0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Gift Vouchers
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Gift Vouchers
Track My Order
Sign in
Register
Wishlist
0
Cart
Search
All Products
Books
Computers
Operating Systems
Filters
Refine By
Category
Category
General
(21)
Unix
(3)
Linux
(2)
Windows
(1)
MacOS
(1)
MS-DOS
(1)
Delivery
Delivery
All
Free Shipping
(22)
Sold By
Sold By
All Sellers
Fishpond
(19)
Sell Yours
(3)
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(1)
Price
Price
All Prices
$40 - $60
(1)
$60 - $80
(3)
Over $80
(15)
to
Go
to
Go
Discount
Discount
Any Discount
0 - 25%
(16)
25 - 50%
(3)
Country
Country
All Countries
United States
(9)
Germany
(5)
United Kingdom
(4)
USA
(1)
Results for "ACM Books Programming"
ACM Books Programming
45 results
Filters
Refine By
Category
Category
General
(21)
Unix
(3)
Linux
(2)
Windows
(1)
MacOS
(1)
MS-DOS
(1)
Delivery
Delivery
All
Free Shipping
(22)
Sold By
Sold By
All Sellers
Fishpond
(19)
Sell Yours
(3)
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(1)
Price
Price
All Prices
$40 - $60
(1)
$60 - $80
(3)
Over $80
(15)
to
Go
to
Go
Discount
Discount
Any Discount
0 - 25%
(16)
25 - 50%
(3)
Country
Country
All Countries
United States
(9)
Germany
(5)
United Kingdom
(4)
USA
(1)
45 results
Sort By
Bestselling
Relevance
Price: Lowest
In Stock
Bestselling
Relevance
Price: Lowest
In Stock
Sort By
View:
Safe Search(
?
):
The Continuing Arms Race (Code-Reuse Attacks and Defenses)
By
Per Larsen
,
Ahmad-Reza Sadeghi
The Continuing Arms Race (Code-Reuse Attacks and Defenses)
By
Per Larsen
,
Ahmad-Reza Sadeghi
$216
The AWK Programming Language (Addison-Wesley Professional Computing Series)
By
Alfred V. Aho
,
Brian W. Kernighan
,
Peter Weinberger
The AWK Programming Language (Addison-Wesley Professional Computing Series)
By
Alfred V. Aho
,
Brian W. Kernighan
,
Peter Weinberger
$66.82
Operating Systems (Internals and Design Principles)
By
William Stallings
Operating Systems (Internals and Design Principles)
By
William Stallings
$559
414
Trustworthy Compilers (Quantitative Software Engineering Series)
By
Safonov, Vladimir O.
Trustworthy Compilers (Quantitative Software Engineering Series)
By
Safonov, Vladimir O.
$316
Understanding Semantics-Based Decision Support
By
Jain, Sarika
Understanding Semantics-Based Decision Support
By
Jain, Sarika
$132
Elsewhere
$196.00
Save $64.00 (33%)
Understanding Semantics-Based Decision Support
By
Jain, Sarika
Understanding Semantics-Based Decision Support
By
Jain, Sarika
$72.10
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
By
Thomas, Tony
,
Surendran, Roopak
,
Teenu John
,
Mamoun Alazab
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
By
Thomas, Tony
,
Surendran, Roopak
,
Teenu John
,
Mamoun Alazab
$177
Building Cocoa Applications (A Step by Step Guide: A Step by Step Guide)
By
Simson Garfinkel
,
Michael K. Mahoney
Building Cocoa Applications (A Step by Step Guide: A Step by Step Guide)
By
Simson Garfinkel
,
Michael K. Mahoney
$114
1
Practical Unix & Internet Security 3e
By
Garfinkel, Simson
,
Spafford, Gene
,
Alan Schwartz
Practical Unix & Internet Security 3e
By
Garfinkel, Simson
,
Spafford, Gene
,
Alan Schwartz
$99.81
219
The Design and Implementation of the FreeBSD Operating System,
By
McKusick, Marshall Kirk
,
Neville-Neil, George V.
,
Robert N. M. Watson
The Design and Implementation of the FreeBSD Operating System,
By
McKusick, Marshall Kirk
,
Neville-Neil, George V.
,
Robert N. M. Watson
$147
175
Unboxing Android USB (A hands on approach with real world examples)
By
Regupathy, Rajaram
Unboxing Android USB (A hands on approach with real world examples)
By
Regupathy, Rajaram
$136
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
By
Tony Thomas
,
Roopak Surendran
,
Teenu John
,
Mamoun Alazab
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
By
Tony Thomas
,
Roopak Surendran
,
Teenu John
,
Mamoun Alazab
$76.08
Essentials of Computer Architecture
By
Comer, Douglas
Essentials of Computer Architecture
By
Comer, Douglas
$216
Handbook of Graph Drawing and Visualization (Discrete Mathematics and Its Applications)
By
Roberto Tamassia
Handbook of Graph Drawing and Visualization (Discrete Mathematics and Its Applications)
By
Roberto Tamassia
$94.63
Web Component Development with Zope 3
By
Philipp von Weitershausen
,
P. J. Eby
Web Component Development with Zope 3
By
Philipp von Weitershausen
,
P. J. Eby
$113
1
Origins and Foundations of Computing (In Cooperation with Heinz Nixdorf MuseumsForum)
By
Heinz Nixdorf Museums Forum Gmbh Hnf
,
Friedrich L. Bauer
Origins and Foundations of Computing (In Cooperation with Heinz Nixdorf MuseumsForum)
By
Heinz Nixdorf Museums Forum Gmbh Hnf
,
Friedrich L. Bauer
$58.87
Peer-to-Peer Computing (Principles and Applications)
By
Vu, Quang Hieu
,
Lupu, Mihai
,
Beng Chin Ooi
Peer-to-Peer Computing (Principles and Applications)
By
Vu, Quang Hieu
,
Lupu, Mihai
,
Beng Chin Ooi
$238
Peer-to-Peer Computing (Principles and Applications)
By
Lupu, Mihai
,
Ooi, Beng Chin
,
Beng Chin Ooi
Peer-to-Peer Computing (Principles and Applications)
By
Lupu, Mihai
,
Ooi, Beng Chin
,
Beng Chin Ooi
$234
The AWK Programming Language
By
Alfred V. Aho
,
Brian W. Kernighan
,
Peter Weinberger
The AWK Programming Language
By
Alfred V. Aho
,
Brian W. Kernighan
,
Peter Weinberger
Currently
Unavailable
The AWK Programming Language
By
Alfred V. Aho
,
Brian W. Kernighan
,
Peter Weinberger
The AWK Programming Language
By
Alfred V. Aho
,
Brian W. Kernighan
,
Peter Weinberger
Currently
Unavailable
1
2
Next Page
1
2
Next Page