0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(17)
Information Theory
(2)
Logic Design
(1)
Cybernetics
(1)
Sold By
Sold By
All Sellers
Fishpond
(21)
Age Range
Age Range
All Ranges
15+
(21)
All Ages
(21)
Country
Country
All Countries
United States
(10)
Germany
(4)
Netherlands
(4)
Singapore
(1)
USA
(1)
More...
Results for "Security Books"
Security Books
84 results
Filters
Refine By
Category
Category
General
(17)
Information Theory
(2)
Logic Design
(1)
Cybernetics
(1)
Sold By
Sold By
All Sellers
Fishpond
(21)
Age Range
Age Range
All Ranges
15+
(21)
All Ages
(21)
Country
Country
All Countries
United States
(10)
Germany
(4)
Netherlands
(4)
Singapore
(1)
USA
(1)
More...
84 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Computer and Information Security Handbook (2-Volume Set)
By
John R. Vacca
Computer and Information Security Handbook (2-Volume Set)
By
John R. Vacca
HK$2,000
Cryptography and Coding (10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Nigel P. Smart
Cryptography and Coding (10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : Proceedings (Lecture Notes in Computer Science / Security and Cryptology))
By
Nigel P. Smart
HK$589
We Are All Targets (How Renegade Hackers Invented Cyber War and Unleashed an Age of Global Chaos)
By
Matt Potter
We Are All Targets (How Renegade Hackers Invented Cyber War and Unleashed an Age of Global Chaos)
By
Matt Potter
HK$176
Mike Meyers' A+ Certification Passport (Mike Meyer's Certification Passport S.)
By
Mike Meyers
,
Martin Acuna
,
Tracey J. Rosenblath
,
Scott Jernigan
Mike Meyers' A+ Certification Passport (Mike Meyer's Certification Passport S.)
By
Mike Meyers
,
Martin Acuna
,
Tracey J. Rosenblath
,
Scott Jernigan
HK$440
1
Digital Twin Technology
By
Gopal Chaudhary
,
Manju Khari
,
Mohamed Elhoseny
Digital Twin Technology
By
Gopal Chaudhary
,
Manju Khari
,
Mohamed Elhoseny
HK$397
Elsewhere
HK$464.55
Save HK$67.55 (15%)
Tech Tactics - Money Saving Secrets
By
William Keeley
,
Anthony Gaudiano
Tech Tactics - Money Saving Secrets
By
William Keeley
,
Anthony Gaudiano
HK$220
Windows PowerShell for Administration (The Personal Trainer (Personal Trainer for Technology))
By
Stanek, William
Windows PowerShell for Administration (The Personal Trainer (Personal Trainer for Technology))
By
Stanek, William
HK$320
More iOS 6 Development (Further Explorations of the iOS SDK)
By
David Mark
,
Jeff LaMarche
,
Alex Horovitz
,
Kevin Kim
More iOS 6 Development (Further Explorations of the iOS SDK)
By
David Mark
,
Jeff LaMarche
,
Alex Horovitz
,
Kevin Kim
HK$305
Elsewhere
HK$325.26
Save HK$20.26 (6%)
1
Teachers Discovering Computers (Integrating Technology in a Connected World)
By
Gary B. Shelly
,
Randolph E. Gunter
,
Glenda A. Gunter
Teachers Discovering Computers (Integrating Technology in a Connected World)
By
Gary B. Shelly
,
Randolph E. Gunter
,
Glenda A. Gunter
HK$232
Elsewhere
HK$1,053.22
Save HK$821.22 (78%)
1
Offshoring It (The Good, the Bad, and the Ugly)
By
Blunden, Bill
Offshoring It (The Good, the Bad, and the Ugly)
By
Blunden, Bill
HK$157
Elsewhere
HK$165.11
Save HK$8.11 (5%)
Business Continuity and Disaster Recovery Planning for IT Professionals
By
Susan Snedaker
Business Continuity and Disaster Recovery Planning for IT Professionals
By
Susan Snedaker
HK$640
1
Malware Forensics Field Guide for Linux Systems (Digital Forensics Field Guides)
By
James M. Aquilina
,
Cameron H. Malin
,
James M. Aquilina
Malware Forensics Field Guide for Linux Systems (Digital Forensics Field Guides)
By
James M. Aquilina
,
Cameron H. Malin
,
James M. Aquilina
HK$497
Network+ Study Guide and Practice Exams
By
Robert Shimonski
Network+ Study Guide and Practice Exams
By
Robert Shimonski
HK$218
Elsewhere
HK$258.04
Save HK$40.04 (16%)
1
IT Convergence and Services (ITCs & IRoA 2011: 2011 (Lecture Notes in Electrical Engineering))
By
James J. Park
,
Hamid R. Arabnia
,
Hang-Bae Chang
,
Taeshik Shon
IT Convergence and Services (ITCs & IRoA 2011: 2011 (Lecture Notes in Electrical Engineering))
By
James J. Park
,
Hamid R. Arabnia
,
Hang-Bae Chang
,
Taeshik Shon
HK$1,986
Computer Science and Convergence (CSA 2011 & WCC 2011 Proceedings (Lecture Notes in Electrical Engineering))
By
Jong Hyuk Park
,
Han-Chieh Chao
,
Mohammad S. Obaidat
,
Jongsung Kim
Computer Science and Convergence (CSA 2011 & WCC 2011 Proceedings (Lecture Notes in Electrical Engineering))
By
Jong Hyuk Park
,
Han-Chieh Chao
,
Mohammad S. Obaidat
,
Jongsung Kim
HK$2,840
Advanced Technologies, Embedded and Multimedia for Human-centric Computing (HumanCom and EMC 2013 (Lecture Notes in Electrical Engineering))
By
Yueh-Min Huang
,
Han-Chieh Chao
,
Der-Jiunn Deng
,
James J.
Advanced Technologies, Embedded and Multimedia for Human-centric Computing (HumanCom and EMC 2013 (Lecture Notes in Electrical Engineering))
By
Yueh-Min Huang
,
Han-Chieh Chao
,
Der-Jiunn Deng
,
James J.
HK$2,800
Ubiquitous Computing Application and Wireless Sensor (UCAWSN-14 (Lecture Notes in Electrical Engineering))
By
James J.
,
Yi Pan
,
Han-Chieh Chao
,
Gangman Yi
Ubiquitous Computing Application and Wireless Sensor (UCAWSN-14 (Lecture Notes in Electrical Engineering))
By
James J.
,
Yi Pan
,
Han-Chieh Chao
,
Gangman Yi
HK$2,000
Advances in Bioinformatics, Multimedia, and Electronics Circuits and Signals (Proceedings of GUCON 2019 (Advances in Intelligent Systems and Computing))
By
Lakhmi C. Jain
,
Maria Virvou
,
Vincenzo Piuri
,
Valentina E. Balas
Advances in Bioinformatics, Multimedia, and Electronics Circuits and Signals (Proceedings of GUCON 2019 (Advances in Intelligent Systems and Computing))
By
Lakhmi C. Jain
,
Maria Virvou
,
Vincenzo Piuri
,
Valentina E. Balas
HK$1,400
Mechanizing Mathematical Reasoning (Essays in Honor of Jörg H. Siekmann on the Occasion of His 60th Birthday (Lecture Notes in Computer Science) (Lecture Notes in Artificial Intelligence))
By
Dieter Huttler
,
Stephen Werner
Mechanizing Mathematical Reasoning (Essays in Honor of Jörg H. Siekmann on the Occasion of His 60th Birthday (Lecture Notes in Computer Science) (Lecture Notes in Artificial Intelligence))
By
Dieter Huttler
,
Stephen Werner
HK$1,076
The Universal Machine (From the Dawn of Computing to Digital Consciousness)
By
Watson, Ian
The Universal Machine (From the Dawn of Computing to Digital Consciousness)
By
Watson, Ian
HK$228
Elsewhere
HK$237.39
Save HK$9.39 (4%)
2
Number Theory and Cryptography (Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
Marc Fischlin
,
Stefan Katzenbeisser
Number Theory and Cryptography (Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
Marc Fischlin
,
Stefan Katzenbeisser
HK$500
Managing Information Security
By
John R. Vacca
Managing Information Security
By
John R. Vacca
Currently
Unavailable
Computer and Information Security Handbook
By
John R. Vacca
Computer and Information Security Handbook
By
John R. Vacca
Currently
Unavailable
Energy Security (An Interdisciplinary Approach)
By
Gawdat Bahgat
Energy Security (An Interdisciplinary Approach)
By
Gawdat Bahgat
Currently
Unavailable
1
2
3
4
Next Page
1
2
3
4
Next Page