0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(8)
Sold By
Sold By
All Sellers
Fishpond
(8)
Country
Country
All Countries
United States
(5)
Germany
(1)
Results for "SAS Institute Programming"
SAS Institute Programming
12 results
Filters
Refine By
Category
Category
Networking
(8)
Sold By
Sold By
All Sellers
Fishpond
(8)
Country
Country
All Countries
United States
(5)
Germany
(1)
12 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Getting Started with SAS Programming (Using SAS Studio in the Cloud)
By
Ron Cody
Getting Started with SAS Programming (Using SAS Studio in the Cloud)
By
Ron Cody
£30.57
Elsewhere
£33.84
Save £3.27 (10%)
Getting Started with SAS Programming (Using SAS Studio in the Cloud (Hardcover edition))
By
Cody, Ron
Getting Started with SAS Programming (Using SAS Studio in the Cloud (Hardcover edition))
By
Cody, Ron
£39.82
Elsewhere
£44.15
Save £4.33 (10%)
Black Hat Python, 2nd Edition (Python Programming for Hackers and Pentesters)
By
Seitz, Justin
,
Arnold, Tim
Black Hat Python, 2nd Edition (Python Programming for Hackers and Pentesters)
By
Seitz, Justin
,
Arnold, Tim
£29.59
Elsewhere
£42.99
Save £13.40 (31%)
Security and Privacy in Communication Networks (6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Sushil Jajodia
,
Jianying Zhou
Security and Privacy in Communication Networks (6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Sushil Jajodia
,
Jianying Zhou
£91.07
Cloud Security and Privacy (An Enterprise Perspective on Risks and Compliance)
By
Mather, Tim
,
Kumaraswamy, Subra
,
Shahed Latif
Cloud Security and Privacy (An Enterprise Perspective on Risks and Compliance)
By
Mather, Tim
,
Kumaraswamy, Subra
,
Shahed Latif
£20.08
Elsewhere
£27.99
Save £7.91 (28%)
1
Computer Architecture and Security (Fundamentals of Designing Secure Computer Systems)
By
Shuangbao Paul Wang
,
Robert S. Ledley
Computer Architecture and Security (Fundamentals of Designing Secure Computer Systems)
By
Shuangbao Paul Wang
,
Robert S. Ledley
£103
Paradigms on Technology Development for Security Practitioners (Security Informatics and Law Enforcement)
By
Ilias Gkotsis
,
Dimitrios Kavallieros
,
Nikolai Stoianov
,
Stefanos Vrochidis
Paradigms on Technology Development for Security Practitioners (Security Informatics and Law Enforcement)
By
Ilias Gkotsis
,
Dimitrios Kavallieros
,
Nikolai Stoianov
,
Stefanos Vrochidis
£37.61
Elsewhere
£44.99
Save £7.38 (16%)
Open Source Intelligence Investigation (From Strategy to Implementation (Advanced Sciences and Technologies for Security Applications))
By
Babak Akhgar
,
P. Saskia Bayerl
,
Fraser Sampson
Open Source Intelligence Investigation (From Strategy to Implementation (Advanced Sciences and Technologies for Security Applications))
By
Babak Akhgar
,
P. Saskia Bayerl
,
Fraser Sampson
Currently
Unavailable
AI-Driven Cybersecurity (Revolutionizing Threat Detection and Defence Systems)
By
Hooman Razavi
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Haïfa Nakouri
AI-Driven Cybersecurity (Revolutionizing Threat Detection and Defence Systems)
By
Hooman Razavi
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Haïfa Nakouri
Currently
Unavailable
AI-Driven Cybersecurity (Revolutionizing Threat Detection and Defence Systems)
By
Hooman Razavi
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Haïfa Nakouri
AI-Driven Cybersecurity (Revolutionizing Threat Detection and Defence Systems)
By
Hooman Razavi
,
Mariya Ouaissa
,
Mariyam Ouaissa
,
Haïfa Nakouri
Currently
Unavailable
Computer Architecture and Security – Fundamentals of Designing Secure Computer Systems
By
SP Wang
Computer Architecture and Security – Fundamentals of Designing Secure Computer Systems
By
SP Wang
Currently
Unavailable
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies