0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(23)
Sold By
Sold By
All Sellers
Fishpond
(26)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
United Kingdom
(11)
United States
(7)
Singapore
(2)
Results for "Learning IOS Programming"
Learning IOS Programming
36 results
Filters
Refine By
Category
Category
Networking
(23)
Sold By
Sold By
All Sellers
Fishpond
(26)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
United Kingdom
(11)
United States
(7)
Singapore
(2)
36 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Learning IOS Penetration Testing
By
Swaroop Yermalkar
Learning IOS Penetration Testing
By
Swaroop Yermalkar
HK$389
Karma-Based API on Apple Platforms (Building Privacy Into IOS and Macos Apps)
By
Carrasco Molina, Manuel
Karma-Based API on Apple Platforms (Building Privacy Into IOS and Macos Apps)
By
Carrasco Molina, Manuel
HK$229
Elsewhere
HK$287.57
Save HK$58.57 (20%)
Practical Mobile Forensics (Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition)
By
Tamma, Rohit
,
Skulkin, Oleg
,
Heather Mahalik
,
Satish Bommisetty
Practical Mobile Forensics (Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition)
By
Tamma, Rohit
,
Skulkin, Oleg
,
Heather Mahalik
,
Satish Bommisetty
HK$414
Practical Mobile Forensics - Second Edition (A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms)
By
Satish Bommisetty
,
Rohit Tamma
,
Satish Bommisetty
Practical Mobile Forensics - Second Edition (A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms)
By
Satish Bommisetty
,
Rohit Tamma
,
Satish Bommisetty
HK$555
My Online Privacy for Seniors (My...)
By
Jason Rich
My Online Privacy for Seniors (My...)
By
Jason Rich
HK$217
31 Days Before Your CCNP and CCIE Enterprise Core Exam
By
Gargano, Patrick
31 Days Before Your CCNP and CCIE Enterprise Core Exam
By
Gargano, Patrick
HK$317
Elsewhere
HK$338.94
Save HK$21.94 (6%)
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide (Certification Guide)
By
Santos, Omar
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide (Certification Guide)
By
Santos, Omar
HK$584
Inside Network Perimeter Security
By
Northcutt, Stephen
,
Zeltser, Lenny
,
Scott Winters
Inside Network Perimeter Security
By
Northcutt, Stephen
,
Zeltser, Lenny
,
Scott Winters
HK$660
Integration of WSNs into Internet of Things (A Security Perspective (Internet of Everything IoE))
By
Sudhir Kumar Sharma
,
Bharat Bhushan
,
Raghvendra Kumar
,
Aditya Khamparia
Integration of WSNs into Internet of Things (A Security Perspective (Internet of Everything IoE))
By
Sudhir Kumar Sharma
,
Bharat Bhushan
,
Raghvendra Kumar
,
Aditya Khamparia
HK$1,000
Elsewhere
HK$1,489.75
Save HK$489.75 (33%)
Integration of WSNs into Internet of Things (A Security Perspective (Internet of Everything IoE))
By
Sudhir Kumar Sharma
,
Bharat Bhushan
,
Raghvendra Kumar
,
Aditya Khamparia
Integration of WSNs into Internet of Things (A Security Perspective (Internet of Everything IoE))
By
Sudhir Kumar Sharma
,
Bharat Bhushan
,
Raghvendra Kumar
,
Aditya Khamparia
HK$427
Elsewhere
HK$503.33
Save HK$76.33 (15%)
Hayes, D (Practical Guide to Computer Forensics Investigatio)
By
Hayes, Darren R.
Hayes, D (Practical Guide to Computer Forensics Investigatio)
By
Hayes, Darren R.
HK$631
26
Windows 2000 Virtual Private Networking (VPN) (Circle)
By
Fortenberry, Thaddeus
Windows 2000 Virtual Private Networking (VPN) (Circle)
By
Fortenberry, Thaddeus
HK$500
Thomas (Network Security First St_p2)
By
Thomas, Thomas M.
,
Stoddard, Donald
Thomas (Network Security First St_p2)
By
Thomas, Thomas M.
,
Stoddard, Donald
HK$283
2
Mobile OS Vulnerabilities (Quantitative and Qualitative Analysis)
By
Garg, Shivi
,
Baliyan, Niyati (Indira Gandhi Delhi Technical University for Wo
Mobile OS Vulnerabilities (Quantitative and Qualitative Analysis)
By
Garg, Shivi
,
Baliyan, Niyati (Indira Gandhi Delhi Technical University for Wo
HK$831
Elsewhere
HK$1,232.90
Save HK$401.90 (33%)
Mobile OS Vulnerabilities (Quantitative and Qualitative Analysis)
By
Shivi
,
Niyati
Mobile OS Vulnerabilities (Quantitative and Qualitative Analysis)
By
Shivi
,
Niyati
HK$352
Elsewhere
HK$462.23
Save HK$110.23 (24%)
Security Engineering for Embedded and Cyber-Physical Systems (Advances in Cybersecurity Management)
By
Saad Motahhir
,
Yassine Maleh
Security Engineering for Embedded and Cyber-Physical Systems (Advances in Cybersecurity Management)
By
Saad Motahhir
,
Yassine Maleh
HK$974
Elsewhere
HK$1,078.78
Save HK$104.78 (10%)
Security Engineering for Embedded and Cyber-Physical Systems (Advances in Cybersecurity Management)
By
Saad Motahhir
,
Yassine Maleh
Security Engineering for Embedded and Cyber-Physical Systems (Advances in Cybersecurity Management)
By
Saad Motahhir
,
Yassine Maleh
HK$456
Security Issues in Communication Devices, Networks and Computing Models (Volume 1)
By
Budati Anil Kumar
,
Akella Ramakrishna
,
Goutham Makkena
,
Gheorghita Ghinea
Security Issues in Communication Devices, Networks and Computing Models (Volume 1)
By
Budati Anil Kumar
,
Akella Ramakrishna
,
Goutham Makkena
,
Gheorghita Ghinea
HK$1,300
Hands-On Application Penetration Testing with Burp Suite (Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications)
By
Lozano, Carlos A.
,
Shah, Dhruv
,
Riyaz Ahemed Walikar
Hands-On Application Penetration Testing with Burp Suite (Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications)
By
Lozano, Carlos A.
,
Shah, Dhruv
,
Riyaz Ahemed Walikar
HK$453
Mastering Malware Analysis (The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks)
By
Kleymenov, Alexey
,
Thabet, Amr
Mastering Malware Analysis (The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks)
By
Kleymenov, Alexey
,
Thabet, Amr
HK$540
Mastering Malware Analysis - Second Edition (A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks)
By
Kleymenov, Alexey
,
Thabet, Amr
Mastering Malware Analysis - Second Edition (A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks)
By
Kleymenov, Alexey
,
Thabet, Amr
HK$571
Trace, Log, Text, Narrative, Data (An Analysis Pattern Reference for Information Mining, Diagnostics, Anomaly Detection, Fifth Edition)
By
Vostokov, Dmitry
,
Software Diagnostics Institute
Trace, Log, Text, Narrative, Data (An Analysis Pattern Reference for Information Mining, Diagnostics, Anomaly Detection, Fifth Edition)
By
Vostokov, Dmitry
,
Software Diagnostics Institute
HK$600
Advances in Intelligent Information Hiding and Multimedia Signal Processing (Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 2 (Smart Innovation, Systems and Technologies))
By
Jeng-Shyang Pan
,
Zhenyu Meng
,
Jianpo Li
Advances in Intelligent Information Hiding and Multimedia Signal Processing (Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 2 (Smart Innovation, Systems and Technologies))
By
Jeng-Shyang Pan
,
Zhenyu Meng
,
Jianpo Li
HK$1,900
Elsewhere
HK$2,260.21
Save HK$360.21 (16%)
1
2
Next Page
1
2
Next Page