0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(567)
Sold By
Sold By
All Sellers
Fishpond
(595)
Age Range
Age Range
All Ranges
15+
(18)
All Ages
(16)
Country
Country
All Countries
United States
(186)
United Kingdom
(139)
Switzerland
(64)
Germany
(48)
Singapore
(32)
More...
Results for "S R"
S R
812 results
Filters
Refine By
Category
Category
Networking
(567)
Sold By
Sold By
All Sellers
Fishpond
(595)
Age Range
Age Range
All Ranges
15+
(18)
All Ages
(16)
Country
Country
All Countries
United States
(186)
United Kingdom
(139)
Switzerland
(64)
Germany
(48)
Singapore
(32)
More...
Related Searches:
s r b
r s mani
g r s
r s khurmi
s.r. nathan
r s salaria
r s berndt
r s sedha
812 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Computer Security and Encryption (An Introduction)
By
Chauhan, S. R.
,
Jangra, S.
Computer Security and Encryption (An Introduction)
By
Chauhan, S. R.
,
Jangra, S.
£36.76
Elsewhere
£49.95
Save £13.19 (26%)
Reverse Deception Organized Cyber Threat Counter-Exploitation (Networking & Communication - OMG)
By
Sean M. Bodmer
,
Dr Max Kilger
,
Gregory S. Carpenter
,
Jeff R. Jones
Reverse Deception Organized Cyber Threat Counter-Exploitation (Networking & Communication - OMG)
By
Sean M. Bodmer
,
Dr Max Kilger
,
Gregory S. Carpenter
,
Jeff R. Jones
£35.84
1
Theoretical and Experimental Methods for Defending Against DDoS Attacks
By
I. S. Amiri
,
M. R. K. Soltanian
Theoretical and Experimental Methods for Defending Against DDoS Attacks
By
I. S. Amiri
,
M. R. K. Soltanian
£42.56
Elsewhere
£47.99
Save £5.43 (11%)
Cloud Security (Attacks, Techniques, Tools, and Challenges)
By
Mishra, Preeti
,
Pilli, Emmanuel S
,
R. C. Joshi
Cloud Security (Attacks, Techniques, Tools, and Challenges)
By
Mishra, Preeti
,
Pilli, Emmanuel S
,
R. C. Joshi
£105
Elsewhere
£125.00
Save £20.00 (16%)
Handbook of E-Business Security
By
João Manuel R.S. Tavares
,
Brojo Kishore Mishra
,
Raghvendra Kumar
,
Noor Zaman
Handbook of E-Business Security
By
João Manuel R.S. Tavares
,
Brojo Kishore Mishra
,
Raghvendra Kumar
,
Noor Zaman
£42.30
Elsewhere
£44.99
Save £2.69 (6%)
Neuroimmunology of Sleep
By
S. R. Pandi-Perumal
,
Daniel P. Cardinali
,
Georgios Chrousos
Neuroimmunology of Sleep
By
S. R. Pandi-Perumal
,
Daniel P. Cardinali
,
Georgios Chrousos
£157
Wireless Multimedia Communication Systems (Design, Analysis, and Implementation)
By
K.R. Rao
,
Zoran S. Bojkovic
,
Bojan M. Bakmaz
Wireless Multimedia Communication Systems (Design, Analysis, and Implementation)
By
K.R. Rao
,
Zoran S. Bojkovic
,
Bojan M. Bakmaz
£109
Handbook of e-Business Security
By
Joao Manuel R.S. Tavares
,
Brojo Kishore Mishra
,
Raghvendra Kumar
,
Noor Zaman
Handbook of e-Business Security
By
Joao Manuel R.S. Tavares
,
Brojo Kishore Mishra
,
Raghvendra Kumar
,
Noor Zaman
£98.28
Elsewhere
£110.00
Save £11.72 (11%)
Neuroimmunology of Sleep
By
S. R. Pandi-Perumal
,
Daniel P. Cardinali
,
Georgios Chrousos
Neuroimmunology of Sleep
By
S. R. Pandi-Perumal
,
Daniel P. Cardinali
,
Georgios Chrousos
£157
Wireless Multimedia Communication Systems (Design, Analysis, and Implementation)
By
Rao, K. R.
,
Bojkovic, Zoran S.
,
Bojan M. Bakmaz
Wireless Multimedia Communication Systems (Design, Analysis, and Implementation)
By
Rao, K. R.
,
Bojkovic, Zoran S.
,
Bojan M. Bakmaz
£163
Corporate Defense and the Value Preservation Imperative (Bulletproof Your Corporate Defense Program (Internal Audit and IT Audit))
By
Lyons, Sean
Corporate Defense and the Value Preservation Imperative (Bulletproof Your Corporate Defense Program (Internal Audit and IT Audit))
By
Lyons, Sean
£66.16
Elsewhere
£78.99
Save £12.83 (16%)
Cyber Security 51 Handy Things to Know about Cyber Attacks (From the First Cyber Attack in 1988 to the Wannacry Ransomware 2017. Tips and Signs to Protect Your Hardaware and Software)
By
S R Tabone
,
Ahmed Arifur Rahman
Cyber Security 51 Handy Things to Know about Cyber Attacks (From the First Cyber Attack in 1988 to the Wannacry Ransomware 2017. Tips and Signs to Protect Your Hardaware and Software)
By
S R Tabone
,
Ahmed Arifur Rahman
£16.79
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics
By
Jena Om Prakash
,
H.L. Gururaj
,
M. R. Pooja
,
S.P. Pavan Kumar
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics
By
Jena Om Prakash
,
H.L. Gururaj
,
M. R. Pooja
,
S.P. Pavan Kumar
£176
Elsewhere
£238.00
Save £62.00 (26%)
Privacy and Security Challenges in Cloud Computing (A Holistic Approach (Cognitive Approaches in Cloud and Edge Computing.))
By
T. Ananth Kumar
,
T. S. Arun Samuel
,
R. Dinesh Jackson Samuel
,
M. Niranjanamurthy
Privacy and Security Challenges in Cloud Computing (A Holistic Approach (Cognitive Approaches in Cloud and Edge Computing.))
By
T. Ananth Kumar
,
T. S. Arun Samuel
,
R. Dinesh Jackson Samuel
,
M. Niranjanamurthy
£102
Elsewhere
£130.00
Save £28.00 (22%)
Privacy and Security Challenges in Cloud Computing (A Holistic Approach (Cognitive Approaches in Cloud and Edge Computing.))
By
T. Ananth Kumar
,
T. S. Arun Samuel
,
R. Dinesh Jackson Samuel
,
M. Niranjanamurthy
Privacy and Security Challenges in Cloud Computing (A Holistic Approach (Cognitive Approaches in Cloud and Edge Computing.))
By
T. Ananth Kumar
,
T. S. Arun Samuel
,
R. Dinesh Jackson Samuel
,
M. Niranjanamurthy
£33.51
Elsewhere
£45.99
Save £12.48 (27%)
Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT
By
Venugopal K. R.
,
Roopa M. S.
,
Santosh Pattar
Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT
By
Venugopal K. R.
,
Roopa M. S.
,
Santosh Pattar
£114
Elsewhere
£145.00
Save £31.00 (21%)
Locking the Cookie Jar (How to Protect Against Embezzlement, Identity Theft, and Hackers)
By
R Scott Alvord
,
Kyler S Alvord
Locking the Cookie Jar (How to Protect Against Embezzlement, Identity Theft, and Hackers)
By
R Scott Alvord
,
Kyler S Alvord
£18.05
Privacy and Security Challenges in Location Aware Computing
By
P. Shanthi Saravanan
,
S. R. Balasundaram
Privacy and Security Challenges in Location Aware Computing
By
P. Shanthi Saravanan
,
S. R. Balasundaram
£158
Elsewhere
£213.00
Save £55.00 (26%)
Privacy and Security Challenges in Location Aware Computing
By
P. Shanthi Saravanan
,
S. R. Balasundaram
Privacy and Security Challenges in Location Aware Computing
By
P. Shanthi Saravanan
,
S. R. Balasundaram
£120
Elsewhere
£164.00
Save £44.00 (27%)
Computational Intelligence, Cyber Security and Computational Models (Proceedings of ICC3, 2013 (Advances in Intelligent Systems and Computing))
By
G. Sai Sundara Krishnan
,
R. Anitha
,
R. S. Lekshmi
,
M. Senthil Kumar
Computational Intelligence, Cyber Security and Computational Models (Proceedings of ICC3, 2013 (Advances in Intelligent Systems and Computing))
By
G. Sai Sundara Krishnan
,
R. Anitha
,
R. S. Lekshmi
,
M. Senthil Kumar
£294
Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications (5th International Symposium, Compimage 2016, Niagara Falls, NY, USA, September 21-23, 2016, Revised Selected Papers: 2017 (Lecture Notes in Computer Science))
By
Reneta P. Barneva
,
Valentin E. Brimkov
,
Joao Manuel R. S. Tavares
Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications (5th International Symposium, Compimage 2016, Niagara Falls, NY, USA, September 21-23, 2016, Revised Selected Papers: 2017 (Lecture Notes in Computer Science))
By
Reneta P. Barneva
,
Valentin E. Brimkov
,
Joao Manuel R. S. Tavares
£46.58
Proceedings of International Symposium on Sensor Networks, Systems and Security (Advances in Computing and Networking with Applications)
By
Nageswara S.V. Rao
,
Richard R. Brooks
,
Chase Q. Wu
Proceedings of International Symposium on Sensor Networks, Systems and Security (Advances in Computing and Networking with Applications)
By
Nageswara S.V. Rao
,
Richard R. Brooks
,
Chase Q. Wu
£157
Speech Enhancement Techniques for Digital Hearing Aids
By
Borisagar, Komal R.
,
Sedani, Bhavin S.
,
Bhavin S. Sedani
Speech Enhancement Techniques for Digital Hearing Aids
By
Borisagar, Komal R.
,
Sedani, Bhavin S.
,
Bhavin S. Sedani
£88.60
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies