0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Gift Vouchers
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Gift Vouchers
Track My Order
Sign in
Register
Wishlist
0
Cart
Search
All Products
Books
Computers
Filters
Refine By
Category
Category
Security
(6)
Networking
(6)
Artificial Intelligence
(5)
Hardware
(4)
Computer Science
(4)
Programming
(3)
General
(2)
Special Topics
(1)
Internet
(1)
Mathematical & Statistical Softw
(1)
Social Aspects
(1)
Graphics & Design
(1)
Delivery
Delivery
All
Free Shipping
(10)
Sold By
Sold By
All Sellers
Fishpond
(10)
Price
Price
All Prices
Over $80
(10)
to
Go
to
Go
Discount
Discount
Any Discount
0 - 25%
(10)
Country
Country
All Countries
Switzerland
(4)
United States
(4)
Germany
(1)
United Kingdom
(1)
Results for "George Cybenko"
George Cybenko
11 results
Filters
Refine By
Category
Category
Security
(6)
Networking
(6)
Artificial Intelligence
(5)
Hardware
(4)
Computer Science
(4)
Programming
(3)
General
(2)
Special Topics
(1)
Internet
(1)
Mathematical & Statistical Softw
(1)
Social Aspects
(1)
Graphics & Design
(1)
Delivery
Delivery
All
Free Shipping
(10)
Sold By
Sold By
All Sellers
Fishpond
(10)
Price
Price
All Prices
Over $80
(10)
to
Go
to
Go
Discount
Discount
Any Discount
0 - 25%
(10)
Country
Country
All Countries
Switzerland
(4)
United States
(4)
Germany
(1)
United Kingdom
(1)
11 results
Sort By
Bestselling
Relevance
Price: Lowest
In Stock
Bestselling
Relevance
Price: Lowest
In Stock
Sort By
View:
Safe Search(
?
):
The Mathematics of Information Coding, Extraction and Distribution (v. 107 (The IMA Volumes in Mathematics and Its Applications))
By
George Cybenko
,
Dianne P. O'Leary
,
Jorma Rissanen
The Mathematics of Information Coding, Extraction and Distribution (v. 107 (The IMA Volumes in Mathematics and Its Applications))
By
George Cybenko
,
Dianne P. O'Leary
,
Jorma Rissanen
$239
The Mathematics of Information Coding, Extraction and Distribution (IMA Volumes in Mathematics and its Applications The)
By
George Cybenko
,
Dianne P. O'Leary
,
Jorma Rissanen
The Mathematics of Information Coding, Extraction and Distribution (IMA Volumes in Mathematics and its Applications The)
By
George Cybenko
,
Dianne P. O'Leary
,
Jorma Rissanen
$243
Graphical Models for Security (5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers (Security and Cryptology))
By
George Cybenko
,
David Pym
,
Barbara Fila
Graphical Models for Security (5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers (Security and Cryptology))
By
George Cybenko
,
David Pym
,
Barbara Fila
$123
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense (Control- and Game-Theoretic Approaches to Cyber Security (Security and Cryptology) (Lecture Notes in Computer Science))
By
Sushil Jajodia
,
George Cybenko
,
Peng Liu
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense (Control- and Game-Theoretic Approaches to Cyber Security (Security and Cryptology) (Lecture Notes in Computer Science))
By
Sushil Jajodia
,
George Cybenko
,
Peng Liu
$137
Adaptive Autonomous Secure Cyber Systems
By
Sushil Jajodia
,
George Cybenko
,
V.S. Subrahmanian
,
Vipin Swarup
Adaptive Autonomous Secure Cyber Systems
By
Sushil Jajodia
,
George Cybenko
,
V.S. Subrahmanian
,
Vipin Swarup
$349
Adaptive Autonomous Secure Cyber Systems
By
Sushil Jajodia
,
George Cybenko
,
V. S. Subrahmanian
Adaptive Autonomous Secure Cyber Systems
By
Sushil Jajodia
,
George Cybenko
,
V. S. Subrahmanian
$357
Modeling and Design of Secure Internet of Things
By
Charles A. Kamhoua
,
Laurent L. Njilla
,
Alexander Kott
,
Sachin Shetty
Modeling and Design of Secure Internet of Things
By
Charles A. Kamhoua
,
Laurent L. Njilla
,
Alexander Kott
,
Sachin Shetty
$335
Game Theory and Machine Learning for Cyber Security
By
Kamhoua, Charles A.
,
Kiekintveld, Christopher D.
,
Fei Fang
Game Theory and Machine Learning for Cyber Security
By
Kamhoua, Charles A.
,
Kiekintveld, Christopher D.
,
Fei Fang
$333
Darkweb Cyber Threat Intelligence Mining
By
John Robertson
,
Ahmad Diab
,
Ericsson Marin
Darkweb Cyber Threat Intelligence Mining
By
John Robertson
,
Ahmad Diab
,
Ericsson Marin
$130
Neural Networks (EURASIP Workshop 1990 Sesimbra, Portugal, February 15-17, 1990. Proceedings (Lecture Notes in Computer Science))
By
Luis B. Almeida
,
Christian J. Wellekens
Neural Networks (EURASIP Workshop 1990 Sesimbra, Portugal, February 15-17, 1990. Proceedings (Lecture Notes in Computer Science))
By
Luis B. Almeida
,
Christian J. Wellekens
$88.63
Exploiting Software (How to Break Code)
By
Greg Hoglund
,
Gary R. McGraw
,
Aviel D. Rubin
Exploiting Software (How to Break Code)
By
Greg Hoglund
,
Gary R. McGraw
,
Aviel D. Rubin
1
Currently
Unavailable