0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Programming
Filters
Refine By
Category
Category
Software Development
(184)
General
(142)
Algorithms
(80)
Systems Design
(39)
Compilers
(26)
Object Oriented
(18)
Java
(16)
Python
(13)
C++
(8)
CGI
(7)
C#
(6)
C
(3)
Mac General
(3)
XML
(3)
Visual Basic
(2)
PHP
(2)
Assembly Language
(2)
SQL
(2)
HTML
(1)
Prolog
(1)
Basic
(1)
Sold By
Sold By
All Sellers
Fishpond
(348)
Age Range
Age Range
All Ranges
15+
(49)
All Ages
(12)
Country
Country
All Countries
Germany
(109)
United States
(103)
United Kingdom
(50)
Switzerland
(38)
USA
(5)
More...
Results for "The Code Of Trust"
The Code Of Trust
520 results
Filters
Refine By
Category
Category
Software Development
(184)
General
(142)
Algorithms
(80)
Systems Design
(39)
Compilers
(26)
Object Oriented
(18)
Java
(16)
Python
(13)
C++
(8)
CGI
(7)
C#
(6)
C
(3)
Mac General
(3)
XML
(3)
Visual Basic
(2)
PHP
(2)
Assembly Language
(2)
SQL
(2)
HTML
(1)
Prolog
(1)
Basic
(1)
Sold By
Sold By
All Sellers
Fishpond
(348)
Age Range
Age Range
All Ranges
15+
(49)
All Ages
(12)
Country
Country
All Countries
Germany
(109)
United States
(103)
United Kingdom
(50)
Switzerland
(38)
USA
(5)
More...
520 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Web Application Vulnerabilities (Detect, Exploit, Prevent)
By
Steven (Member of the FBI's Infragard Organization and Penetrati
Web Application Vulnerabilities (Detect, Exploit, Prevent)
By
Steven (Member of the FBI's Infragard Organization and Penetrati
HK$500
4
Testing Code Security
By
van der Linden, Maura A.
Testing Code Security
By
van der Linden, Maura A.
HK$599
Computational Trust Models and Machine Learning
By
Xin Liu
,
Anwitaman Datta
,
Ee-Peng Lim
Computational Trust Models and Machine Learning
By
Xin Liu
,
Anwitaman Datta
,
Ee-Peng Lim
HK$886
Elsewhere
HK$1,081.04
Save HK$195.04 (18%)
Testing Code Security
By
Linden, Maura A. van der
Testing Code Security
By
Linden, Maura A. van der
HK$900
Elsewhere
HK$1,008.87
Save HK$108.87 (11%)
Exploiting Software (How to Break Code)
By
Greg Hoglund
,
Gary R. McGraw
,
Aviel D. Rubin
Exploiting Software (How to Break Code)
By
Greg Hoglund
,
Gary R. McGraw
,
Aviel D. Rubin
HK$800
1
Software Evolution and Maintenance (A Practitioner's Approach)
By
Priyadarshi
,
Kshirasagar
Software Evolution and Maintenance (A Practitioner's Approach)
By
Priyadarshi
,
Kshirasagar
HK$900
Elsewhere
HK$998.16
Save HK$98.16 (10%)
Mendelian Randomization (Methods for Causal Inference Using Genetic Variants (Chapman & Hall/CRC Interdisciplinary Statistics))
By
Burgess, Stephen
,
Thompson, Simon G. (Department of Public Health and Primary Care
Mendelian Randomization (Methods for Causal Inference Using Genetic Variants (Chapman & Hall/CRC Interdisciplinary Statistics))
By
Burgess, Stephen
,
Thompson, Simon G. (Department of Public Health and Primary Care
HK$1,200
Elsewhere
HK$1,853.22
Save HK$653.22 (35%)
The Coder's Path to Wealth and Independence
By
Beckner, Mark
The Coder's Path to Wealth and Independence
By
Beckner, Mark
HK$659
Visual Studio Code Distilled (Evolved Code Editing for Windows, Macos, and Linux)
By
Del Sole, Alessandro
Visual Studio Code Distilled (Evolved Code Editing for Windows, Macos, and Linux)
By
Del Sole, Alessandro
HK$453
Elsewhere
HK$566.16
Save HK$113.16 (20%)
Software Durability (Concepts and Practices)
By
Kumar, Rajeev
,
Ahmad Khan, Suhel
,
Raees Ahmad Khan
Software Durability (Concepts and Practices)
By
Kumar, Rajeev
,
Ahmad Khan, Suhel
,
Raees Ahmad Khan
HK$447
Elsewhere
HK$545.57
Save HK$98.57 (18%)
Data Science (A First Introduction with Python (Chapman & Hall/CRC Data Science Series))
By
Tiffany
,
Trevor Campbell
,
Melissa Lee
,
Joel Ostblom
Data Science (A First Introduction with Python (Chapman & Hall/CRC Data Science Series))
By
Tiffany
,
Trevor Campbell
,
Melissa Lee
,
Joel Ostblom
HK$1,260
Elsewhere
HK$1,544.35
Save HK$284.35 (18%)
Data Science (A First Introduction with Python (Chapman & Hall/CRC Data Science Series))
By
Tiffany
,
Trevor Campbell
,
Melissa Lee
,
Joel Ostblom
Data Science (A First Introduction with Python (Chapman & Hall/CRC Data Science Series))
By
Tiffany
,
Trevor Campbell
,
Melissa Lee
,
Joel Ostblom
HK$600
Alice and Bob Learn Secure Coding
By
Tanya Janca
Alice and Bob Learn Secure Coding
By
Tanya Janca
HK$312
Elsewhere
HK$391.13
Save HK$79.13 (20%)
The Continuing Arms Race (Code-Reuse Attacks and Defenses)
By
Per Larsen
,
Ahmad-Reza Sadeghi
The Continuing Arms Race (Code-Reuse Attacks and Defenses)
By
Per Larsen
,
Ahmad-Reza Sadeghi
HK$754
The Continuing Arms Race (Code-Reuse Attacks and Defenses)
By
Per Larsen
,
Ahmad-Reza Sadeghi
The Continuing Arms Race (Code-Reuse Attacks and Defenses)
By
Per Larsen
,
Ahmad-Reza Sadeghi
HK$997
Liquid Software (How to Achieve Trusted Continuous Updates in the Devops World)
By
Fred Simon
,
Yoav Landman
,
Baruch Sadogursky
Liquid Software (How to Achieve Trusted Continuous Updates in the Devops World)
By
Fred Simon
,
Yoav Landman
,
Baruch Sadogursky
HK$170
Computational Trust Models and Machine Learning (Chapman & Hall/CRC Machine Learning & Pattern Recognition)
By
Xin Liu
,
Anwitaman Datta
,
Ee-Peng Lim
Computational Trust Models and Machine Learning (Chapman & Hall/CRC Machine Learning & Pattern Recognition)
By
Xin Liu
,
Anwitaman Datta
,
Ee-Peng Lim
HK$457
The CERT Oracle Secure Coding Standard for Java, (SEI Series in Software Engineering)
By
Long, Fred
,
Mohindra, Dhruv
,
Robert Seacord
,
Dean Sutherland
The CERT Oracle Secure Coding Standard for Java, (SEI Series in Software Engineering)
By
Long, Fred
,
Mohindra, Dhruv
,
Robert Seacord
,
Dean Sutherland
HK$413
1
Writing Secure Code (Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World)
By
Michael Howard
,
David E. LeBlanc
,
David LeBlanc
Writing Secure Code (Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World)
By
Michael Howard
,
David E. LeBlanc
,
David LeBlanc
HK$474
373
The Privacy Engineer's Manifesto (Getting from Policy to Code to Qa to Value)
By
Dennedy, Michelle
,
Finneran, Tom
,
Tom Finneran
The Privacy Engineer's Manifesto (Getting from Policy to Code to Qa to Value)
By
Dennedy, Michelle
,
Finneran, Tom
,
Tom Finneran
HK$477
A Practical Guide to TPM 2.0 (Using the Trusted Platform Module in the New Age of Security)
By
Challener, David
,
Arthur, Will
A Practical Guide to TPM 2.0 (Using the Trusted Platform Module in the New Age of Security)
By
Challener, David
,
Arthur, Will
HK$483
Programming with GitHub Copilot (Write Better Code--Faster! (Tech Today))
By
Dowswell, Kurt
Programming with GitHub Copilot (Write Better Code--Faster! (Tech Today))
By
Dowswell, Kurt
HK$380
Elsewhere
HK$489.04
Save HK$109.04 (22%)
Coding with XML for Efficiencies in Cataloging and Metadata (Practical Applications of Xsd, Xslt, and Xquery)
By
Timothy W. Cole
,
Myung-Ja
,
Christine Schwartz
Coding with XML for Efficiencies in Cataloging and Metadata (Practical Applications of Xsd, Xslt, and Xquery)
By
Timothy W. Cole
,
Myung-Ja
,
Christine Schwartz
HK$418
Elsewhere
HK$565.75
Save HK$147.75 (26%)
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page