems - Ches 2000 (Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Cetin K. Koc
,
Christof Paar
£46.22
Advances in Cryptology - CRYPTO '92 (12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992. Proceedings (Lecture Notes in Computer Science))
By
Ernest F Brickell
Advances in Cryptology - CRYPTO '92 (12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992. Proceedings (Lecture Notes in Computer Science))
By
Ernest F Brickell
£46.30
The Basics of Cyber Safety (Computer and Mobile Device Safety Made Easy)
By
John Sammons
,
Michael Cross
The Basics of Cyber Safety (Computer and Mobile Device Safety Made Easy)
By
John Sammons
,
Michael Cross
£23.75
Detection of Intrusions and Malware, and Vulnerability Assessment (16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Roberto Perdisci
,
Clémentine Maurice
,
Giorgio Giacinto
Detection of Intrusions and Malware, and Vulnerability Assessment (16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Roberto Perdisci
,
Clémentine Maurice
,
Giorgio Giacinto
£65.93
Recent Trends in Image Processing and Pattern Recognition (5th International Conference, RTIP2R 2022, Kingsville, TX, USA, December 1-2, 2022, Revised Selected Papers (Communications in Computer and Information Science))
By
KC Santosh
,
Ayush Goyal
,
Djamila Aouada
Recent Trends in Image Processing and Pattern Recognition (5th International Conference, RTIP2R 2022, Kingsville, TX, USA, December 1-2, 2022, Revised Selected Papers (Communications in Computer and Information Science))
By
KC Santosh
,
Ayush Goyal
,
Djamila Aouada
£69.02
Elsewhere
£79.99
Save £10.97 (14%)
Pervasive Computing (7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009, Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Hideyuki Tokuda
,
Michael Beigl
,
Adrian Friday
,
A.J. Bernheim Brush
Pervasive Computing (7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009, Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Hideyuki Tokuda
,
Michael Beigl
,
Adrian Friday
,
A.J. Bernheim Brush
£46.22
Threat Forecasting (Leveraging Big Data for Predictive Analysis)
By
John Pirc
,
David Desanto
,
Iain Davison
Threat Forecasting (Leveraging Big Data for Predictive Analysis)
By
John Pirc
,
David Desanto
,
Iain Davison
£32.33
Elsewhere
£34.99
Save £2.66 (8%)
Cyber-Safe Kids, Cyber-Savvy Teens (Helping Young People Learn To Use the Internet Safely and Responsibly)
By
Willard, Nancy E.
Cyber-Safe Kids, Cyber-Savvy Teens (Helping Young People Learn To Use the Internet Safely and Responsibly)
By
Willard, Nancy E.
£9.21
Elsewhere
£12.99
Save £3.78 (29%)
18
Cybersecurity for Citizens and Public Officials (Current Writings on Threats and Protection)
By
Joaquin Jay Gonzalez III
,
Roger L. Kemp
Cybersecurity for Citizens and Public Officials (Current Writings on Threats and Protection)
By
Joaquin Jay Gonzalez III
,
Roger L. Kemp
£21.94
Elsewhere
£39.95
Save £18.01 (45%)
Hands-On Penetration Testing on Windows (Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis)
By
Wolf Halton
,
Bo Weaver
Hands-On Penetration Testing on Windows (Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis)
By
Wolf Halton
,
Bo Weaver
£33.85
Elsewhere
£37.99
Save £4.14 (11%)
The Art of Deception (Controlling the Human Element of Security)
By
Kevin D. Mitnick
,
William L. Simon
,
Steve Wozniak
The Art of Deception (Controlling the Human Element of Security)
By
Kevin D. Mitnick
,
William L. Simon
,
Steve Wozniak
£26.60
Elsewhere
£36.00
Save £9.40 (26%)
1
HTML & Xhtml (The Definitive Guide: The Definitive Guide)
By
Musciano, Chuck
,
Kennedy, Bill
HTML & Xhtml (The Definitive Guide: The Definitive Guide)
By
Musciano, Chuck
,
Kennedy, Bill
£30.15
Elsewhere
£39.99
Save £9.84 (25%)
1
From Exposed to Secure (The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe)
By
Featuring Cybersecurity And Compliance Experts From Around The W
From Exposed to Secure (The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe)
By
Featuring Cybersecurity And Compliance Experts From Around The W
£14.45
Privacy in the Age of Big Data (Recognizing Threats, Defending Your Rights, and Protecting Your Family)
By
Theresa Payton
,
Claypoole, Ted, JD, editor and co-author of The Law of Artificia
,
Hon. Howard A. Schmidt
Privacy in the Age of Big Data (Recognizing Threats, Defending Your Rights, and Protecting Your Family)
By
Theresa Payton
,
Claypoole, Ted, JD, editor and co-author of The Law of Artificia
,
Hon. Howard A. Schmidt
£15.98
111
Practical Hive (A Guide to Hadoop's Data Warehouse System: 2016)
By
Scott Shaw
,
Andreas Franocois Vermeulen
,
David Kjerrumgaard
,
Andreas Francois Vermeulen
Practical Hive (A Guide to Hadoop's Data Warehouse System: 2016)
By
Scott Shaw
,
Andreas Franocois Vermeulen
,
David Kjerrumgaard
,
Andreas Francois Vermeulen
£53.32
Snowflake Security (Securing Your Snowflake Data Cloud)
By
Cohen, Yoav
,
Herzberg, Ben
Snowflake Security (Securing Your Snowflake Data Cloud)
By
Cohen, Yoav
,
Herzberg, Ben
£34.97
Elsewhere
£39.99
Save £5.02 (13%)
The Definitive Guide to Security in Jakarta EE (Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More)
By
Tijms, Arjan
,
Bais, Teo
,
Werner Keil
The Definitive Guide to Security in Jakarta EE (Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More)
By
Tijms, Arjan
,
Bais, Teo
,
Werner Keil
£42.64
Elsewhere
£54.99
Save £12.35 (22%)
Surviving the Wild Wild Web (A User’s Playbook to Navigating the Internet's Trickiest Terrains)
By
Marton Gergely
,
Ian Grey
,
Heba Saleous
Surviving the Wild Wild Web (A User’s Playbook to Navigating the Internet's Trickiest Terrains)
By
Marton Gergely
,
Ian Grey
,
Heba Saleous
£28.10
Elsewhere
£29.99
Save £1.89 (6%)
Surviving the Wild Wild Web (A User’s Playbook to Navigating the Internet's Trickiest Terrains)
By
Marton Gergely
,
Ian Grey
,
Heba Saleous
Surviving the Wild Wild Web (A User’s Playbook to Navigating the Internet's Trickiest Terrains)
By
Marton Gergely
,
Ian Grey
,
Heba Saleous
£77.19
Elsewhere
£80.00
Save £2.81 (4%)
Understand the Cyber Attacker Mindset (Build a Strategic Security Programme to Counteract Threats)
By
Armstrong-Smith, Sarah
Understand the Cyber Attacker Mindset (Build a Strategic Security Programme to Counteract Threats)
By
Armstrong-Smith, Sarah
£24.97
Elsewhere
£29.99
Save £5.02 (17%)
Understand the Cyber Attacker Mindset (Build a Strategic Security Programme to Counteract Threats)
By
Armstrong-Smith, Sarah
Understand the Cyber Attacker Mindset (Build a Strategic Security Programme to Counteract Threats)
By
Armstrong-Smith, Sarah
£92.86
Building Robots with LEGO Mindstorms NXT
By
Ferrari, Mario (Author of bestselling "Building Robots with LEGO
,
Ferrari, Guilio (Author of bestselling "Building Robots with LEG
,
David Astolfo
Building Robots with LEGO Mindstorms NXT
By
Ferrari, Mario (Author of bestselling "Building Robots with LEGO
,
Ferrari, Guilio (Author of bestselling "Building Robots with LEG
,
David Astolfo
£28.40
18
1
2
Next Page
1
2
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies