0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Operating Systems
Filters
Refine By
Category
Category
General
(260)
Windows
(162)
Linux
(97)
Unix
(42)
MacOS
(34)
MS-DOS
(1)
Sold By
Sold By
All Sellers
Fishpond
(486)
Age Range
Age Range
All Ranges
15+
(53)
All Ages
(39)
Country
Country
All Countries
United States
(257)
Germany
(102)
United Kingdom
(79)
USA
(18)
Switzerland
(5)
More...
Results for "Web Application Security"
Web Application Security
1,172 results
Filters
Refine By
Category
Category
General
(260)
Windows
(162)
Linux
(97)
Unix
(42)
MacOS
(34)
MS-DOS
(1)
Sold By
Sold By
All Sellers
Fishpond
(486)
Age Range
Age Range
All Ranges
15+
(53)
All Ages
(39)
Country
Country
All Countries
United States
(257)
Germany
(102)
United Kingdom
(79)
USA
(18)
Switzerland
(5)
More...
1,172 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Ambient Intelligence (Proceedings of the European Conference, AMI 2007, Darmstadt, Germany, November 7-10, 2007 (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Bernt Schiele
,
Anind K. Dey
,
Hans W. Gellersen
,
Boris de Ruyter
Ambient Intelligence (Proceedings of the European Conference, AMI 2007, Darmstadt, Germany, November 7-10, 2007 (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI))
By
Bernt Schiele
,
Anind K. Dey
,
Hans W. Gellersen
,
Boris de Ruyter
HK$534
Computer Supported Cooperative Work in Design IV (11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer ..)
By
Jean-Paul A. Barthes
,
Weiming Shen
,
Yun Yang
,
Yun Yang
Computer Supported Cooperative Work in Design IV (11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers (Information Systems and Applications, incl. Internet/Web, and HCI) (Lecture Notes in Computer ..)
By
Jean-Paul A. Barthes
,
Weiming Shen
,
Yun Yang
,
Yun Yang
HK$1,036
Intelligence and Security Informatics (Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Hsinchun Chen
,
Christopher C. Yang
,
Michael Chau
,
Shu-Hsing Li
Intelligence and Security Informatics (Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Hsinchun Chen
,
Christopher C. Yang
,
Michael Chau
,
Shu-Hsing Li
HK$487
Information Security and Privacy (14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Colin Boyd
,
Juan M. Gonzalez Nieto
Information Security and Privacy (14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings (Lecture Notes in Computer Science) (Security and Cryptology))
By
Colin Boyd
,
Juan M. Gonzalez Nieto
HK$553
Secure Data Management (6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009, Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Willem Jonker
,
Milan Petkovic
Secure Data Management (6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009, Proceedings (Lecture Notes in Computer Science) (Information Systems and Applications, incl. Internet/Web, and HCI))
By
Willem Jonker
,
Milan Petkovic
HK$488
Advances in Information and Computer Security (4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Tsuyoshi Takagi
,
Masahiro Mambo
Advances in Information and Computer Security (4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings (Security and Cryptology) (Lecture Notes in Computer Science))
By
Tsuyoshi Takagi
,
Masahiro Mambo
HK$498
Mastering Rest APIs (Boosting Your Web Development Journey with Advanced API Techniques)
By
Selvaraj, Sivaraj
Mastering Rest APIs (Boosting Your Web Development Journey with Advanced API Techniques)
By
Selvaraj, Sivaraj
HK$413
Elsewhere
HK$500.52
Save HK$87.52 (17%)
Linux Hardening in Hostile Networks (Server Security from TLS to Tor (Pearson Open Source Software Development Series))
By
Rankin, Kyle
Linux Hardening in Hostile Networks (Server Security from TLS to Tor (Pearson Open Source Software Development Series))
By
Rankin, Kyle
HK$269
Elsewhere
HK$295.17
Save HK$26.17 (9%)
Programming "Indigo" (The Code Name for the Unified Framework for Building Service-oriented Applications on the Microsoft Windows Platform)
By
D. Pallman
Programming "Indigo" (The Code Name for the Unified Framework for Building Service-oriented Applications on the Microsoft Windows Platform)
By
D. Pallman
HK$700
1
Microsoft .Net Framework 2.0 Distributed Application Development (MCTS Self-Paced Training Kit (Exam 70-529) [With CDROM])
By
Bill Ryan
,
Sarah Morgan
,
Shannon Horn
,
M. Blomsma
Microsoft .Net Framework 2.0 Distributed Application Development (MCTS Self-Paced Training Kit (Exam 70-529) [With CDROM])
By
Bill Ryan
,
Sarah Morgan
,
Shannon Horn
,
M. Blomsma
HK$1,200
1
MCTS Self-Paced Training Kit (Exam 70-643) (Configuring Windows Server(r) 2008 Applications Infrastructure [With CDROM])
By
J. C. Mackin
,
Anil Desai
MCTS Self-Paced Training Kit (Exam 70-643) (Configuring Windows Server(r) 2008 Applications Infrastructure [With CDROM])
By
J. C. Mackin
,
Anil Desai
HK$700
1
MCTS: Windows Server 2008 Applications Infrastructure Configuration Study Guide (Exam 70-643)
By
Joel Stidley
,
Rawlinson Rivera
MCTS: Windows Server 2008 Applications Infrastructure Configuration Study Guide (Exam 70-643)
By
Joel Stidley
,
Rawlinson Rivera
HK$195
Elsewhere
HK$340.32
Save HK$145.32 (43%)
1
Building Cocoa Applications (A Step by Step Guide: A Step by Step Guide)
By
Simson Garfinkel
,
Michael K. Mahoney
Building Cocoa Applications (A Step by Step Guide: A Step by Step Guide)
By
Simson Garfinkel
,
Michael K. Mahoney
HK$460
Elsewhere
HK$520.55
Save HK$60.55 (12%)
1
Access Database Design & Programming (Creating Programmable Database Applications with Access 97, 2000, 2002 & 2003)
By
Roman, Steven
Access Database Design & Programming (Creating Programmable Database Applications with Access 97, 2000, 2002 & 2003)
By
Roman, Steven
HK$277
Elsewhere
HK$320.30
Save HK$43.30 (14%)
1
Programming .Net Components (Design and Build .Net Applications Using Component-Oriented Programming)
By
Lowy, Juval
Programming .Net Components (Design and Build .Net Applications Using Component-Oriented Programming)
By
Lowy, Juval
HK$337
Elsewhere
HK$400.40
Save HK$63.40 (16%)
1
Building a Web 2.0 Portal with ASP.NET 3.5 (Learn How to Build a State-Of-The-Art Ajax Start Page Using Asp.Net, .Net 3.5, Linq, Windows Wf, and More)
By
Zabir, Omar Al
Building a Web 2.0 Portal with ASP.NET 3.5 (Learn How to Build a State-Of-The-Art Ajax Start Page Using Asp.Net, .Net 3.5, Linq, Windows Wf, and More)
By
Zabir, Omar Al
HK$286
Elsewhere
HK$360.35
Save HK$74.35 (21%)
1
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) [With DVD ROM and Access Code]
By
John Tucker
,
Darrel Nerove
,
Greg Tomsho
,
Greg Tomsho
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) [With DVD ROM and Access Code]
By
John Tucker
,
Darrel Nerove
,
Greg Tomsho
,
Greg Tomsho
HK$497
Elsewhere
HK$630.68
Save HK$133.68 (21%)
1
Network Optimization in Intelligent Internet of Things Applications (Principles and Challenges)
By
Payal Khurana Batra
,
Pawan Singh Mehra
,
Sudeep Tanwar
Network Optimization in Intelligent Internet of Things Applications (Principles and Challenges)
By
Payal Khurana Batra
,
Pawan Singh Mehra
,
Sudeep Tanwar
HK$984
Elsewhere
HK$1,501.87
Save HK$517.87 (34%)
Federated Learning for Smart Communication using IoT Application (Chapman & Hall/CRC Cyber-Physical Systems)
By
Kaushal Kishor
,
Parma Nand
,
Vishal Jain
,
Neetesh Saxena
Federated Learning for Smart Communication using IoT Application (Chapman & Hall/CRC Cyber-Physical Systems)
By
Kaushal Kishor
,
Parma Nand
,
Vishal Jain
,
Neetesh Saxena
HK$940
Elsewhere
HK$1,451.81
Save HK$511.81 (35%)
Learn OpenShift (Deploy, build, manage, and migrate applications with OpenShift Origin 3.9)
By
Denis Zuev
,
Artemii Kropachev
,
Aleksey Usov
Learn OpenShift (Deploy, build, manage, and migrate applications with OpenShift Origin 3.9)
By
Denis Zuev
,
Artemii Kropachev
,
Aleksey Usov
HK$410
Practical Linux Security Cookbook (Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition)
By
Kalsi, Tajinder
Practical Linux Security Cookbook (Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition)
By
Kalsi, Tajinder
HK$453
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214) (Study Guide and DVD Training System)
By
Syngress Media
,
Will Schmied
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214) (Study Guide and DVD Training System)
By
Syngress Media
,
Will Schmied
HK$451
1
Demystifying Cryptography with OpenSSL 3.0 (Discover the best techniques to enhance your network security with OpenSSL 3.0)
By
Alexei Khlebnikov
,
Jarle Adolfsen
Demystifying Cryptography with OpenSSL 3.0 (Discover the best techniques to enhance your network security with OpenSSL 3.0)
By
Alexei Khlebnikov
,
Jarle Adolfsen
HK$389
Effective Threat Investigation for SOC Analysts (The ultimate guide to examining various threats and attacker techniques using security logs)
By
Mostafa Yahia
Effective Threat Investigation for SOC Analysts (The ultimate guide to examining various threats and attacker techniques using security logs)
By
Mostafa Yahia
HK$500
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page