0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Gift Vouchers
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Gift Vouchers
Track My Order
Sign in
Register
Wishlist
0
Cart
Search
All Products
Books
Computers
Computer Science
Cybernetics
Filters
Delivery
Delivery
All
Free Shipping
(90)
Sold By
Sold By
All Sellers
Fishpond
(90)
Age Range
Age Range
All Ranges
15+
(1)
Price
Price
All Prices
$40 - $60
(1)
Over $80
(79)
to
Go
to
Go
Discount
Discount
Any Discount
0 - 25%
(78)
25 - 50%
(2)
Country
Country
All Countries
Switzerland
(47)
Singapore
(10)
United States
(6)
United Kingdom
(4)
Denmark
(2)
More...
Results for "Web Application Security"
Web Application Security
140 results
Filters
Delivery
Delivery
All
Free Shipping
(90)
Sold By
Sold By
All Sellers
Fishpond
(90)
Age Range
Age Range
All Ranges
15+
(1)
Price
Price
All Prices
$40 - $60
(1)
Over $80
(79)
to
Go
to
Go
Discount
Discount
Any Discount
0 - 25%
(78)
25 - 50%
(2)
Country
Country
All Countries
Switzerland
(47)
Singapore
(10)
United States
(6)
United Kingdom
(4)
Denmark
(2)
More...
140 results
Sort By
Bestselling
Relevance
Price: Lowest
In Stock
Bestselling
Relevance
Price: Lowest
In Stock
Sort By
View:
Safe Search(
?
):
Identity and Data Security for Web Development (Best Practices)
By
Leblanc, Jonathan
,
Messerschmidt, Tim
Identity and Data Security for Web Development (Best Practices)
By
Leblanc, Jonathan
,
Messerschmidt, Tim
$57.89
44
IoT Based Smart Applications
By
Nidhi Sindhwani
,
Rohit Anand
,
M. Niranjanamurthy
IoT Based Smart Applications
By
Nidhi Sindhwani
,
Rohit Anand
,
M. Niranjanamurthy
$347
Emerging Trends in Cybersecurity Applications
By
Kevin Daimi
,
Abeer Alsadoon
,
Cathryn Peoples
,
Nour El Madhoun
Emerging Trends in Cybersecurity Applications
By
Kevin Daimi
,
Abeer Alsadoon
,
Cathryn Peoples
,
Nour El Madhoun
$332
Emerging Trends in Cybersecurity Applications
By
Kevin Daimi
,
Abeer Alsadoon
,
Cathryn Peoples
,
Nour El Madhoun
Emerging Trends in Cybersecurity Applications
By
Kevin Daimi
,
Abeer Alsadoon
,
Cathryn Peoples
,
Nour El Madhoun
$251
Hierarchical Linear Modeling (Guide and Applications)
By
George David Garson
Hierarchical Linear Modeling (Guide and Applications)
By
George David Garson
$248
7
Advanced Techniques and Applications of Cybersecurity and Forensics (Emerging Technologies)
By
Keshav Kaushik
,
Mariya Ouaissa
,
Aryan Chaudhary
Advanced Techniques and Applications of Cybersecurity and Forensics (Emerging Technologies)
By
Keshav Kaushik
,
Mariya Ouaissa
,
Aryan Chaudhary
$208
Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence)
By
Rajeev Agrawal
,
Jing He
,
Emmanuel Shubhakar Pilli
Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence)
By
Rajeev Agrawal
,
Jing He
,
Emmanuel Shubhakar Pilli
$377
Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence)
By
Rajeev Agrawal
,
Jing He
,
Emmanuel Shubhakar Pilli
,
Sanjeev Kumar
Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence)
By
Rajeev Agrawal
,
Jing He
,
Emmanuel Shubhakar Pilli
,
Sanjeev Kumar
$375
Blockchain Technology for IoT Applications (Blockchain Technologies)
By
Seok-Won Lee
,
Irish Singh
,
Masoud Mohammadian
Blockchain Technology for IoT Applications (Blockchain Technologies)
By
Seok-Won Lee
,
Irish Singh
,
Masoud Mohammadian
$324
Blockchain Technology for IoT Applications (Blockchain Technologies)
By
Seok-Won Lee
,
Irish Singh
,
Masoud Mohammadian
Blockchain Technology for IoT Applications (Blockchain Technologies)
By
Seok-Won Lee
,
Irish Singh
,
Masoud Mohammadian
$235
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture (Volume II (River Publishers Series in Digital Security and Forensics))
By
Handa, Anand
,
Negi, Rohit
,
S. Venkatesan
,
Sandeep K. Shukla
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture (Volume II (River Publishers Series in Digital Security and Forensics))
By
Handa, Anand
,
Negi, Rohit
,
S. Venkatesan
,
Sandeep K. Shukla
$170
Authentication of Embedded Devices (Technologies, Protocols and Emerging Applications)
By
Basel Halak
Authentication of Embedded Devices (Technologies, Protocols and Emerging Applications)
By
Basel Halak
$192
Authentication of Embedded Devices (Technologies, Protocols and Emerging Applications)
By
Basel Halak
Authentication of Embedded Devices (Technologies, Protocols and Emerging Applications)
By
Basel Halak
$144
Privacy, Security and Forensics in the Internet of Things (Iot)
By
Reza Montasari
,
Fiona Carroll
,
Ian Mitchell
Privacy, Security and Forensics in the Internet of Things (Iot)
By
Reza Montasari
,
Fiona Carroll
,
Ian Mitchell
$356
Cyber-Security Threats and Response Models in Nuclear Power Plants (SpringerBriefs in Computer Science)
By
Smidts, Carol
,
Ray, Indrajit
,
Quanyan Zhu
,
Pavan Kumar Vaddi
Cyber-Security Threats and Response Models in Nuclear Power Plants (SpringerBriefs in Computer Science)
By
Smidts, Carol
,
Ray, Indrajit
,
Quanyan Zhu
,
Pavan Kumar Vaddi
$96.55
Security, Trust and Privacy Models, and Architectures in IoT Environments (Internet of Things)
By
Lidia Fotia
,
Fabrizio Messina
,
Domenico Rosaci
,
Giuseppe M.L. Sarne
Security, Trust and Privacy Models, and Architectures in IoT Environments (Internet of Things)
By
Lidia Fotia
,
Fabrizio Messina
,
Domenico Rosaci
,
Giuseppe M.L. Sarne
$397
Pattern Analysis, Intelligent Security and the Internet of Things (Advances in Intelligent Systems and Computing)
By
Ajith Abraham
,
Azah Kamilah Muda
,
Yun-Huoy Choo
Pattern Analysis, Intelligent Security and the Internet of Things (Advances in Intelligent Systems and Computing)
By
Ajith Abraham
,
Azah Kamilah Muda
,
Yun-Huoy Choo
$273
Leveraging Computer Vision to Biometric Applications (Chapman & Hall/Distributed Computing and Intelligent Data Analytics Series)
By
Arvind Selwal
,
Deepika Sharma
,
Mukesh Mann
,
Sudeshna Chakraborty
Leveraging Computer Vision to Biometric Applications (Chapman & Hall/Distributed Computing and Intelligent Data Analytics Series)
By
Arvind Selwal
,
Deepika Sharma
,
Mukesh Mann
,
Sudeshna Chakraborty
$150
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing (Theory and Applications: FICTA 2016, Volume 1 (Advances in Intelligent Systems and Computing))
By
Suresh Chandra Satapathy
,
Vikrant Bhateja
,
Siba K. Udgata
,
Prasant Kumar Pattnaik
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing (Theory and Applications: FICTA 2016, Volume 1 (Advances in Intelligent Systems and Computing))
By
Suresh Chandra Satapathy
,
Vikrant Bhateja
,
Siba K. Udgata
,
Prasant Kumar Pattnaik
$452
Frontier Computing (Theory, Technologies and Applications FC 2016 (Lecture Notes in Electrical Engineering))
By
Neil Y. Yen
,
Jason C. Hung
Frontier Computing (Theory, Technologies and Applications FC 2016 (Lecture Notes in Electrical Engineering))
By
Neil Y. Yen
,
Jason C. Hung
$660
Internet of Things, Infrastructures and Mobile Applications (Proceedings of the 13th IMCL Conference (Advances in Intelligent Systems and Computing))
By
Michael E Auer
,
Thrasyvoulos Tsiatsos
Internet of Things, Infrastructures and Mobile Applications (Proceedings of the 13th IMCL Conference (Advances in Intelligent Systems and Computing))
By
Michael E Auer
,
Thrasyvoulos Tsiatsos
$457
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020, Volume 1 (Advances in Intelligent Systems and Computing))
By
John MacIntyre
,
Jinghua Zhao
,
Xiaomeng Ma
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020, Volume 1 (Advances in Intelligent Systems and Computing))
By
John MacIntyre
,
Jinghua Zhao
,
Xiaomeng Ma
$454
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020, Volume 2 (Advances in Intelligent Systems and Computing))
By
John MacIntyre
,
Jinghua Zhao
,
Xiaomeng Ma
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020, Volume 2 (Advances in Intelligent Systems and Computing))
By
John MacIntyre
,
Jinghua Zhao
,
Xiaomeng Ma
$449
1
2
3
4
5
6
Next Page
1
2
3
4
5
6
Next Page