0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Computer Science
Filters
Refine By
Category
Category
General
(900)
Information Theory
(240)
Data Processing
(140)
Logic Design
(126)
Data Modeling
(94)
Cybernetics
(90)
Neural Networks
(29)
Natural Language Processing
(26)
Parallel
(8)
Sold By
Sold By
All Sellers
Fishpond
(1,532)
Age Range
Age Range
All Ranges
15+
(190)
All Ages
(43)
Country
Country
All Countries
Germany
(427)
United States
(356)
Switzerland
(260)
United Kingdom
(182)
Singapore
(45)
More...
Results for "Web Application Security"
Web Application Security
2,096 results
Filters
Refine By
Category
Category
General
(900)
Information Theory
(240)
Data Processing
(140)
Logic Design
(126)
Data Modeling
(94)
Cybernetics
(90)
Neural Networks
(29)
Natural Language Processing
(26)
Parallel
(8)
Sold By
Sold By
All Sellers
Fishpond
(1,532)
Age Range
Age Range
All Ranges
15+
(190)
All Ages
(43)
Country
Country
All Countries
Germany
(427)
United States
(356)
Switzerland
(260)
United Kingdom
(182)
Singapore
(45)
More...
2,096 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
System Programming Essentials with Go (System calls, networking, efficiency, and security practices with practical projects in Golang)
By
Alex Rios
System Programming Essentials with Go (System calls, networking, efficiency, and security practices with practical projects in Golang)
By
Alex Rios
HK$411
Kubernetes - A Complete DevOps Cookbook (Build and manage your applications, orchestrate containers, and deploy cloud-native services)
By
Karslioglu, Murat
Kubernetes - A Complete DevOps Cookbook (Build and manage your applications, orchestrate containers, and deploy cloud-native services)
By
Karslioglu, Murat
HK$456
CCSP (ISC)2 Certified Cloud Security Professional (Exam Guide: Build your knowledge to pass the CCSP exam with expert guidance)
By
Omar A. Turner
,
Navya Lakshmana
CCSP (ISC)2 Certified Cloud Security Professional (Exam Guide: Build your knowledge to pass the CCSP exam with expert guidance)
By
Omar A. Turner
,
Navya Lakshmana
HK$540
Mastering Docker - Fourth Edition (Enhance your containerization and DevOps skills to deliver production-ready applications)
By
Mckendrick, Russ
Mastering Docker - Fourth Edition (Enhance your containerization and DevOps skills to deliver production-ready applications)
By
Mckendrick, Russ
HK$454
Cloud Computing: (Master the Concepts, Architecture and Applications with Real-world examples and Case studies)
By
Doshi, Ruchi
,
Fagbola, Temitayo
Cloud Computing: (Master the Concepts, Architecture and Applications with Real-world examples and Case studies)
By
Doshi, Ruchi
,
Fagbola, Temitayo
HK$240
Elsewhere
HK$277.88
Save HK$37.88 (14%)
Ubiquitous Information Technologies and Applications (CUTE 2012 (Lecture Notes in Electrical Engineering))
By
Youn-Hee Han
,
Doo-Soon Park
,
Weijia Jia
,
Sang-Soo Yeo
Ubiquitous Information Technologies and Applications (CUTE 2012 (Lecture Notes in Electrical Engineering))
By
Youn-Hee Han
,
Doo-Soon Park
,
Weijia Jia
,
Sang-Soo Yeo
HK$1,900
Ubiquitous Computing Application and Wireless Sensor (UCAWSN-14 (Lecture Notes in Electrical Engineering))
By
James J.
,
Yi Pan
,
Han-Chieh Chao
,
Gangman Yi
Ubiquitous Computing Application and Wireless Sensor (UCAWSN-14 (Lecture Notes in Electrical Engineering))
By
James J.
,
Yi Pan
,
Han-Chieh Chao
,
Gangman Yi
HK$1,900
Ubiquitous Computing Application and Wireless Sensor (UCAWSN-14 (Lecture Notes in Electrical Engineering))
By
James J.
,
Yi Pan
,
Han-Chieh Chao
,
Gangman Yi
Ubiquitous Computing Application and Wireless Sensor (UCAWSN-14 (Lecture Notes in Electrical Engineering))
By
James J.
,
Yi Pan
,
Han-Chieh Chao
,
Gangman Yi
HK$1,874
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing (Theory and Applications: FICTA 2016, Volume 1 (Advances in Intelligent Systems and Computing))
By
Suresh Chandra Satapathy
,
Vikrant Bhateja
,
Siba K. Udgata
,
Prasant Kumar Pattnaik
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing (Theory and Applications: FICTA 2016, Volume 1 (Advances in Intelligent Systems and Computing))
By
Suresh Chandra Satapathy
,
Vikrant Bhateja
,
Siba K. Udgata
,
Prasant Kumar Pattnaik
HK$1,800
Frontier Computing (Theory, Technologies and Applications FC 2016 (Lecture Notes in Electrical Engineering))
By
Neil Y. Yen
,
Jason C. Hung
Frontier Computing (Theory, Technologies and Applications FC 2016 (Lecture Notes in Electrical Engineering))
By
Neil Y. Yen
,
Jason C. Hung
HK$2,600
New Trends in Computer Technologies and Applications (25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings (Communications in Computer and Information Science))
By
Sun-Yuan Hsieh
,
Ling-Ju Hung
,
Ralf Klasing
,
Chia-Wei Lee
New Trends in Computer Technologies and Applications (25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings (Communications in Computer and Information Science))
By
Sun-Yuan Hsieh
,
Ling-Ju Hung
,
Ralf Klasing
,
Chia-Wei Lee
HK$1,040
Information Flow Based Security Control Beyond RBAC (How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) (IT im Unternehmen))
By
Klaus-Peter Fischer-Hellmann
,
Rainer Bischoff
Information Flow Based Security Control Beyond RBAC (How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) (IT im Unternehmen))
By
Klaus-Peter Fischer-Hellmann
,
Rainer Bischoff
HK$491
From Sociology to Computing in Social Networks (Theory, Foundations and Applications (Lecture Notes in Social Networks))
By
Nasrullah Memon
,
Reda Alhajj
From Sociology to Computing in Social Networks (Theory, Foundations and Applications (Lecture Notes in Social Networks))
By
Nasrullah Memon
,
Reda Alhajj
HK$1,360
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214) (Study Guide and DVD Training System)
By
Syngress Media
,
Will Schmied
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214) (Study Guide and DVD Training System)
By
Syngress Media
,
Will Schmied
HK$454
1
PHP: This book includes (PHP Basics for Beginners + PHP security and session management + Advanced PHP functions (PHP))
By
Vickler, Andy
PHP: This book includes (PHP Basics for Beginners + PHP security and session management + Advanced PHP functions (PHP))
By
Vickler, Andy
HK$427
Elsewhere
HK$483.79
Save HK$56.79 (12%)
Artificial Intelligence and Security (5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III (Lecture Notes in Computer Science))
By
Xingming Sun
,
Zhaoqing Pan
,
Elisa Bertino
Artificial Intelligence and Security (5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III (Lecture Notes in Computer Science))
By
Xingming Sun
,
Zhaoqing Pan
,
Elisa Bertino
HK$585
Formal Methods for Software Engineering (Languages, Methods, Application Domains (Texts in Theoretical Computer Science. An EATCS Series))
By
Roggenbach, Markus
,
Cerone, Antonio
,
Bernd-Holger Schlingloff
,
Gerardo Schneider
Formal Methods for Software Engineering (Languages, Methods, Application Domains (Texts in Theoretical Computer Science. An EATCS Series))
By
Roggenbach, Markus
,
Cerone, Antonio
,
Bernd-Holger Schlingloff
,
Gerardo Schneider
HK$480
Elsewhere
HK$669.11
Save HK$189.11 (28%)
Formal Methods for Software Engineering (Languages, Methods, Application Domains (Texts in Theoretical Computer Science. An EATCS Series))
By
Markus Roggenbach
,
Antonio Cerone
,
Bernd-Holger Schlingloff
Formal Methods for Software Engineering (Languages, Methods, Application Domains (Texts in Theoretical Computer Science. An EATCS Series))
By
Markus Roggenbach
,
Antonio Cerone
,
Bernd-Holger Schlingloff
HK$310
Elsewhere
HK$514.68
Save HK$204.68 (40%)
Internet of Things, Infrastructures and Mobile Applications (Proceedings of the 13th IMCL Conference (Advances in Intelligent Systems and Computing))
By
Michael E Auer
,
Thrasyvoulos Tsiatsos
Internet of Things, Infrastructures and Mobile Applications (Proceedings of the 13th IMCL Conference (Advances in Intelligent Systems and Computing))
By
Michael E Auer
,
Thrasyvoulos Tsiatsos
HK$1,900
Cyber Security and Computer Science (Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Touhid Bhuiyan
,
Md. Mostafijur Rahman
,
Md. Asraf Ali
Cyber Security and Computer Science (Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering))
By
Touhid Bhuiyan
,
Md. Mostafijur Rahman
,
Md. Asraf Ali
HK$1,300
Financial Cryptography and Data Security (FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Matthew Bernhard
,
Andrea Bracciali
,
L. Jean Camp
,
Shin'ichiro Matsuo
Financial Cryptography and Data Security (FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Matthew Bernhard
,
Andrea Bracciali
,
L. Jean Camp
,
Shin'ichiro Matsuo
HK$1,078
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020, Volume 1 (Advances in Intelligent Systems and Computing))
By
John MacIntyre
,
Jinghua Zhao
,
Xiaomeng Ma
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020, Volume 1 (Advances in Intelligent Systems and Computing))
By
John MacIntyre
,
Jinghua Zhao
,
Xiaomeng Ma
HK$1,854
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020, Volume 2 (Advances in Intelligent Systems and Computing))
By
John MacIntyre
,
Jinghua Zhao
,
Xiaomeng Ma
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020, Volume 2 (Advances in Intelligent Systems and Computing))
By
John MacIntyre
,
Jinghua Zhao
,
Xiaomeng Ma
HK$1,851
Emerging Technologies for Authorization and Authentication (Third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Andrea Saracino
,
Paolo Mori
Emerging Technologies for Authorization and Authentication (Third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Andrea Saracino
,
Paolo Mori
HK$485
Previous Page
1
...
16
17
18
19
20
21
22
23
24
Next Page
Previous Page
1
...
16
17
18
19
20
21
22
23
24
Next Page