0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(218)
Sold By
Sold By
All Sellers
Fishpond
(237)
Age Range
Age Range
All Ranges
15+
(17)
All Ages
(2)
Country
Country
All Countries
United States
(108)
United Kingdom
(38)
Switzerland
(26)
Germany
(24)
USA
(6)
More...
Results for "API"
API
323 results
Filters
Refine By
Category
Category
Networking
(218)
Sold By
Sold By
All Sellers
Fishpond
(237)
Age Range
Age Range
All Ranges
15+
(17)
All Ages
(2)
Country
Country
All Countries
United States
(108)
United Kingdom
(38)
Switzerland
(26)
Germany
(24)
USA
(6)
More...
Related Searches:
linux api
rest api
web api
api 579-1
"api 579"
web api 2
$sj pulse desktop api url$
api ponds and accessories
323 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
ASP.NET Web API Security Essentials
By
Gunasundaram, Rajesh
ASP.NET Web API Security Essentials
By
Gunasundaram, Rajesh
HK$369
Pentesting APIs (A practical guide to discovering, fingerprinting, and exploiting APIs)
By
Maurício Harley
Pentesting APIs (A practical guide to discovering, fingerprinting, and exploiting APIs)
By
Maurício Harley
HK$409
Secure RESTful APIs (Simple Solutions for Beginners (Apress Pocket Guides))
By
Massimo Nardone
Secure RESTful APIs (Simple Solutions for Beginners (Apress Pocket Guides))
By
Massimo Nardone
HK$163
Elsewhere
HK$182.24
Save HK$19.24 (11%)
CORS in Action (Creating and Consuming Cross-Origin APIs)
By
Hossain, Monsur
CORS in Action (Creating and Consuming Cross-Origin APIs)
By
Hossain, Monsur
HK$477
Advanced API Security (Oauth 2.0 and Beyond)
By
Siriwardena, Prabath
Advanced API Security (Oauth 2.0 and Beyond)
By
Siriwardena, Prabath
HK$329
Elsewhere
HK$405.11
Save HK$76.11 (19%)
API Security for White Hat Hackers (Uncover offensive defense strategies and get up to speed with secure API implementation)
By
Confidence Staveley
,
Christopher Romeo
API Security for White Hat Hackers (Uncover offensive defense strategies and get up to speed with secure API implementation)
By
Confidence Staveley
,
Christopher Romeo
HK$449
Getting Started with Oauth 2.0 (Programming Clients for Secure Web API Authorization and Authentication)
By
Boyd, Ryan
Getting Started with Oauth 2.0 (Programming Clients for Secure Web API Authorization and Authentication)
By
Boyd, Ryan
HK$149
Elsewhere
HK$187.41
Save HK$38.41 (20%)
198
Karma-Based API on Apple Platforms (Building Privacy Into IOS and Macos Apps)
By
Carrasco Molina, Manuel
Karma-Based API on Apple Platforms (Building Privacy Into IOS and Macos Apps)
By
Carrasco Molina, Manuel
HK$228
Elsewhere
HK$283.54
Save HK$55.54 (20%)
Zed Attack Proxy Cookbook (Hacking tactics, techniques, and procedures for testing web applications and APIs)
By
Ryan Soper
,
Nestor N. Torres
,
Ahmed Almoailu
Zed Attack Proxy Cookbook (Hacking tactics, techniques, and procedures for testing web applications and APIs)
By
Ryan Soper
,
Nestor N. Torres
,
Ahmed Almoailu
HK$408
Defending APIs (Uncover advanced defense techniques to craft secure application programming interfaces)
By
Colin Domoney
,
Chris Wysopal
Defending APIs (Uncover advanced defense techniques to craft secure application programming interfaces)
By
Colin Domoney
,
Chris Wysopal
HK$433
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps [German] (Sicherheitsanalyse von Microsoft Komponenten)
By
Szameitat, Daniel
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps [German] (Sicherheitsanalyse von Microsoft Komponenten)
By
Szameitat, Daniel
HK$380
Web Hacking (Attacks and Defense)
By
Stuart McClure
,
Shah Saumil
,
Shreeraj Shah
,
Saumil Shah
Web Hacking (Attacks and Defense)
By
Stuart McClure
,
Shah Saumil
,
Shreeraj Shah
,
Saumil Shah
HK$700
1
Mobile Application Security
By
Himanshu Dwivedi
,
Professor Chris Clark
,
David Thiel
Mobile Application Security
By
Himanshu Dwivedi
,
Professor Chris Clark
,
David Thiel
HK$430
Elsewhere
HK$557.06
Save HK$127.06 (23%)
17
Hacking Exposed J2EE and Java (Developing Secure Web Applications with Java Technology (Hacking Exposed))
By
Art Taylor
,
Brian Buege
,
Randy Layman
Hacking Exposed J2EE and Java (Developing Secure Web Applications with Java Technology (Hacking Exposed))
By
Art Taylor
,
Brian Buege
,
Randy Layman
HK$427
15
Introduction to Social Media Investigation (A Hands-On Approach)
By
Golbeck, Jennifer (College of Information Studies, University of
Introduction to Social Media Investigation (A Hands-On Approach)
By
Golbeck, Jennifer (College of Information Studies, University of
HK$439
Elsewhere
HK$476.02
Save HK$37.02 (8%)
8
Google Hacking for Penetration Testers 2e
By
Long, Johnny
,
Gardner, Bill (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof.
,
Justin Brown
Google Hacking for Penetration Testers 2e
By
Long, Johnny
,
Gardner, Bill (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof.
,
Justin Brown
HK$419
Elsewhere
HK$476.02
Save HK$57.02 (12%)
30
31 Days Before Your CCNP and CCIE Enterprise Core Exam
By
Gargano, Patrick
31 Days Before Your CCNP and CCIE Enterprise Core Exam
By
Gargano, Patrick
HK$287
Elsewhere
HK$334.19
Save HK$47.19 (14%)
VMware vSphere and Virtual Infrastructure Security (Securing the Virtual Environment)
By
Haletky, Edward
VMware vSphere and Virtual Infrastructure Security (Securing the Virtual Environment)
By
Haletky, Edward
HK$344
9
Redefining Hacking (A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World)
By
Santos, Omar
,
Lazzara, Savannah
Redefining Hacking (A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World)
By
Santos, Omar
,
Lazzara, Savannah
HK$463
Writing Secure Code (Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World)
By
Michael Howard
,
David E. LeBlanc
,
David LeBlanc
Writing Secure Code (Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World)
By
Michael Howard
,
David E. LeBlanc
,
David LeBlanc
HK$478
373
Windows Phone 7 Development Internals (Covers Windows Phone 7 and Windows Phone 7.5)
By
Andrew Whitechapel
Windows Phone 7 Development Internals (Covers Windows Phone 7 and Windows Phone 7.5)
By
Andrew Whitechapel
HK$334
Elsewhere
HK$465.89
Save HK$131.89 (28%)
1
FinTech (The Technology Driving Disruption in the Financial Services Industry)
By
Parag Y. Arjunwadkar
FinTech (The Technology Driving Disruption in the Financial Services Industry)
By
Parag Y. Arjunwadkar
HK$438
Elsewhere
HK$455.76
Save HK$17.76 (4%)
Guide to Biometrics (Springer Professional Computing)
By
Ruud M. Bolle
,
Jonathan H. Connell
,
Sharath Pankanti
,
Nalini K. Ratha
Guide to Biometrics (Springer Professional Computing)
By
Ruud M. Bolle
,
Jonathan H. Connell
,
Sharath Pankanti
,
Nalini K. Ratha
HK$1,600
Elsewhere
HK$1,777.84
Save HK$177.84 (10%)
Information Security in Research and Business (Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark (IFIP Advances in Information and Communication Technology))
By
Louise Yngström
,
Jan Carlsen
Information Security in Research and Business (Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark (IFIP Advances in Information and Communication Technology))
By
Louise Yngström
,
Jan Carlsen
HK$1,752
Elsewhere
HK$1,823.33
Save HK$71.33 (4%)
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page