0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Networking
Filters
Sold By
Sold By
All Sellers
Fishpond
(219)
Age Range
Age Range
All Ranges
15+
(16)
All Ages
(1)
Country
Country
All Countries
United States
(97)
United Kingdom
(33)
Switzerland
(26)
Germany
(24)
USA
(6)
More...
Results for "API"
API
300 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(219)
Age Range
Age Range
All Ranges
15+
(16)
All Ages
(1)
Country
Country
All Countries
United States
(97)
United Kingdom
(33)
Switzerland
(26)
Germany
(24)
USA
(6)
More...
Related Searches:
linux api
rest api
web api
api 579-1
"api 579"
web api 2
$sj pulse desktop api url$
api ponds and accessories
300 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Secure RESTful APIs (Simple Solutions for Beginners (Apress Pocket Guides))
By
Massimo Nardone
Secure RESTful APIs (Simple Solutions for Beginners (Apress Pocket Guides))
By
Massimo Nardone
HK$163
Elsewhere
HK$207.49
Save HK$44.49 (21%)
CORS in Action (Creating and Consuming Cross-Origin APIs)
By
Hossain, Monsur
CORS in Action (Creating and Consuming Cross-Origin APIs)
By
Hossain, Monsur
HK$479
Advanced API Security (Oauth 2.0 and Beyond)
By
Siriwardena, Prabath
Advanced API Security (Oauth 2.0 and Beyond)
By
Siriwardena, Prabath
HK$331
Elsewhere
HK$415.09
Save HK$84.09 (20%)
API Security for White Hat Hackers (Uncover offensive defense strategies and get up to speed with secure API implementation)
By
Confidence Staveley
,
Christopher Romeo
API Security for White Hat Hackers (Uncover offensive defense strategies and get up to speed with secure API implementation)
By
Confidence Staveley
,
Christopher Romeo
HK$452
Karma-Based API on Apple Platforms (Building Privacy Into IOS and Macos Apps)
By
Carrasco Molina, Manuel
Karma-Based API on Apple Platforms (Building Privacy Into IOS and Macos Apps)
By
Carrasco Molina, Manuel
HK$229
Elsewhere
HK$290.53
Save HK$61.53 (21%)
Zed Attack Proxy Cookbook (Hacking tactics, techniques, and procedures for testing web applications and APIs)
By
Ryan Soper
,
Nestor N. Torres
,
Ahmed Almoailu
Zed Attack Proxy Cookbook (Hacking tactics, techniques, and procedures for testing web applications and APIs)
By
Ryan Soper
,
Nestor N. Torres
,
Ahmed Almoailu
HK$418
Defending APIs (Uncover advanced defense techniques to craft secure application programming interfaces)
By
Colin Domoney
,
Chris Wysopal
Defending APIs (Uncover advanced defense techniques to craft secure application programming interfaces)
By
Colin Domoney
,
Chris Wysopal
HK$440
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps [German] (Sicherheitsanalyse von Microsoft Komponenten)
By
Szameitat, Daniel
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps [German] (Sicherheitsanalyse von Microsoft Komponenten)
By
Szameitat, Daniel
HK$380
Web Hacking (Attacks and Defense)
By
Stuart McClure
,
Shah Saumil
,
Shreeraj Shah
,
Saumil Shah
Web Hacking (Attacks and Defense)
By
Stuart McClure
,
Shah Saumil
,
Shreeraj Shah
,
Saumil Shah
HK$700
1
Mobile Application Security
By
Himanshu Dwivedi
,
Professor Chris Clark
,
David Thiel
Mobile Application Security
By
Himanshu Dwivedi
,
Professor Chris Clark
,
David Thiel
HK$418
Elsewhere
HK$570.79
Save HK$152.79 (27%)
17
Hacking Exposed J2EE and Java (Developing Secure Web Applications with Java Technology (Hacking Exposed))
By
Art Taylor
,
Brian Buege
,
Randy Layman
Hacking Exposed J2EE and Java (Developing Secure Web Applications with Java Technology (Hacking Exposed))
By
Art Taylor
,
Brian Buege
,
Randy Layman
HK$414
15
Introduction to Social Media Investigation (A Hands-On Approach)
By
Golbeck, Jennifer (College of Information Studies, University of
Introduction to Social Media Investigation (A Hands-On Approach)
By
Golbeck, Jennifer (College of Information Studies, University of
HK$450
Elsewhere
HK$487.75
Save HK$37.75 (8%)
8
Google Hacking for Penetration Testers 2e
By
Long, Johnny
,
Gardner, Bill (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof.
,
Justin Brown
Google Hacking for Penetration Testers 2e
By
Long, Johnny
,
Gardner, Bill (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof.
,
Justin Brown
HK$430
Elsewhere
HK$487.75
Save HK$57.75 (12%)
30
31 Days Before Your CCNP and CCIE Enterprise Core Exam
By
Gargano, Patrick
31 Days Before Your CCNP and CCIE Enterprise Core Exam
By
Gargano, Patrick
HK$318
Elsewhere
HK$383.95
Save HK$65.95 (17%)
Redefining Hacking (A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World)
By
Santos, Omar
,
Lazzara, Savannah
Redefining Hacking (A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World)
By
Santos, Omar
,
Lazzara, Savannah
HK$500
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
HK$466
Elsewhere
HK$493.04
Save HK$27.04 (5%)
182
Auditing Cloud Computing (A Security and Privacy Guide (Wiley Corporate F&A))
By
Halpert, Ben
Auditing Cloud Computing (A Security and Privacy Guide (Wiley Corporate F&A))
By
Halpert, Ben
HK$410
Elsewhere
HK$518.99
Save HK$108.99 (21%)
FinTech (The Technology Driving Disruption in the Financial Services Industry)
By
Parag Y. Arjunwadkar
FinTech (The Technology Driving Disruption in the Financial Services Industry)
By
Parag Y. Arjunwadkar
HK$449
Elsewhere
HK$466.99
Save HK$17.99 (4%)
Guide to Biometrics (Springer Professional Computing)
By
Ruud M. Bolle
,
Jonathan H. Connell
,
Sharath Pankanti
,
Nalini K. Ratha
Guide to Biometrics (Springer Professional Computing)
By
Ruud M. Bolle
,
Jonathan H. Connell
,
Sharath Pankanti
,
Nalini K. Ratha
HK$1,658
Elsewhere
HK$1,821.66
Save HK$163.66 (9%)
Information Security in Research and Business (Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark (IFIP Advances in Information and Communication Technology))
By
Louise Yngström
,
Jan Carlsen
Information Security in Research and Business (Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark (IFIP Advances in Information and Communication Technology))
By
Louise Yngström
,
Jan Carlsen
HK$1,795
Elsewhere
HK$1,868.27
Save HK$73.27 (4%)
The Shellcoder's Handbook - Discovering and Exploiting Security Holes 2e
By
Anley, Chris
,
Heasman, John
,
Felix Lindner
,
Gerardo Richarte
The Shellcoder's Handbook - Discovering and Exploiting Security Holes 2e
By
Anley, Chris
,
Heasman, John
,
Felix Lindner
,
Gerardo Richarte
HK$312
Elsewhere
HK$342.53
Save HK$30.53 (9%)
331
Java Security
By
Oaks, Scott
Java Security
By
Oaks, Scott
HK$434
Elsewhere
HK$456.61
Save HK$22.61 (5%)
1
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page