0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Business
Movies
Music
All Products
\n
Books
Business
Movies
Music
Business
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Business
Filters
Refine By
Category
Category
Management
(17)
Operations
(4)
Industries
(2)
Investments & Securities
(1)
Finance
(1)
Banks & Banking
(1)
Business Ethics
(1)
Development
(1)
Government & Business
(1)
Infrastructure
(1)
Business Mathematics
(1)
Sold By
Sold By
All Sellers
Fishpond
(24)
Age Range
Age Range
All Ranges
15+
(3)
Country
Country
All Countries
Germany
(10)
United States
(6)
United Kingdom
(3)
Austria
(1)
Switzerland
(1)
Results for "SQL Exploits"
SQL Exploits
37 results
Filters
Refine By
Category
Category
Management
(17)
Operations
(4)
Industries
(2)
Investments & Securities
(1)
Finance
(1)
Banks & Banking
(1)
Business Ethics
(1)
Development
(1)
Government & Business
(1)
Infrastructure
(1)
Business Mathematics
(1)
Sold By
Sold By
All Sellers
Fishpond
(24)
Age Range
Age Range
All Ranges
15+
(3)
Country
Country
All Countries
Germany
(10)
United States
(6)
United Kingdom
(3)
Austria
(1)
Switzerland
(1)
37 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Bug Bounty Hunting for Web Security (Find and Exploit Vulnerabilities in Web Sites and Applications)
By
Sinha, Sanjib
Bug Bounty Hunting for Web Security (Find and Exploit Vulnerabilities in Web Sites and Applications)
By
Sinha, Sanjib
HK$366
Elsewhere
HK$506.41
Save HK$140.41 (28%)
Inside Microsoft Dynamics AX 2012 R3
By
The Microsoft Dynamics Ax Team
,
The Microsoft Dynamics Ax Team
Inside Microsoft Dynamics AX 2012 R3
By
The Microsoft Dynamics Ax Team
,
The Microsoft Dynamics Ax Team
HK$582
19
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
HK$1,099
Elsewhere
HK$1,519.52
Save HK$420.52 (28%)
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
HK$473
Elsewhere
HK$587.45
Save HK$114.45 (19%)
Fintech for Dummies
By
O'Hanlon, Steven
,
Chishti, Susanne
,
Brendan Bradley
,
James Jockle
Fintech for Dummies
By
O'Hanlon, Steven
,
Chishti, Susanne
,
Brendan Bradley
,
James Jockle
HK$276
Elsewhere
HK$303.80
Save HK$27.80 (9%)
Seven Deadliest Web Application Attacks
By
Mike Shema
Seven Deadliest Web Application Attacks
By
Mike Shema
HK$191
2
Seven Deadliest Microsoft Attacks
By
Kraus, Rob (CISSP, C|EH, MCSE; Senior Security Consultant for So
,
Barber, Brian
,
Mike Borkin
,
Naomi J. Alpern
Seven Deadliest Microsoft Attacks
By
Kraus, Rob (CISSP, C|EH, MCSE; Senior Security Consultant for So
,
Barber, Brian
,
Mike Borkin
,
Naomi J. Alpern
HK$246
Analyzing Data with Power BI and Power Pivot for Excel (Business Skills)
By
Ferrari, Alberto
,
Russo, Marco
Analyzing Data with Power BI and Power Pivot for Excel (Business Skills)
By
Ferrari, Alberto
,
Russo, Marco
HK$278
Elsewhere
HK$298.74
Save HK$20.74 (7%)
81
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences & Innovative Business Technology)
By
Adarsh Kumar
,
Neelu Jyothi Ahuja
,
Keshav Kaushik
,
Deepak Singh Tomar
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences & Innovative Business Technology)
By
Adarsh Kumar
,
Neelu Jyothi Ahuja
,
Keshav Kaushik
,
Deepak Singh Tomar
HK$1,160
Elsewhere
HK$1,316.82
Save HK$156.82 (12%)
Exploring the Ethical Implications of Generative AI
By
Aftab Ara
,
Affreen Ara
Exploring the Ethical Implications of Generative AI
By
Aftab Ara
,
Affreen Ara
HK$2,400
Elsewhere
HK$3,008.66
Save HK$608.66 (20%)
Business Information Systems (22nd International Conference, BIS 2019, Seville, Spain, June 26–28, 2019, Proceedings, Part I (Lecture Notes in Business Information Processing))
By
Witold Abramowicz
,
Rafael Corchuelo
Business Information Systems (22nd International Conference, BIS 2019, Seville, Spain, June 26–28, 2019, Proceedings, Part I (Lecture Notes in Business Information Processing))
By
Witold Abramowicz
,
Rafael Corchuelo
HK$788
Text and Context (Document Storage and Processing)
By
Jones, Susan
Text and Context (Document Storage and Processing)
By
Jones, Susan
HK$500
Advances in Web-Age Information Management (5th International Conference, Waim 2004, Dalian, China, July 15-17, 2004, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Ling Feng
,
Quing Li
,
Guoren Wang
Advances in Web-Age Information Management (5th International Conference, Waim 2004, Dalian, China, July 15-17, 2004, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Ling Feng
,
Quing Li
,
Guoren Wang
HK$1,000
Secure Data Management (VLDB 2004 Workshop, SDM 2004 : Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science))
By
Willem Jonker
,
Milan Petkovic
Secure Data Management (VLDB 2004 Workshop, SDM 2004 : Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science))
By
Willem Jonker
,
Milan Petkovic
HK$491
Detection of Intrusions and Malware, and Vulnerability Assessment (Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Klaus Julisch
,
Christopher Kruegel
Detection of Intrusions and Malware, and Vulnerability Assessment (Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Klaus Julisch
,
Christopher Kruegel
HK$557
Trust and Privacy in Digital Business (Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Siimone Fischer-Hubner
,
Stevel Furnell
,
Costas Lambrinoudakis
Trust and Privacy in Digital Business (Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Siimone Fischer-Hubner
,
Stevel Furnell
,
Costas Lambrinoudakis
HK$560
Advances in Case-Based Reasoning (6th European Conference, ECCBR 2002 Aberdeen, Scotland, UK, September 4-7, 2002 Proceedings (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
Susan Craw
,
Alun Preece
Advances in Case-Based Reasoning (6th European Conference, ECCBR 2002 Aberdeen, Scotland, UK, September 4-7, 2002 Proceedings (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
Susan Craw
,
Alun Preece
HK$1,100
Database and Expert Systems Applications: 5th International Conference, DEXA'94, Athens, Greece, September 7 - 9, 1994. Proceedings (5th: International Conference, DEXA '94, Athens, Greece, September 7-9, 1994 - Proceedings (Lecture Notes in Computer Scie)
By
Institute of Electrical and Electronics Engineers
,
Dimitris Karagiannis
Database and Expert Systems Applications: 5th International Conference, DEXA'94, Athens, Greece, September 7 - 9, 1994. Proceedings (5th: International Conference, DEXA '94, Athens, Greece, September 7-9, 1994 - Proceedings (Lecture Notes in Computer Scie)
By
Institute of Electrical and Electronics Engineers
,
Dimitris Karagiannis
HK$1,033
Conceptual Modeling - ER '97 (16th International Conference on Conceptual Modeling, Los Angeles, Ca, USA, November 3-5, 1997: Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
David W. Embley
,
Robert C. Goldstein
Conceptual Modeling - ER '97 (16th International Conference on Conceptual Modeling, Los Angeles, Ca, USA, November 3-5, 1997: Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
David W. Embley
,
Robert C. Goldstein
HK$688
Deductive and Object-Oriented Databases (5th International Conference, DOOD'97, Montreux, Switzerland, December 8-12, 1997 Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Francois Bry
,
Raghu Ramakrishnan
,
Kotagiri Ramamohanarao
Deductive and Object-Oriented Databases (5th International Conference, DOOD'97, Montreux, Switzerland, December 8-12, 1997 Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence))
By
Francois Bry
,
Raghu Ramakrishnan
,
Kotagiri Ramamohanarao
HK$640
Feldbustechnik in Forschung, Entwicklung Und Anwendung [German] (Beitr�ge Zur Feldbustagung Fet '97 in Wien, �sterreich, 13.-14. Oktober 1997)
By
Dietmar Dietrich
,
Herbert Schweinzer
Feldbustechnik in Forschung, Entwicklung Und Anwendung [German] (Beitr�ge Zur Feldbustagung Fet '97 in Wien, �sterreich, 13.-14. Oktober 1997)
By
Dietmar Dietrich
,
Herbert Schweinzer
HK$552
Data Warehouse Systems (Design and Implementation (Data-Centric Systems and Applications))
By
Vaisman, Alejandro
,
Zimányi, Esteban
Data Warehouse Systems (Design and Implementation (Data-Centric Systems and Applications))
By
Vaisman, Alejandro
,
Zimányi, Esteban
HK$800
8
1
2
Next Page
1
2
Next Page