0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Daily Deals
Best Sellers
🎁 Gift Finder
Track My Order
Sign in
Register
Wishlist
Cart
0
SGD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Movies
Music
All Products
\n
Books
Movies
Music
All Products
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Daily Deals
Best Sellers
🎁 Gift Finder
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
SGD
Search
Filters
Refine By
Category
Category
Books
(12,854)
Electronics
(14)
Toys
(11)
Beauty
(2)
Stationery
(1)
Sold By
Sold By
All Sellers
Fishpond
(12,881)
SmartSell
(1)
Brand
Brand
All Brands
Springer
(1,750)
CRC Press
(1,269)
Springer International Publishing AG
(1,123)
Springer Nature Switzerland AG
(988)
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
(943)
More...
Format
Format
All Formats
Paperback
(8,137)
Hardback
(4,513)
Mixed media product
(89)
Electronic Book Text
(52)
BOOK
(6)
More...
Age Range
Age Range
All Ranges
5-9
(1)
10-14
(2)
15+
(758)
All Ages
(333)
Country
Country
All Countries
United States
(3,326)
Switzerland
(2,298)
United Kingdom
(2,021)
Germany
(1,549)
Singapore
(980)
More...
Results for "Applications Security Computers"
Applications Security Computers
19,935 results
Filters
Refine By
Category
Category
Books
(12,854)
Electronics
(14)
Toys
(11)
Beauty
(2)
Stationery
(1)
Sold By
Sold By
All Sellers
Fishpond
(12,881)
SmartSell
(1)
Brand
Brand
All Brands
Springer
(1,750)
CRC Press
(1,269)
Springer International Publishing AG
(1,123)
Springer Nature Switzerland AG
(988)
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
(943)
More...
Format
Format
All Formats
Paperback
(8,137)
Hardback
(4,513)
Mixed media product
(89)
Electronic Book Text
(52)
BOOK
(6)
More...
Age Range
Age Range
All Ranges
5-9
(1)
10-14
(2)
15+
(758)
All Ages
(333)
Country
Country
All Countries
United States
(3,326)
Switzerland
(2,298)
United Kingdom
(2,021)
Germany
(1,549)
Singapore
(980)
More...
19,935 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Artificial Immune System (Applications in Computer Security)
By
Tan, Ying
Artificial Immune System (Applications in Computer Security)
By
Tan, Ying
$147
Elsewhere
$159.11
Save $12.11 (8%)
Java Card E-Payment Application Development (Computer security series)
By
Vesna Hassler
,
etc.
,
Mikhail Gordeev
,
Martin Manninger
Java Card E-Payment Application Development (Computer security series)
By
Vesna Hassler
,
etc.
,
Mikhail Gordeev
,
Martin Manninger
$146
Everyday Cryptography (Fundamental Principles and Applications)
By
Martin, Keith (Professor of Information Security, Professor of I
Everyday Cryptography (Fundamental Principles and Applications)
By
Martin, Keith (Professor of Information Security, Professor of I
$215
Everyday Cryptography (Fundamental Principles and Applications)
By
Martin, Keith (Professor of Information Security, Professor of I
Everyday Cryptography (Fundamental Principles and Applications)
By
Martin, Keith (Professor of Information Security, Professor of I
$114
Proceedings 10th Annual Computer Security Applications Conference, December 5-9, 1994 Orlando, Florida
Proceedings 10th Annual Computer Security Applications Conference, December 5-9, 1994 Orlando, Florida
$106
Applications of Data Mining in Computer Security (Advances in Information Security)
By
Daniel Barbara
,
Sushil Jajodia
Applications of Data Mining in Computer Security (Advances in Information Security)
By
Daniel Barbara
,
Sushil Jajodia
$172
Applications of Data Mining in Computer Security (Advances in Information Security)
By
Daniel Barbara
,
Sushil Jajodia
Applications of Data Mining in Computer Security (Advances in Information Security)
By
Daniel Barbara
,
Sushil Jajodia
$176
Fighting Fraud (How to Establish and Manage an Anti-Fraud Program)
By
Kovacich, Gerald L., CFE, CPP, CISSP (Security consultant, lectu
Fighting Fraud (How to Establish and Manage an Anti-Fraud Program)
By
Kovacich, Gerald L., CFE, CPP, CISSP (Security consultant, lectu
$87.14
CSA Guide to Cloud Computing (Implementing Cloud Privacy and Security)
By
Samani, Raj (VP, CTO for McAfee EMEA; CLAS, CISSP, CEH, MCSE, CC
,
Brian
,
Jim Reavis
CSA Guide to Cloud Computing (Implementing Cloud Privacy and Security)
By
Samani, Raj (VP, CTO for McAfee EMEA; CLAS, CISSP, CEH, MCSE, CC
,
Brian
,
Jim Reavis
$86.51
Targeted Cyber Attacks (Multi-staged Attacks Driven by Exploits and Malware)
By
Sood, Aditya (Aditya K. Sood, Ph.D., senior security researcher
,
Enbody, Richard (Richard J. Enbody, Ph.D., associate professor o
Targeted Cyber Attacks (Multi-staged Attacks Driven by Exploits and Malware)
By
Sood, Aditya (Aditya K. Sood, Ph.D., senior security researcher
,
Enbody, Richard (Richard J. Enbody, Ph.D., associate professor o
$46.23
Securing the Internet of Things
By
Li, Shancang (Senior Lecturer in the cyber security research Uni
,
Xu, Li Da (Professor, Department of Information Technology & Dec
Securing the Internet of Things
By
Li, Shancang (Senior Lecturer in the cyber security research Uni
,
Xu, Li Da (Professor, Department of Information Technology & Dec
$84.11
Research Methods for Cyber Security
By
Edgar, Thomas W. (Senior Cyber Security Scientist, Pacific North
,
Manz, David O. (Senior Cyber Security Scientist, Pacific Northwe
Research Methods for Cyber Security
By
Edgar, Thomas W. (Senior Cyber Security Scientist, Pacific North
,
Manz, David O. (Senior Cyber Security Scientist, Pacific Northwe
$134
Federal Cloud Computing (The Definitive Guide for Cloud Service Providers)
By
Metheny, Matthew (Chief Information Security Officer and Directo
Federal Cloud Computing (The Definitive Guide for Cloud Service Providers)
By
Metheny, Matthew (Chief Information Security Officer and Directo
$120
Issues in Security Management (Thinking Critically About Security)
By
Robert (Recently retired from editorship of Canadian Security ma
Issues in Security Management (Thinking Critically About Security)
By
Robert (Recently retired from editorship of Canadian Security ma
$99.97
The Manager's Handbook for Corporate Security (Establishing and Managing a Successful Assets Protection Program)
By
Kovacich, Gerald L., CFE, CPP, CISSP (Security consultant, lectu
,
Halibozek, Edward (Former Corporate VP of Security for a Fortune
The Manager's Handbook for Corporate Security (Establishing and Managing a Successful Assets Protection Program)
By
Kovacich, Gerald L., CFE, CPP, CISSP (Security consultant, lectu
,
Halibozek, Edward (Former Corporate VP of Security for a Fortune
$134
1
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
$207
Elsewhere
$227.43
Save $20.43 (9%)
Study on Mobile Device Security
By
Department of Homeland Security
Study on Mobile Device Security
By
Department of Homeland Security
$54.97
Shipping Explosives (An Fms Customer Guide (Color))
By
Defense Institute of Security Assistance
Shipping Explosives (An Fms Customer Guide (Color))
By
Defense Institute of Security Assistance
$38.22
Shipping Explosives (An Fms Customer Guide (Black and White))
By
Defense Institute of Security Assistance
Shipping Explosives (An Fms Customer Guide (Black and White))
By
Defense Institute of Security Assistance
$29.33
Cryptanalysis of RSA and Its Variants (Chapman & Hall/CRC Cryptography and Network Security Series)
By
Hinek, M. Jason (iCORE Information Security Lab, Calgary, Canada
Cryptanalysis of RSA and Its Variants (Chapman & Hall/CRC Cryptography and Network Security Series)
By
Hinek, M. Jason (iCORE Information Security Lab, Calgary, Canada
$201
Secure and Resilient Software (Requirements, Test Cases, and Testing Methods [With CDROM])
By
Merkow, Mark S. (Technical Security Strategy, Scottsdale, Arizon
,
Raghavan, Lakshmikanth
Secure and Resilient Software (Requirements, Test Cases, and Testing Methods [With CDROM])
By
Merkow, Mark S. (Technical Security Strategy, Scottsdale, Arizon
,
Raghavan, Lakshmikanth
$155
Pragmatic Security Metrics (Applying Metametrics to Information Security)
By
Brotby, W. Krag, CISM (Enterprise Security Architect, Thousand O
,
Hinson, Gary
Pragmatic Security Metrics (Applying Metametrics to Information Security)
By
Brotby, W. Krag, CISM (Enterprise Security Architect, Thousand O
,
Hinson, Gary
$192
Elsewhere
$227.43
Save $35.43 (16%)
4
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
$101
Practical Security for Agile and DevOps
By
Merkow, Mark S. (Technical Security Strategy, Scottsdale, Arizon
Practical Security for Agile and DevOps
By
Merkow, Mark S. (Technical Security Strategy, Scottsdale, Arizon
$269
Elsewhere
$297.41
Save $28.41 (10%)
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page