0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Programming
Software Development
Filters
Sold By
Sold By
All Sellers
Fishpond
(184)
Age Range
Age Range
All Ranges
15+
(27)
All Ages
(7)
Country
Country
All Countries
Germany
(58)
United States
(50)
Switzerland
(28)
United Kingdom
(17)
USA
(5)
More...
Results for "The Code Of Trust"
The Code Of Trust
260 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(184)
Age Range
Age Range
All Ranges
15+
(27)
All Ages
(7)
Country
Country
All Countries
Germany
(58)
United States
(50)
Switzerland
(28)
United Kingdom
(17)
USA
(5)
More...
260 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Testing Code Security
By
van der Linden, Maura A.
Testing Code Security
By
van der Linden, Maura A.
HK$598
Testing Code Security
By
Linden, Maura A. van der
Testing Code Security
By
Linden, Maura A. van der
HK$900
Elsewhere
HK$1,006.76
Save HK$106.76 (11%)
Exploiting Software (How to Break Code)
By
Greg Hoglund
,
Gary R. McGraw
,
Aviel D. Rubin
Exploiting Software (How to Break Code)
By
Greg Hoglund
,
Gary R. McGraw
,
Aviel D. Rubin
HK$840
1
Software Evolution and Maintenance (A Practitioner's Approach)
By
Priyadarshi
,
Kshirasagar
Software Evolution and Maintenance (A Practitioner's Approach)
By
Priyadarshi
,
Kshirasagar
HK$900
Elsewhere
HK$996.08
Save HK$96.08 (10%)
The Coder's Path to Wealth and Independence
By
Beckner, Mark
The Coder's Path to Wealth and Independence
By
Beckner, Mark
HK$659
Software Durability (Concepts and Practices)
By
Kumar, Rajeev
,
Ahmad Khan, Suhel
,
Raees Ahmad Khan
Software Durability (Concepts and Practices)
By
Kumar, Rajeev
,
Ahmad Khan, Suhel
,
Raees Ahmad Khan
HK$446
Elsewhere
HK$544.43
Save HK$98.43 (18%)
Data Science (A First Introduction with Python (Chapman & Hall/CRC Data Science Series))
By
Tiffany
,
Trevor Campbell
,
Melissa Lee
,
Joel Ostblom
Data Science (A First Introduction with Python (Chapman & Hall/CRC Data Science Series))
By
Tiffany
,
Trevor Campbell
,
Melissa Lee
,
Joel Ostblom
HK$1,260
Elsewhere
HK$1,541.12
Save HK$281.12 (18%)
Data Science (A First Introduction with Python (Chapman & Hall/CRC Data Science Series))
By
Tiffany
,
Trevor Campbell
,
Melissa Lee
,
Joel Ostblom
Data Science (A First Introduction with Python (Chapman & Hall/CRC Data Science Series))
By
Tiffany
,
Trevor Campbell
,
Melissa Lee
,
Joel Ostblom
HK$600
Alice and Bob Learn Secure Coding
By
Tanya Janca
Alice and Bob Learn Secure Coding
By
Tanya Janca
HK$354
Elsewhere
HK$390.31
Save HK$36.31 (9%)
The Continuing Arms Race (Code-Reuse Attacks and Defenses)
By
Per Larsen
,
Ahmad-Reza Sadeghi
The Continuing Arms Race (Code-Reuse Attacks and Defenses)
By
Per Larsen
,
Ahmad-Reza Sadeghi
HK$753
The Continuing Arms Race (Code-Reuse Attacks and Defenses)
By
Per Larsen
,
Ahmad-Reza Sadeghi
The Continuing Arms Race (Code-Reuse Attacks and Defenses)
By
Per Larsen
,
Ahmad-Reza Sadeghi
HK$1,018
Liquid Software (How to Achieve Trusted Continuous Updates in the Devops World)
By
Fred Simon
,
Yoav Landman
,
Baruch Sadogursky
Liquid Software (How to Achieve Trusted Continuous Updates in the Devops World)
By
Fred Simon
,
Yoav Landman
,
Baruch Sadogursky
HK$170
Writing Secure Code (Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World)
By
Michael Howard
,
David E. LeBlanc
,
David LeBlanc
Writing Secure Code (Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World)
By
Michael Howard
,
David E. LeBlanc
,
David LeBlanc
HK$480
373
The Privacy Engineer's Manifesto (Getting from Policy to Code to Qa to Value)
By
Dennedy, Michelle
,
Finneran, Tom
,
Tom Finneran
The Privacy Engineer's Manifesto (Getting from Policy to Code to Qa to Value)
By
Dennedy, Michelle
,
Finneran, Tom
,
Tom Finneran
HK$476
A Practical Guide to TPM 2.0 (Using the Trusted Platform Module in the New Age of Security)
By
Challener, David
,
Arthur, Will
A Practical Guide to TPM 2.0 (Using the Trusted Platform Module in the New Age of Security)
By
Challener, David
,
Arthur, Will
HK$482
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
HK$306
Elsewhere
HK$360.19
Save HK$54.19 (15%)
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
HK$407
Autonomic and Trusted Computing (4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Bin Xiao
,
Laurence Tianruo Yang
,
Christian Muller-Schloer
,
Christian Muller-Schloer
Autonomic and Trusted Computing (4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings (Lecture Notes in Computer Science) (Programming and Software Engineering))
By
Bin Xiao
,
Laurence Tianruo Yang
,
Christian Muller-Schloer
,
Christian Muller-Schloer
HK$579
Generative Analysis (The Power of Generative AI for Object-Oriented Software Engineering with UML)
By
Arlow, Jim
,
Neustadt, Ila
Generative Analysis (The Power of Generative AI for Object-Oriented Software Engineering with UML)
By
Arlow, Jim
,
Neustadt, Ila
HK$596
The Dark Side of Software Engineering (Evil on Computing Projects)
By
Rost, Johann
,
Glass, Robert L.
The Dark Side of Software Engineering (Evil on Computing Projects)
By
Rost, Johann
,
Glass, Robert L.
HK$414
Async Rust (Unleashing the Power of Fearless Concurrency)
By
Maxwell Flitton
,
Caroline Morton
Async Rust (Unleashing the Power of Fearless Concurrency)
By
Maxwell Flitton
,
Caroline Morton
HK$348
Elsewhere
HK$493.06
Save HK$145.06 (29%)
Reversing (Secrets of Reverse Engineering)
By
Eilam, Eldad
Reversing (Secrets of Reverse Engineering)
By
Eilam, Eldad
HK$260
Elsewhere
HK$277.40
Save HK$17.40 (6%)
543
The Future of Human-Computer Integration (Industry 5.0 Technology, Tools, and Algorithms)
By
Norliza Katuk
,
Roberto Vergallo
,
Tito Sugiharto
The Future of Human-Computer Integration (Industry 5.0 Technology, Tools, and Algorithms)
By
Norliza Katuk
,
Roberto Vergallo
,
Tito Sugiharto
HK$376
The Future of Human-Computer Integration (Industry 5.0 Technology, Tools, and Algorithms)
By
Norliza Katuk
,
Roberto Vergallo
,
Tito Sugiharto
The Future of Human-Computer Integration (Industry 5.0 Technology, Tools, and Algorithms)
By
Norliza Katuk
,
Roberto Vergallo
,
Tito Sugiharto
HK$500
Elsewhere
HK$667.72
Save HK$167.72 (25%)
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page