0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Programming
Filters
Refine By
Category
Category
Software Development
(187)
General
(113)
Systems Design
(77)
Algorithms
(31)
Compilers
(23)
Object Oriented
(9)
Python
(7)
SQL
(6)
Java
(5)
C#
(2)
Visual Basic
(1)
C++
(1)
HTML
(1)
CGI
(1)
XML
(1)
Sold By
Sold By
All Sellers
Fishpond
(306)
Age Range
Age Range
All Ranges
15+
(29)
All Ages
(6)
Country
Country
All Countries
United States
(89)
Germany
(77)
United Kingdom
(48)
Switzerland
(29)
Netherlands
(4)
More...
Results for "Operational Security"
Operational Security
421 results
Filters
Refine By
Category
Category
Software Development
(187)
General
(113)
Systems Design
(77)
Algorithms
(31)
Compilers
(23)
Object Oriented
(9)
Python
(7)
SQL
(6)
Java
(5)
C#
(2)
Visual Basic
(1)
C++
(1)
HTML
(1)
CGI
(1)
XML
(1)
Sold By
Sold By
All Sellers
Fishpond
(306)
Age Range
Age Range
All Ranges
15+
(29)
All Ages
(6)
Country
Country
All Countries
United States
(89)
Germany
(77)
United Kingdom
(48)
Switzerland
(29)
Netherlands
(4)
More...
421 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
The Wireshark Field Guide (Analyzing and Troubleshooting Network Traffic)
By
Shimonski, Robert (is a networking and security veteran with ove
The Wireshark Field Guide (Analyzing and Troubleshooting Network Traffic)
By
Shimonski, Robert (is a networking and security veteran with ove
HK$233
Elsewhere
HK$246.48
Save HK$13.48 (5%)
9
Penetration Tester's Open Source Toolkit 4e
By
Faircloth, Jeremy
Penetration Tester's Open Source Toolkit 4e
By
Faircloth, Jeremy
HK$500
Building in Security at Agile Speed
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Brook S.E. Schoenfield
Building in Security at Agile Speed
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Brook S.E. Schoenfield
HK$600
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
HK$900
Elsewhere
HK$1,335.64
Save HK$435.64 (33%)
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
HK$465
Elsewhere
HK$482.78
Save HK$17.78 (4%)
Operational Semantics and Verification of Security Protocols (Information Security and Cryptography)
By
Cremers, Cas
,
Mauw, Sjouke
Operational Semantics and Verification of Security Protocols (Information Security and Cryptography)
By
Cremers, Cas
,
Mauw, Sjouke
HK$600
Semantics of Probabilistic Processes (An Operational Approach)
By
Deng, Yuxin
Semantics of Probabilistic Processes (An Operational Approach)
By
Deng, Yuxin
HK$500
Semantics of Probabilistic Processes (An Operational Approach)
By
Deng, Yuxin
Semantics of Probabilistic Processes (An Operational Approach)
By
Deng, Yuxin
HK$796
Information Processing and Security Systems
By
Khalid Saeed
,
Jerzy Pejas
Information Processing and Security Systems
By
Khalid Saeed
,
Jerzy Pejas
HK$1,936
Information Processing and Security Systems
By
Khalid Saeed
,
Jerzy Pejas
Information Processing and Security Systems
By
Khalid Saeed
,
Jerzy Pejas
HK$1,776
Elsewhere
HK$1,849.24
Save HK$73.24 (4%)
Handbook of FPGA Design Security
By
Huffmire, Ted
,
Irvine, Cynthia
,
Thuy D. Nguyen
Handbook of FPGA Design Security
By
Huffmire, Ted
,
Irvine, Cynthia
,
Thuy D. Nguyen
HK$899
Handbook of FPGA Design Security
By
Huffmire, Ted
,
Irvine, Cynthia
,
Thuy D. Nguyen
,
Timothy Levin
Handbook of FPGA Design Security
By
Huffmire, Ted
,
Irvine, Cynthia
,
Thuy D. Nguyen
,
Timothy Levin
HK$930
Demystifying Devsecops in Aws (Achieve Operational Excellence in the Cloud with Devsecops)
By
Paul Picklu
Demystifying Devsecops in Aws (Achieve Operational Excellence in the Cloud with Devsecops)
By
Paul Picklu
HK$376
Building in Security at Agile Speed
By
James Ransome
,
Brook S. E. Schoenfield
Building in Security at Agile Speed
By
James Ransome
,
Brook S. E. Schoenfield
HK$419
Elsewhere
HK$462.23
Save HK$43.23 (9%)
Practical Core Software Security (A Reference Framework)
By
Ransome, James F., PhD, CISM, CISSP
,
Misra, Anmol
,
Mark S. Merkow
Practical Core Software Security (A Reference Framework)
By
Ransome, James F., PhD, CISM, CISSP
,
Misra, Anmol
,
Mark S. Merkow
HK$690
Elsewhere
HK$811.55
Save HK$121.55 (15%)
Practical Core Software Security (A Reference Framework)
By
Ransome, James F., PhD, CISM, CISSP
,
Misra, Anmol
,
Mark S. Merkow
Practical Core Software Security (A Reference Framework)
By
Ransome, James F., PhD, CISM, CISSP
,
Misra, Anmol
,
Mark S. Merkow
HK$1,500
Elsewhere
HK$1,952.08
Save HK$452.08 (23%)
System Reliability and Security (Techniques and Methodologies)
By
Javaid Iqbal
,
Faheem Syeed Masoodi
,
Ishfaq Ahmad Malik
,
Shozab Khurshid
System Reliability and Security (Techniques and Methodologies)
By
Javaid Iqbal
,
Faheem Syeed Masoodi
,
Ishfaq Ahmad Malik
,
Shozab Khurshid
HK$500
System Reliability and Security (Techniques and Methodologies)
By
Javaid Iqbal
,
Faheem Syeed Masoodi
,
Ishfaq Ahmad Malik
,
Shozab Khurshid
System Reliability and Security (Techniques and Methodologies)
By
Javaid Iqbal
,
Faheem Syeed Masoodi
,
Ishfaq Ahmad Malik
,
Shozab Khurshid
HK$1,094
Learning Continuous Integration with Jenkins - Third Edition (An end-to-end guide to creating operational, secure, resilient, and cost-effective CI/CD)
By
Nikhil Pathania
Learning Continuous Integration with Jenkins - Third Edition (An end-to-end guide to creating operational, secure, resilient, and cost-effective CI/CD)
By
Nikhil Pathania
HK$478
Impacts and Risk Assessment of Technology for Internet Security (Enabled Information Small-Medium Enterprises (TEISMES) (Advances in Information Security))
By
Shoniregun, Charles A.
Impacts and Risk Assessment of Technology for Internet Security (Enabled Information Small-Medium Enterprises (TEISMES) (Advances in Information Security))
By
Shoniregun, Charles A.
HK$1,035
CompTIA A+ Core 2 Exam (Guide to Operating Systems and Security)
By
Jill
,
Jean Andrews
,
Joy Shelton
CompTIA A+ Core 2 Exam (Guide to Operating Systems and Security)
By
Jill
,
Jean Andrews
,
Joy Shelton
HK$760
Elsewhere
HK$801.28
Save HK$41.28 (5%)
Impacts and Risk Assessment of Technology for Internet Security (Enabled Information Small-Medium Enterprises (TEISMES) (Advances in Information Security))
By
Shoniregun, Charles A.
Impacts and Risk Assessment of Technology for Internet Security (Enabled Information Small-Medium Enterprises (TEISMES) (Advances in Information Security))
By
Shoniregun, Charles A.
HK$900
Practical Information Security Management (A Complete Guide to Planning and Implementation)
By
Campbell, Tony
Practical Information Security Management (A Complete Guide to Planning and Implementation)
By
Campbell, Tony
HK$600
Elsewhere
HK$667.72
Save HK$67.72 (10%)
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page