0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(31)
Sold By
Sold By
All Sellers
Fishpond
(35)
Age Range
Age Range
All Ranges
15+
(1)
All Ages
(1)
Country
Country
All Countries
United Kingdom
(9)
United States
(9)
Switzerland
(2)
Denmark
(1)
Germany
(1)
Results for "Models Of My Life"
Models Of My Life
48 results
Filters
Refine By
Category
Category
Networking
(31)
Sold By
Sold By
All Sellers
Fishpond
(35)
Age Range
Age Range
All Ranges
15+
(1)
All Ages
(1)
Country
Country
All Countries
United Kingdom
(9)
United States
(9)
Switzerland
(2)
Denmark
(1)
Germany
(1)
48 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Insider Risk and Personnel Security (An introduction)
By
Martin, Paul
Insider Risk and Personnel Security (An introduction)
By
Martin, Paul
HK$1,090
Elsewhere
HK$1,464.14
Save HK$374.14 (26%)
Insider Risk and Personnel Security (An introduction)
By
Martin, Paul
Insider Risk and Personnel Security (An introduction)
By
Martin, Paul
HK$352
Elsewhere
HK$393.70
Save HK$41.70 (11%)
Building a Corporate Culture of Security (Strategies for Strengthening Organizational Resiliency)
By
Sullivant, John (President, Sisters Three Entrepreneurs Security
Building a Corporate Culture of Security (Strategies for Strengthening Organizational Resiliency)
By
Sullivant, John (President, Sisters Three Entrepreneurs Security
HK$338
Elsewhere
HK$353.31
Save HK$15.31 (4%)
Mobile Security and Privacy (Advances, Challenges and Future Research Directions)
By
Man-Ho Au
,
Raymond Choo
Mobile Security and Privacy (Advances, Challenges and Future Research Directions)
By
Man-Ho Au
,
Raymond Choo
HK$638
Elsewhere
HK$696.63
Save HK$58.63 (8%)
Writing Secure Code (Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World)
By
Michael Howard
,
David E. LeBlanc
,
David LeBlanc
Writing Secure Code (Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World)
By
Michael Howard
,
David E. LeBlanc
,
David LeBlanc
HK$540
373
Fifth World Conference on Information Security Education (Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA (IFIP Advances in Information and Communication Technology))
By
Lynn Futcher
,
Ronald Dodge
Fifth World Conference on Information Security Education (Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA (IFIP Advances in Information and Communication Technology))
By
Lynn Futcher
,
Ronald Dodge
HK$497
Protect Your Windows Network (From Perimeter to Data [With CDROM])
By
Jesper M. Johansson
,
Steve Riley
,
Addison-Wesley
Protect Your Windows Network (From Perimeter to Data [With CDROM])
By
Jesper M. Johansson
,
Steve Riley
,
Addison-Wesley
HK$784
1
Raising Humans in a Digital World (Helping Kids Build a Healthy Relationship with Technology)
By
Diana Graber
,
Michele Borba
Raising Humans in a Digital World (Helping Kids Build a Healthy Relationship with Technology)
By
Diana Graber
,
Michele Borba
HK$135
Elsewhere
HK$151.36
Save HK$16.36 (11%)
Fifth World Conference on Information Security Education (Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA (IFIP Advances in Information and Communication Technology))
By
Lynn Futcher
,
Ronald Dodge
Fifth World Conference on Information Security Education (Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA (IFIP Advances in Information and Communication Technology))
By
Lynn Futcher
,
Ronald Dodge
HK$500
Thrive (How to Cultivate Character So Your Children Can Flourish Online)
By
Harrison, Dr Tom
Thrive (How to Cultivate Character So Your Children Can Flourish Online)
By
Harrison, Dr Tom
HK$84.61
Elsewhere
HK$151.36
Save HK$66.75 (44%)
From Exposed to Secure (The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe)
By
Featuring Cybersecurity And Compliance Experts From Around The W
From Exposed to Secure (The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe)
By
Featuring Cybersecurity And Compliance Experts From Around The W
HK$130
Cyberjutsu (Cybersecurity for the Modern Ninja)
By
McCarty, Ben
Cyberjutsu (Cybersecurity for the Modern Ninja)
By
McCarty, Ben
HK$197
Elsewhere
HK$292.73
Save HK$95.73 (33%)
The Gardener of Governance (A Call to Action for Effective Internal Auditing (Security, Audit and Leadership Series))
By
Rainer Lenz
,
Barrie Enslin
The Gardener of Governance (A Call to Action for Effective Internal Auditing (Security, Audit and Leadership Series))
By
Rainer Lenz
,
Barrie Enslin
HK$797
Elsewhere
HK$1,211.70
Save HK$414.70 (34%)
Controlling Privacy and the Use of Data Assets Set (Security, Audit and Leadership Series)
By
Ulf Mattsson
Controlling Privacy and the Use of Data Assets Set (Security, Audit and Leadership Series)
By
Ulf Mattsson
HK$700
The Gardener of Governance (A Call to Action for Effective Internal Auditing (Security, Audit and Leadership Series))
By
Rainer Lenz
,
Barrie Enslin
The Gardener of Governance (A Call to Action for Effective Internal Auditing (Security, Audit and Leadership Series))
By
Rainer Lenz
,
Barrie Enslin
HK$371
Elsewhere
HK$494.68
Save HK$123.68 (25%)
Controlling Privacy and the Use of Data Assets - Volume 1 (Who Owns the New Oil? (Internal Audit and IT Audit))
By
Mattsson, Ulf
Controlling Privacy and the Use of Data Assets - Volume 1 (Who Owns the New Oil? (Internal Audit and IT Audit))
By
Mattsson, Ulf
HK$500
Controlling Privacy and the Use of Data Assets - Volume 1 (Who Owns the New Oil? (Internal Audit and IT Audit))
By
Mattsson, Ulf
Controlling Privacy and the Use of Data Assets - Volume 1 (Who Owns the New Oil? (Internal Audit and IT Audit))
By
Mattsson, Ulf
HK$348
Elsewhere
HK$403.80
Save HK$55.80 (14%)
Advanced Health Technology (Managing Risk While Tackling Barriers to Rapid Acceleration)
By
Sherri Douville
Advanced Health Technology (Managing Risk While Tackling Barriers to Rapid Acceleration)
By
Sherri Douville
HK$370
Elsewhere
HK$383.61
Save HK$13.61 (4%)
Advanced Health Technology (Managing Risk While Tackling Barriers to Rapid Acceleration)
By
Sherri Douville
Advanced Health Technology (Managing Risk While Tackling Barriers to Rapid Acceleration)
By
Sherri Douville
HK$897
Elsewhere
HK$1,262.19
Save HK$365.19 (29%)
Optimal Spending on Cybersecurity Measures (Digital Privacy and Data Protection)
By
Tara Kissoon
Optimal Spending on Cybersecurity Measures (Digital Privacy and Data Protection)
By
Tara Kissoon
HK$800
Elsewhere
HK$1,211.70
Save HK$411.70 (34%)
Optimal Spending on Cybersecurity Measures (Digital Privacy and Data Protection)
By
Tara Kissoon
Optimal Spending on Cybersecurity Measures (Digital Privacy and Data Protection)
By
Tara Kissoon
HK$391
Elsewhere
HK$484.58
Save HK$93.58 (19%)
Security Yearbook 2024 (A History and Directory of the It Security Industry)
By
Stiennon, Richard
Security Yearbook 2024 (A History and Directory of the It Security Industry)
By
Stiennon, Richard
HK$388
Elsewhere
HK$429.15
Save HK$41.15 (10%)
1
2
Next Page
1
2
Next Page