0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Programming
Filters
Refine By
Category
Category
Software Development
(56)
General
(31)
Systems Design
(29)
Algorithms
(17)
Python
(4)
CGI
(2)
Object Oriented
(2)
Compilers
(1)
Java
(1)
Sold By
Sold By
All Sellers
Fishpond
(114)
Age Range
Age Range
All Ranges
15+
(3)
All Ages
(3)
Country
Country
All Countries
United States
(37)
United Kingdom
(35)
Switzerland
(6)
Germany
(4)
Singapore
(3)
More...
Results for "Security Risk Management Books"
Security Risk Management Books
173 results
Filters
Refine By
Category
Category
Software Development
(56)
General
(31)
Systems Design
(29)
Algorithms
(17)
Python
(4)
CGI
(2)
Object Oriented
(2)
Compilers
(1)
Java
(1)
Sold By
Sold By
All Sellers
Fishpond
(114)
Age Range
Age Range
All Ranges
15+
(3)
All Ages
(3)
Country
Country
All Countries
United States
(37)
United Kingdom
(35)
Switzerland
(6)
Germany
(4)
Singapore
(3)
More...
173 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Penetration Tester's Open Source Toolkit 4e
By
Faircloth, Jeremy
Penetration Tester's Open Source Toolkit 4e
By
Faircloth, Jeremy
HK$500
Advanced Persistent Security (A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies)
By
Winkler, Ira
,
Treu Gomes, Araceli (Intelligence and Investigations Subject Man
Advanced Persistent Security (A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies)
By
Winkler, Ira
,
Treu Gomes, Araceli (Intelligence and Investigations Subject Man
HK$387
Secure and Resilient Software (Requirements, Test Cases, and Testing Methods [With CDROM])
By
Merkow, Mark S. (Technical Security Strategy, Scottsdale, Arizon
,
Raghavan, Lakshmikanth
Secure and Resilient Software (Requirements, Test Cases, and Testing Methods [With CDROM])
By
Merkow, Mark S. (Technical Security Strategy, Scottsdale, Arizon
,
Raghavan, Lakshmikanth
HK$700
Elsewhere
HK$795.55
Save HK$95.55 (12%)
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
HK$900
Elsewhere
HK$1,309.30
Save HK$409.30 (31%)
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
HK$460
Android Security (Attacks and Defenses)
By
Misra, Anmol
,
Dubey, Abhishek
Android Security (Attacks and Defenses)
By
Misra, Anmol
,
Dubey, Abhishek
HK$460
Essential PHP Security
By
Shiflett, Chris
Essential PHP Security
By
Shiflett, Chris
HK$180
Elsewhere
HK$241.62
Save HK$61.62 (26%)
184
Security for Service Oriented Architectures
By
Walter Williams
Security for Service Oriented Architectures
By
Walter Williams
HK$1,488
Elsewhere
HK$1,762.51
Save HK$274.51 (16%)
Android Security (Attacks and Defenses)
By
Misra, Anmol
,
Dubey, Abhishek
Android Security (Attacks and Defenses)
By
Misra, Anmol
,
Dubey, Abhishek
HK$500
Elsewhere
HK$614.26
Save HK$114.26 (19%)
Security for Service Oriented Architectures
By
Williams, Walter
Security for Service Oriented Architectures
By
Williams, Walter
HK$489
Elsewhere
HK$624.33
Save HK$135.33 (22%)
1
Practical Information Security Management (A Complete Guide to Planning and Implementation)
By
Campbell, Tony
Practical Information Security Management (A Complete Guide to Planning and Implementation)
By
Campbell, Tony
HK$589
Elsewhere
HK$654.55
Save HK$65.55 (10%)
Software Security (Concepts & Practices)
By
Ahmad Khan, Suhel
,
Kumar, Rajeev, MBBS, MS
,
Raees Ahmad Khan
Software Security (Concepts & Practices)
By
Ahmad Khan, Suhel
,
Kumar, Rajeev, MBBS, MS
,
Raees Ahmad Khan
HK$1,081
Elsewhere
HK$1,309.30
Save HK$228.30 (17%)
Software Security (Concepts & Practices)
By
Ahmad Khan, Suhel
,
Kumar, Rajeev
,
Raees Ahmad Khan
Software Security (Concepts & Practices)
By
Ahmad Khan, Suhel
,
Kumar, Rajeev
,
Raees Ahmad Khan
HK$438
Water Supply Systems Security (Professional S.)
By
Mays, Larry W.
Water Supply Systems Security (Professional S.)
By
Mays, Larry W.
HK$1,578
Creating an Information Security Program from Scratch
By
Williams, Walter
Creating an Information Security Program from Scratch
By
Williams, Walter
HK$392
Elsewhere
HK$503.47
Save HK$111.47 (22%)
Practical Unix & Internet Security 3e
By
Garfinkel, Simson
,
Spafford, Gene
,
Alan Schwartz
Practical Unix & Internet Security 3e
By
Garfinkel, Simson
,
Spafford, Gene
,
Alan Schwartz
HK$389
Elsewhere
HK$443.05
Save HK$54.05 (12%)
219
Next-Generation Enterprise Security and Governance (Security, Audit and Leadership Series)
By
Mohiuddin Ahmed
,
Nour Moustafa
,
Abu Barkat
,
Paul Haskell-Dowland
Next-Generation Enterprise Security and Governance (Security, Audit and Leadership Series)
By
Mohiuddin Ahmed
,
Nour Moustafa
,
Abu Barkat
,
Paul Haskell-Dowland
HK$365
Elsewhere
HK$443.05
Save HK$78.05 (18%)
Williams, W (Creating an Information Security Program from S)
By
Walter Williams
Williams, W (Creating an Information Security Program from S)
By
Walter Williams
HK$900
Elsewhere
HK$1,359.65
Save HK$459.65 (34%)
Next-Generation Enterprise Security and Governance (Internal Audit and IT Audit)
By
Mohiuddin Ahmed
,
Nour Moustafa
,
Abu Barkat
,
Paul Haskell-Dowland
Next-Generation Enterprise Security and Governance (Internal Audit and IT Audit)
By
Mohiuddin Ahmed
,
Nour Moustafa
,
Abu Barkat
,
Paul Haskell-Dowland
HK$660
Elsewhere
HK$866.15
Save HK$206.15 (24%)
Integrating a Usable Security Protocol Into User Authentication Services Design Process
By
Christina Braz
,
Ahmed Seffah
,
Bilal Naqvi
Integrating a Usable Security Protocol Into User Authentication Services Design Process
By
Christina Braz
,
Ahmed Seffah
,
Bilal Naqvi
HK$412
Elsewhere
HK$453.12
Save HK$41.12 (9%)
Building Secure Software (How to Avoid Security Problems the Right Way (paperback))
By
Viega, John
,
McGraw, Gary R.
Building Secure Software (How to Avoid Security Problems the Right Way (paperback))
By
Viega, John
,
McGraw, Gary R.
HK$900
34
Integrating a Usable Security Protocol Into User Authentication Services Design Process
By
Braz, Christina
,
Seffah, Ahmed
,
Bilal Naqvi
Integrating a Usable Security Protocol Into User Authentication Services Design Process
By
Braz, Christina
,
Seffah, Ahmed
,
Bilal Naqvi
HK$960
Elsewhere
HK$1,057.51
Save HK$97.51 (9%)
Advanced API Security (Oauth 2.0 and Beyond)
By
Siriwardena, Prabath
Advanced API Security (Oauth 2.0 and Beyond)
By
Siriwardena, Prabath
HK$330
Elsewhere
HK$402.76
Save HK$72.76 (18%)
Considerations on the AI Endgame (Ethics, Risks and Computational Frameworks (Chapman & Hall/CRC Artificial Intelligence and Robotics Series))
By
Soenke Ziesche
,
Yampolskiy, Roman V.
Considerations on the AI Endgame (Ethics, Risks and Computational Frameworks (Chapman & Hall/CRC Artificial Intelligence and Robotics Series))
By
Soenke Ziesche
,
Yampolskiy, Roman V.
HK$258
Elsewhere
HK$302.04
Save HK$44.04 (15%)
1
2
3
4
5
6
7
8
Next Page
1
2
3
4
5
6
7
8
Next Page