0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(12)
Sold By
Sold By
All Sellers
Fishpond
(14)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United Kingdom
(4)
United States
(4)
Switzerland
(2)
Germany
(1)
Results for "M. Shields"
M. Shields
18 results
Filters
Refine By
Category
Category
Networking
(12)
Sold By
Sold By
All Sellers
Fishpond
(14)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United Kingdom
(4)
United States
(4)
Switzerland
(2)
Germany
(1)
18 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems (The Shield Methodology)
By
Andrea Fiaschetti
,
Josef Noll
,
Paolo Azzoni
,
Roberto Uribeetxeberria
Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems (The Shield Methodology)
By
Andrea Fiaschetti
,
Josef Noll
,
Paolo Azzoni
,
Roberto Uribeetxeberria
HK$1,534
Elsewhere
HK$1,762.51
Save HK$228.51 (13%)
Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems (The Shield Methodology)
By
Andrea Fiaschetti
,
Josef Noll
,
Paolo Azzoni
Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems (The Shield Methodology)
By
Andrea Fiaschetti
,
Josef Noll
,
Paolo Azzoni
HK$797
The Secret Sister (A compelling suspense novel about family and secrets)
By
M. M. DeLuca
The Secret Sister (A compelling suspense novel about family and secrets)
By
M. M. DeLuca
HK$92.34
Control-theoretic Methods for Cyber-Physical Security (Emerging Methodologies and Applications in Modelling, Identification and Control)
By
Aris Kanellopoulos
,
Lijing Zhai
,
Filippos Fotiadis
,
Kyriakos Vamvoudakis
Control-theoretic Methods for Cyber-Physical Security (Emerging Methodologies and Applications in Modelling, Identification and Control)
By
Aris Kanellopoulos
,
Lijing Zhai
,
Filippos Fotiadis
,
Kyriakos Vamvoudakis
HK$1,000
Elsewhere
HK$1,158.22
Save HK$158.22 (14%)
Iapp Cipp / Us Certified Information Privacy Professional Study Guide
By
Mike Chapple
,
Joe Shelley
Iapp Cipp / Us Certified Information Privacy Professional Study Guide
By
Mike Chapple
,
Joe Shelley
HK$340
Elsewhere
HK$392.79
Save HK$52.79 (13%)
Eleventh Hour Security+ (Exam SY0-201 Study Guide)
By
Ido Dubrawsky
Eleventh Hour Security+ (Exam SY0-201 Study Guide)
By
Ido Dubrawsky
HK$227
Cyber Warfare (A Reference Handbook (Contemporary World Issues (Hardcover)))
By
Springer, Paul J.
Cyber Warfare (A Reference Handbook (Contemporary World Issues (Hardcover)))
By
Springer, Paul J.
HK$560
Securing IoT in Industry 4.0 Applications with Blockchain
By
P Kaliraj
,
T. Devi
Securing IoT in Industry 4.0 Applications with Blockchain
By
P Kaliraj
,
T. Devi
HK$840
Elsewhere
HK$1,208.58
Save HK$368.58 (30%)
Big Data and Blockchain Technology for Secure IoT Applications (Advances in Digital Technologies for Smart Applications)
By
Shitharth Selvarajan
,
Gouse Baig Mohammad
,
Sadda Bharath Reddy
,
Praveen Kumar Balachandran
Big Data and Blockchain Technology for Secure IoT Applications (Advances in Digital Technologies for Smart Applications)
By
Shitharth Selvarajan
,
Gouse Baig Mohammad
,
Sadda Bharath Reddy
,
Praveen Kumar Balachandran
HK$760
Elsewhere
HK$1,107.87
Save HK$347.87 (31%)
New Dimensions of Information Warfare (Advances in Information Security)
By
Di Pietro, Roberto
,
Cresci, Stefano
,
Maurantonio Caprolu
,
Stefano Cresci
New Dimensions of Information Warfare (Advances in Information Security)
By
Di Pietro, Roberto
,
Cresci, Stefano
,
Maurantonio Caprolu
,
Stefano Cresci
HK$1,291
New Dimensions of Information Warfare (Advances in Information Security)
By
Di Pietro, Roberto
,
Cresci, Stefano
,
Maurantonio Caprolu
,
Stefano Cresci
New Dimensions of Information Warfare (Advances in Information Security)
By
Di Pietro, Roberto
,
Cresci, Stefano
,
Maurantonio Caprolu
,
Stefano Cresci
HK$1,273
Elsewhere
HK$1,409.91
Save HK$136.91 (10%)
Security and Privacy in Communication Networks (19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunicati ..)
By
Haixin Duan
,
Mourad Debbabi
,
Xavier de Carné de Carnavalet
,
Xiapu Luo
Security and Privacy in Communication Networks (19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunicati ..)
By
Haixin Duan
,
Mourad Debbabi
,
Xavier de Carné de Carnavalet
,
Xiapu Luo
HK$860
Information Security and Privacy (13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings (Lecture Notes in Computer Science))
By
Yi Mu
,
Willy Susilo
,
Jennifer Seberry
Information Security and Privacy (13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings (Lecture Notes in Computer Science))
By
Yi Mu
,
Willy Susilo
,
Jennifer Seberry
HK$573
Sharing Health Data (The Why, the Will, and the Way Forward)
By
National Academy of Medicine
,
The Learning Health System Series
,
Claudia Grossmann
,
Peak Sen Chua
Sharing Health Data (The Why, the Will, and the Way Forward)
By
National Academy of Medicine
,
The Learning Health System Series
,
Claudia Grossmann
,
Peak Sen Chua
Currently
Unavailable
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Currently
Unavailable
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Information Security Governance using Artificial Intelligence of Things in Smart Environments
By
Mariyam Ouaissa
,
Mariya Ouaissa
,
Tarik Hidar
,
Ram Chandra Sachan
Currently
Unavailable
CompTIA Security+ Exam Cram [With CDROM]
By
Diane Barrett
,
Kalani Kirk Hausman
,
Diane Barrett
CompTIA Security+ Exam Cram [With CDROM]
By
Diane Barrett
,
Kalani Kirk Hausman
,
Diane Barrett
Currently
Unavailable