0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(78)
Sold By
Sold By
All Sellers
Fishpond
(80)
Age Range
Age Range
All Ranges
15+
(11)
All Ages
(3)
Country
Country
All Countries
Germany
(25)
Singapore
(21)
Switzerland
(21)
United States
(7)
India
(2)
More...
Results for "Graph Theory Programming"
Graph Theory Programming
103 results
Filters
Refine By
Category
Category
Networking
(78)
Sold By
Sold By
All Sellers
Fishpond
(80)
Age Range
Age Range
All Ranges
15+
(11)
All Ages
(3)
Country
Country
All Countries
Germany
(25)
Singapore
(21)
Switzerland
(21)
United States
(7)
India
(2)
More...
103 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Applied Math for Security (A Pythonic Introduction to Graph Theory and Computational Geometry)
By
Reilly, Daniel
Applied Math for Security (A Pythonic Introduction to Graph Theory and Computational Geometry)
By
Reilly, Daniel
£29.32
Elsewhere
£47.99
Save £18.67 (39%)
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
£50.30
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
£50.22
Elsewhere
£109.99
Save £59.77 (54%)
Cryptography and Cryptanalysis in MATLAB (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
Cryptography and Cryptanalysis in MATLAB (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
£41.74
Elsewhere
£54.99
Save £13.25 (24%)
Differential Privacy (From Theory to Practice)
By
Ninghui Li
,
Min Lyu
,
Dong Su
Differential Privacy (From Theory to Practice)
By
Ninghui Li
,
Min Lyu
,
Dong Su
£25.75
Elsewhere
£54.99
Save £29.24 (53%)
Machine Learning Safety (Artificial Intelligence (Foundations, Theory, and Algorithms))
By
Huang, Xiaowei
,
Jin, Gaojie
,
Wenjie Ruan
Machine Learning Safety (Artificial Intelligence (Foundations, Theory, and Algorithms))
By
Huang, Xiaowei
,
Jin, Gaojie
,
Wenjie Ruan
£78.19
Computer Performance Engineering (15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Rena Bakhshi
,
Paolo Ballarini
,
Benoît Barbot
,
Hind Castel-Taleb
Computer Performance Engineering (15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Rena Bakhshi
,
Paolo Ballarini
,
Benoît Barbot
,
Hind Castel-Taleb
£46.17
Theory of Cryptography (Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Joe Kilian
Theory of Cryptography (Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Joe Kilian
£91.15
Automata, Languages and Programming: 22nd International Colloquium, ICALP 95, Szeged, Hungary, July 10 - 14, 1995. Proceedings (22nd: International Colloquium, ICALP 95, Szeged, Hungary, July 10-14, 1995 - Proceedings (Lecture Notes in Computer Science))
By
Zoltan Fulop
,
Ferenc Gecseg
Automata, Languages and Programming: 22nd International Colloquium, ICALP 95, Szeged, Hungary, July 10 - 14, 1995. Proceedings (22nd: International Colloquium, ICALP 95, Szeged, Hungary, July 10-14, 1995 - Proceedings (Lecture Notes in Computer Science))
By
Zoltan Fulop
,
Ferenc Gecseg
£91.82
Concurrency and Parallelism, Programming, Networking and Security (Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996 - Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Joxan Jaffar
,
Roland H. C. Yap
Concurrency and Parallelism, Programming, Networking and Security (Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996 - Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Joxan Jaffar
,
Roland H. C. Yap
£46.22
SOFSEM 2016 (Theory and Practice of Computer Science: 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings (Theoretical Computer Science and General Issues))
By
Rusins Martins Freivalds
,
Gregor Engels
,
Barbara Catania
SOFSEM 2016 (Theory and Practice of Computer Science: 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings (Theoretical Computer Science and General Issues))
By
Rusins Martins Freivalds
,
Gregor Engels
,
Barbara Catania
£46.38
Advances in Cryptology – ASIACRYPT 2005 (11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Bimal Kumar Roy
Advances in Cryptology – ASIACRYPT 2005 (11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Bimal Kumar Roy
£46.70
Coding Theory and Applications (2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Proceedings (Lecture Notes in Computer Science))
By
Angela Barbero
Coding Theory and Applications (2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Proceedings (Lecture Notes in Computer Science))
By
Angela Barbero
£49.23
Advances in Cryptology – EUROCRYPT 2013 (32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Thomas Johansson
,
Phong Q. Nguyen
Advances in Cryptology – EUROCRYPT 2013 (32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Thomas Johansson
,
Phong Q. Nguyen
£46.71
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
£132
Hacker's Delight
By
Jr. Warren, Henry S.
Hacker's Delight
By
Jr. Warren, Henry S.
£36.94
Elsewhere
£44.49
Save £7.55 (17%)
1,131
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
£130
Theoretical Cybersecurity (Principles and Advanced Concepts)
By
Oakley, Jacob G.
,
Butler, Michael
,
Wayne York
Theoretical Cybersecurity (Principles and Advanced Concepts)
By
Oakley, Jacob G.
,
Butler, Michael
,
Wayne York
£35.86
Elsewhere
£39.99
Save £4.13 (10%)
Digital Image Security (Techniques and Applications)
By
Amit Kumar Singh
,
Stefano Berretti
,
Ashima Anand
Digital Image Security (Techniques and Applications)
By
Amit Kumar Singh
,
Stefano Berretti
,
Ashima Anand
£120
Elsewhere
£185.00
Save £65.00 (35%)
Critical Infrastructure Security (Assessment, Prevention, Detection, Response)
By
Francesco Flammini
Critical Infrastructure Security (Assessment, Prevention, Detection, Response)
By
Francesco Flammini
£143
Elsewhere
£156.00
Save £13.00 (8%)
Computational Intelligence, Cyber Security and Computational Models (Proceedings of ICC3 2015 (Advances in Intelligent Systems and Computing))
By
Anthony Bonato
,
Muthukrishnan Senthilkumar
,
Vijayalakshmi Ramasamy
,
Shina Sheen
Computational Intelligence, Cyber Security and Computational Models (Proceedings of ICC3 2015 (Advances in Intelligent Systems and Computing))
By
Anthony Bonato
,
Muthukrishnan Senthilkumar
,
Vijayalakshmi Ramasamy
,
Shina Sheen
£211
Elsewhere
£219.99
Save £8.99 (4%)
Proceedings of the International Congress on Information and Communication Technology (ICICT 2015: Volume 2 (Advances in Intelligent Systems and Computing))
By
Suresh Chandra Satapathy
,
Yogesh Chandra Bhatt
,
Amit Joshi
,
Durgesh Kumar Mishra
Proceedings of the International Congress on Information and Communication Technology (ICICT 2015: Volume 2 (Advances in Intelligent Systems and Computing))
By
Suresh Chandra Satapathy
,
Yogesh Chandra Bhatt
,
Amit Joshi
,
Durgesh Kumar Mishra
£182
Advanced Computing and Systems for Security (Volume Four (Advances in Intelligent Systems and Computing))
By
Rituparna Chaki
,
Khalid Saeed
,
Agostino Cortesi
,
Nabendu Chaki
Advanced Computing and Systems for Security (Volume Four (Advances in Intelligent Systems and Computing))
By
Rituparna Chaki
,
Khalid Saeed
,
Agostino Cortesi
,
Nabendu Chaki
£47.33
Advanced Computing and Systems for Security (Volume Three (Advances in Intelligent Systems and Computing))
By
Rituparna Chaki
,
Khalid Saeed
,
Agostino Cortesi
,
Nabendu Chaki
Advanced Computing and Systems for Security (Volume Three (Advances in Intelligent Systems and Computing))
By
Rituparna Chaki
,
Khalid Saeed
,
Agostino Cortesi
,
Nabendu Chaki
£47.51
1
2
3
4
5
Next Page
1
2
3
4
5
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies