0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(11)
Sold By
Sold By
All Sellers
Fishpond
(13)
Country
Country
All Countries
United States
(7)
Switzerland
(2)
United Kingdom
(2)
Singapore
(1)
Results for "Using UML Books"
Using UML Books
16 results
Filters
Refine By
Category
Category
Networking
(11)
Sold By
Sold By
All Sellers
Fishpond
(13)
Country
Country
All Countries
United States
(7)
Switzerland
(2)
United Kingdom
(2)
Singapore
(1)
16 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Security Patterns in Practice (Designing Secure Architectures Using Software Patterns (Wiley Software Patterns Series))
By
Fernandez-Buglioni, Eduardo
Security Patterns in Practice (Designing Secure Architectures Using Software Patterns (Wiley Software Patterns Series))
By
Fernandez-Buglioni, Eduardo
£29.43
Elsewhere
£46.00
Save £16.57 (36%)
4
Visual Studio Hacks (Tips and Tools for Turbocharging the IDE)
By
James Henry Avery
Visual Studio Hacks (Tips and Tools for Turbocharging the IDE)
By
James Henry Avery
£14.77
Elsewhere
£23.99
Save £9.22 (38%)
Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)
By
Jon Duncan Hagar
Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)
By
Jon Duncan Hagar
£50.10
Elsewhere
£61.99
Save £11.89 (19%)
Pro Cryptography and Cryptanalysis with C++20 (Creating and Programming Advanced Algorithms)
By
Marius Iulian Mihailescu
,
Stefania Loredana Nita
Pro Cryptography and Cryptanalysis with C++20 (Creating and Programming Advanced Algorithms)
By
Marius Iulian Mihailescu
,
Stefania Loredana Nita
£18.37
Elsewhere
£44.99
Save £26.62 (59%)
Cryptography and Cryptanalysis in MATLAB (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
Cryptography and Cryptanalysis in MATLAB (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
£40.55
Elsewhere
£54.99
Save £14.44 (26%)
Cryptography and Cryptanalysis in Java (Creating and Programming Advanced Algorithms with Java Se 17 Lts and Jakarta Ee 10)
By
Mihailescu, Marius Iulian
,
Nita, Stefania Loredana
Cryptography and Cryptanalysis in Java (Creating and Programming Advanced Algorithms with Java Se 17 Lts and Jakarta Ee 10)
By
Mihailescu, Marius Iulian
,
Nita, Stefania Loredana
£34.75
Elsewhere
£39.99
Save £5.24 (13%)
Pro Cryptography and Cryptanalysis with C++23 (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
Pro Cryptography and Cryptanalysis with C++23 (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
£47.45
Elsewhere
£54.99
Save £7.54 (14%)
Authorization and Access Control (Foundations, Frameworks, and Applications)
By
N. Mahalle, Parikshit (Vishwakarma Inst. of Information Tech., I
,
S. Bhong, Shashikant (Smt. Kashibai Navale College of Eng., Pune
,
Gitanjali R. Shinde
Authorization and Access Control (Foundations, Frameworks, and Applications)
By
N. Mahalle, Parikshit (Vishwakarma Inst. of Information Tech., I
,
S. Bhong, Shashikant (Smt. Kashibai Navale College of Eng., Pune
,
Gitanjali R. Shinde
£48.52
Elsewhere
£51.99
Save £3.47 (7%)
Authorization and Access Control (Foundations, Frameworks, and Applications)
By
N. Mahalle, Parikshit (Vishwakarma Inst. of Information Tech., I
,
S. Bhong, Shashikant (Smt. Kashibai Navale College of Eng., Pune
,
Gitanjali R. Shinde
Authorization and Access Control (Foundations, Frameworks, and Applications)
By
N. Mahalle, Parikshit (Vishwakarma Inst. of Information Tech., I
,
S. Bhong, Shashikant (Smt. Kashibai Navale College of Eng., Pune
,
Gitanjali R. Shinde
£19.79
Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)
By
Hagar, Jon Duncan
Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)
By
Hagar, Jon Duncan
£150
Elsewhere
£180.00
Save £30.00 (17%)
Proceedings of the International Congress on Information and Communication Technology (ICICT 2015: Volume 1 (Advances in Intelligent Systems and Computing))
By
Suresh Chandra Satapathy
,
Yogesh Chandra Bhatt
,
Amit Joshi
,
Durgesh Kumar Mishra
Proceedings of the International Congress on Information and Communication Technology (ICICT 2015: Volume 1 (Advances in Intelligent Systems and Computing))
By
Suresh Chandra Satapathy
,
Yogesh Chandra Bhatt
,
Amit Joshi
,
Durgesh Kumar Mishra
£177
Cybersecurity, Privacy and Freedom Protection in the Connected World (Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Advanced Sciences and Technologies for Security Applications))
By
Hamid Jahankhani
,
Arshad Jamal
,
Shaun Lawson
Cybersecurity, Privacy and Freedom Protection in the Connected World (Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Advanced Sciences and Technologies for Security Applications))
By
Hamid Jahankhani
,
Arshad Jamal
,
Shaun Lawson
£46.20
Cybersecurity, Privacy and Freedom Protection in the Connected World (Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Advanced Sciences and Technologies for Security Applications))
By
Hamid Jahankhani
,
Arshad Jamal
,
Shaun Lawson
Cybersecurity, Privacy and Freedom Protection in the Connected World (Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Advanced Sciences and Technologies for Security Applications))
By
Hamid Jahankhani
,
Arshad Jamal
,
Shaun Lawson
£45.08
Security Patterns in Practice (Designing Secure Architectures Using Software Patterns (Wiley Software Patterns Series))
By
Eduardo Fernandez-Buglioni
Security Patterns in Practice (Designing Secure Architectures Using Software Patterns (Wiley Software Patterns Series))
By
Eduardo Fernandez-Buglioni
Currently
Unavailable
Security Patterns in Practice (Designing Secure Architectures Using Software Patterns (Wiley Software Patterns Series))
By
Eduardo Fernandez-Buglioni
Security Patterns in Practice (Designing Secure Architectures Using Software Patterns (Wiley Software Patterns Series))
By
Eduardo Fernandez-Buglioni
Currently
Unavailable
Security Patterns in Practice (Designing Secure Architectures Using Software Patterns (Wiley Software Patterns Series))
By
Eduardo Fernandez-Buglioni
Security Patterns in Practice (Designing Secure Architectures Using Software Patterns (Wiley Software Patterns Series))
By
Eduardo Fernandez-Buglioni
Currently
Unavailable
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies