0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Business
Movies
Music
All Products
\n
Books
Business
Movies
Music
Business
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Business
Filters
Refine By
Category
Category
Operations
(2)
Management
(1)
Development
(1)
Government & Business
(1)
Infrastructure
(1)
Sold By
Sold By
All Sellers
Fishpond
(5)
Country
Country
All Countries
United Kingdom
(2)
United States
(1)
Results for "SQL Exploits Books"
SQL Exploits Books
10 results
Filters
Refine By
Category
Category
Operations
(2)
Management
(1)
Development
(1)
Government & Business
(1)
Infrastructure
(1)
Sold By
Sold By
All Sellers
Fishpond
(5)
Country
Country
All Countries
United Kingdom
(2)
United States
(1)
10 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
HK$1,100
Elsewhere
HK$1,647.82
Save HK$547.82 (33%)
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
HK$485
Seven Deadliest Web Application Attacks
By
Mike Shema
Seven Deadliest Web Application Attacks
By
Mike Shema
HK$194
2
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences & Innovative Business Technology)
By
Adarsh Kumar
,
Neelu Jyothi Ahuja
,
Keshav Kaushik
,
Deepak Singh Tomar
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences & Innovative Business Technology)
By
Adarsh Kumar
,
Neelu Jyothi Ahuja
,
Keshav Kaushik
,
Deepak Singh Tomar
HK$1,188
Elsewhere
HK$1,338.75
Save HK$150.75 (11%)
Microsoft SQL Server 2012 Internals (Developer Reference)
By
Kalen Delaney
,
Craig Freeman
Microsoft SQL Server 2012 Internals (Developer Reference)
By
Kalen Delaney
,
Craig Freeman
Currently
Unavailable
The Effects of Cyber Supply Chain Attacks and Mitigation Strategies
By
Ravi Das
The Effects of Cyber Supply Chain Attacks and Mitigation Strategies
By
Ravi Das
Currently
Unavailable
The Effects of Cyber Supply Chain Attacks and Mitigation Strategies
By
Ravi Das
The Effects of Cyber Supply Chain Attacks and Mitigation Strategies
By
Ravi Das
Currently
Unavailable
Microsoft BizTalk Server 2004 Unleashed
By
Scott Woodgate
,
Stephen Mohr
,
Brian Loesgen
Microsoft BizTalk Server 2004 Unleashed
By
Scott Woodgate
,
Stephen Mohr
,
Brian Loesgen
2
Currently
Unavailable
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide)
By
Mike
,
Stewart, James Michael
,
Darril Gibson
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide)
By
Mike
,
Stewart, James Michael
,
Darril Gibson
Currently
Unavailable