0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(150)
Sold By
Sold By
All Sellers
Fishpond
(153)
Age Range
Age Range
All Ranges
15+
(18)
All Ages
(4)
Country
Country
All Countries
Switzerland
(36)
Germany
(35)
United States
(29)
Singapore
(12)
United Kingdom
(12)
More...
Results for "Model Power Structures"
Model Power Structures
180 results
Filters
Refine By
Category
Category
Networking
(150)
Sold By
Sold By
All Sellers
Fishpond
(153)
Age Range
Age Range
All Ranges
15+
(18)
All Ages
(4)
Country
Country
All Countries
Switzerland
(36)
Germany
(35)
United States
(29)
Singapore
(12)
United Kingdom
(12)
More...
180 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Cyber-Security Threats and Response Models in Nuclear Power Plants (SpringerBriefs in Computer Science)
By
Smidts, Carol
,
Ray, Indrajit
,
Quanyan Zhu
,
Pavan Kumar Vaddi
Cyber-Security Threats and Response Models in Nuclear Power Plants (SpringerBriefs in Computer Science)
By
Smidts, Carol
,
Ray, Indrajit
,
Quanyan Zhu
,
Pavan Kumar Vaddi
HK$370
Elsewhere
HK$411.87
Save HK$41.87 (10%)
Trading in Local Energy Markets and Energy Communities (Concepts, Structures and Technologies (Lecture Notes in Energy))
By
Miadreza Shafie-khah
,
Amin Shokri Gazafroudi
Trading in Local Energy Markets and Energy Communities (Concepts, Structures and Technologies (Lecture Notes in Energy))
By
Miadreza Shafie-khah
,
Amin Shokri Gazafroudi
HK$1,300
Elsewhere
HK$1,544.79
Save HK$244.79 (16%)
Trading in Local Energy Markets and Energy Communities (Concepts, Structures and Technologies (Lecture Notes in Energy))
By
Miadreza Shafie-khah
,
Amin Shokri Gazafroudi
Trading in Local Energy Markets and Energy Communities (Concepts, Structures and Technologies (Lecture Notes in Energy))
By
Miadreza Shafie-khah
,
Amin Shokri Gazafroudi
HK$1,000
Elsewhere
HK$1,132.82
Save HK$132.82 (12%)
Building a Data Culture (The Usage and Flow Data Culture Model)
By
Holcomb, David
,
Griffin, Gary W.
Building a Data Culture (The Usage and Flow Data Culture Model)
By
Holcomb, David
,
Griffin, Gary W.
HK$269
Elsewhere
HK$339.77
Save HK$70.77 (21%)
Principles of AI Governance and Model Risk Management (Master the Techniques for Ethical and Transparent AI Systems)
By
James Sayles
Principles of AI Governance and Model Risk Management (Master the Techniques for Ethical and Transparent AI Systems)
By
James Sayles
HK$420
Elsewhere
HK$566.36
Save HK$146.36 (26%)
The Oxford Handbook of Cyber Security (Oxford Handbooks)
By
Paul Cornish
The Oxford Handbook of Cyber Security (Oxford Handbooks)
By
Paul Cornish
HK$1,787
People-Centric Security (Transforming Your Enterprise Security Culture)
By
Hayden, Lance
People-Centric Security (Transforming Your Enterprise Security Culture)
By
Hayden, Lance
HK$438
Elsewhere
HK$566.36
Save HK$128.36 (23%)
Security Operations Center (Building, Operating, and Maintaining your SOC)
By
Muniz, Joseph
,
Alfardan, Nadhem
,
Gary McIntyre
Security Operations Center (Building, Operating, and Maintaining your SOC)
By
Muniz, Joseph
,
Alfardan, Nadhem
,
Gary McIntyre
HK$430
Blockchain for Business
By
Arun, Jai
,
Cuomo, Jerry
,
Nitin Gaur
Blockchain for Business
By
Arun, Jai
,
Cuomo, Jerry
,
Nitin Gaur
HK$218
Elsewhere
HK$236.78
Save HK$18.78 (8%)
Privacy's Blueprint (The Battle to Control the Design of New Technologies)
By
Hartzog, Woodrow
Privacy's Blueprint (The Battle to Control the Design of New Technologies)
By
Hartzog, Woodrow
HK$291
Elsewhere
HK$349.66
Save HK$58.66 (17%)
Managing the Human Factor in Information Security (How to win over staff and influence business managers)
By
Lacey, David
Managing the Human Factor in Information Security (How to win over staff and influence business managers)
By
Lacey, David
HK$260
Elsewhere
HK$308.88
Save HK$48.88 (16%)
World Without Secrets (Business, Crime, and Privacy in the Age of Ubiquitous Computing)
By
Richard S. Hunter
World Without Secrets (Business, Crime, and Privacy in the Age of Ubiquitous Computing)
By
Richard S. Hunter
HK$308
Elsewhere
HK$391.27
Save HK$83.27 (21%)
Blockchain and Web 3.0 (Social, Economic, and Technological Challenges (Routledge Studies in Science, Technology and Society))
By
Massimo Ragnedda
,
Giuseppe Destefanis
Blockchain and Web 3.0 (Social, Economic, and Technological Challenges (Routledge Studies in Science, Technology and Society))
By
Massimo Ragnedda
,
Giuseppe Destefanis
HK$1,000
Elsewhere
HK$1,493.40
Save HK$493.40 (33%)
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
HK$1,100
Elsewhere
HK$1,647.89
Save HK$547.89 (33%)
Nanoelectronic Devices for Hardware and Software Security (Security, Privacy, and Trust in Mobile Communications)
By
Arun Kumar Singh
,
Balwinder Raj
Nanoelectronic Devices for Hardware and Software Security (Security, Privacy, and Trust in Mobile Communications)
By
Arun Kumar Singh
,
Balwinder Raj
HK$800
Elsewhere
HK$1,081.42
Save HK$281.42 (26%)
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
Data Science and Big Data Analytics in Smart Environments
By
Marta Chinnici
,
Florin Pop
,
Catalin Negru
HK$486
Elsewhere
HK$597.26
Save HK$111.26 (19%)
Police Investigative Interviews and Interpreting (Context, Challenges, and Strategies (Advances in Police Theory and Practice))
By
Mulayim, Sedat
,
Lai, Miranda
,
Caroline Norma
Police Investigative Interviews and Interpreting (Context, Challenges, and Strategies (Advances in Police Theory and Practice))
By
Mulayim, Sedat
,
Lai, Miranda
,
Caroline Norma
HK$382
Elsewhere
HK$494.26
Save HK$112.26 (23%)
Biometrics, Computer Security Systems and Artificial Intelligence Applications
By
Khalid Saeed
,
Jerzy Pejas
,
Romuald Mosdorf
Biometrics, Computer Security Systems and Artificial Intelligence Applications
By
Khalid Saeed
,
Jerzy Pejas
,
Romuald Mosdorf
HK$1,900
The Shellcoder's Handbook - Discovering and Exploiting Security Holes 2e
By
Anley, Chris
,
Heasman, John
,
Felix Lindner
,
Gerardo Richarte
The Shellcoder's Handbook - Discovering and Exploiting Security Holes 2e
By
Anley, Chris
,
Heasman, John
,
Felix Lindner
,
Gerardo Richarte
HK$308
Elsewhere
HK$339.88
Save HK$31.88 (9%)
331
Wi-Foo (The Secrets of Wireless Hacking)
By
Andrew A. Vladimirov
,
Konstantin V. Gavrilenko
,
Andrei A. Mikhailovsky
,
Keith Mulbery
Wi-Foo (The Secrets of Wireless Hacking)
By
Andrew A. Vladimirov
,
Konstantin V. Gavrilenko
,
Andrei A. Mikhailovsky
,
Keith Mulbery
HK$540
1
Computer Security (Art and Science)
By
Bishop, Matt
Computer Security (Art and Science)
By
Bishop, Matt
HK$930
Computer Architecture and Security (Fundamentals of Designing Secure Computer Systems)
By
Shuangbao Paul Wang
,
Robert S. Ledley
Computer Architecture and Security (Fundamentals of Designing Secure Computer Systems)
By
Shuangbao Paul Wang
,
Robert S. Ledley
HK$1,100
Cyber Forensics (From Data to Digital Evidence (Wiley Corporate F&A))
By
Marcella, Albert J., Jr.
,
Frederic Guillossou
Cyber Forensics (From Data to Digital Evidence (Wiley Corporate F&A))
By
Marcella, Albert J., Jr.
,
Frederic Guillossou
HK$500
Elsewhere
HK$669.45
Save HK$169.45 (25%)
10
Cloud Management and Security
By
Imad M. Abbadi
Cloud Management and Security
By
Imad M. Abbadi
HK$700
Elsewhere
HK$802.83
Save HK$102.83 (13%)
1
2
3
4
5
6
7
8
Next Page
1
2
3
4
5
6
7
8
Next Page