0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(21)
Sold By
Sold By
All Sellers
Fishpond
(26)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
United States
(11)
United Kingdom
(5)
Switzerland
(3)
Germany
(1)
USA
(1)
Results for "Pro Language Learning"
Pro Language Learning
38 results
Filters
Refine By
Category
Category
Networking
(21)
Sold By
Sold By
All Sellers
Fishpond
(26)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
United States
(11)
United Kingdom
(5)
Switzerland
(3)
Germany
(1)
USA
(1)
38 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Python Passive Network Mapping (P2nmap)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
Python Passive Network Mapping (P2nmap)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
HK$456
Elsewhere
HK$526.51
Save HK$70.51 (13%)
Executing Windows Command Line Investigations (While Ensuring Evidentiary Integrity)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
,
Bartolomie, Joshua (CEECS, CFCE, CISSP, CRISC, CSM, DFCP, Direct
,
Rosanne Pelli
Executing Windows Command Line Investigations (While Ensuring Evidentiary Integrity)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
,
Bartolomie, Joshua (CEECS, CFCE, CISSP, CRISC, CSM, DFCP, Direct
,
Rosanne Pelli
HK$592
Integrating Python with Leading Computer Forensics Platforms
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
Integrating Python with Leading Computer Forensics Platforms
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
HK$430
Network Anomaly Detection (A Machine Learning Perspective)
By
Bhattacharyya, Dhruba Kumar
,
Kalita, Jugal Kumar (University of Colorado, Colorado Springs, U
Network Anomaly Detection (A Machine Learning Perspective)
By
Bhattacharyya, Dhruba Kumar
,
Kalita, Jugal Kumar (University of Colorado, Colorado Springs, U
HK$859
Elsewhere
HK$1,135.83
Save HK$276.83 (24%)
Pro Cryptography and Cryptanalysis with C++20 (Creating and Programming Advanced Algorithms)
By
Marius Iulian Mihailescu
,
Stefania Loredana Nita
Pro Cryptography and Cryptanalysis with C++20 (Creating and Programming Advanced Algorithms)
By
Marius Iulian Mihailescu
,
Stefania Loredana Nita
HK$263
Elsewhere
HK$464.55
Save HK$201.55 (43%)
Pro Cryptography and Cryptanalysis with C++23 (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
Pro Cryptography and Cryptanalysis with C++23 (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
HK$539
Elsewhere
HK$567.81
Save HK$28.81 (5%)
Privacy-Preserving Machine Learning (Use cases driven approach to develop and protect machine learning pipelines from privacy and security threats)
By
Srinivasa Rao Aravilli
,
Sam Hamilton
Privacy-Preserving Machine Learning (Use cases driven approach to develop and protect machine learning pipelines from privacy and security threats)
By
Srinivasa Rao Aravilli
,
Sam Hamilton
HK$475
Pro Spring Security (Securing Spring Framework 6 and Boot 3-Based Java Applications)
By
Scarioni, Carlo
,
Nardone, Massimo
Pro Spring Security (Securing Spring Framework 6 and Boot 3-Based Java Applications)
By
Scarioni, Carlo
,
Nardone, Massimo
HK$377
Elsewhere
HK$516.18
Save HK$139.18 (27%)
Collaborative Networks for a Sustainable World (11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010, Proceedings (IFIP Advances in Information and Communication Technology))
By
Luis M. Camarinha-Matos
,
Xavier Boucher
,
Hamideh Afsarmanesh
Collaborative Networks for a Sustainable World (11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010, Proceedings (IFIP Advances in Information and Communication Technology))
By
Luis M. Camarinha-Matos
,
Xavier Boucher
,
Hamideh Afsarmanesh
HK$1,140
Web Hacking (Attacks and Defense)
By
Stuart McClure
,
Shah Saumil
,
Shreeraj Shah
,
Saumil Shah
Web Hacking (Attacks and Defense)
By
Stuart McClure
,
Shah Saumil
,
Shreeraj Shah
,
Saumil Shah
HK$731
1
The Art of Computer Virus Research and Defense,
By
Szor, Peter
The Art of Computer Virus Research and Defense,
By
Szor, Peter
HK$600
1
From Exposed to Secure (The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe)
By
Featuring Cybersecurity And Compliance Experts From Around The W
From Exposed to Secure (The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe)
By
Featuring Cybersecurity And Compliance Experts From Around The W
HK$136
Elsewhere
HK$144.04
Save HK$8.04 (6%)
Thrive (How to Cultivate Character So Your Children Can Flourish Online)
By
Harrison, Dr Tom
Thrive (How to Cultivate Character So Your Children Can Flourish Online)
By
Harrison, Dr Tom
HK$85.43
Elsewhere
HK$154.78
Save HK$69.35 (45%)
Thomas (Network Security First St_p2)
By
Thomas, Thomas M.
,
Stoddard, Donald
Thomas (Network Security First St_p2)
By
Thomas, Thomas M.
,
Stoddard, Donald
HK$288
2
Cryptography and Cryptanalysis in MATLAB (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
Cryptography and Cryptanalysis in MATLAB (Creating and Programming Advanced Algorithms)
By
Nita, Stefania Loredana
,
Mihailescu, Marius Iulian
HK$457
Elsewhere
HK$567.81
Save HK$110.81 (20%)
The Definitive Guide to Security in Jakarta EE (Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More)
By
Tijms, Arjan
,
Bais, Teo
,
Werner Keil
The Definitive Guide to Security in Jakarta EE (Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More)
By
Tijms, Arjan
,
Bais, Teo
,
Werner Keil
HK$594
The Gardener of Governance (A Call to Action for Effective Internal Auditing (Security, Audit and Leadership Series))
By
Rainer Lenz
,
Barrie Enslin
The Gardener of Governance (A Call to Action for Effective Internal Auditing (Security, Audit and Leadership Series))
By
Rainer Lenz
,
Barrie Enslin
HK$900
Elsewhere
HK$1,239.09
Save HK$339.09 (27%)
The Gardener of Governance (A Call to Action for Effective Internal Auditing (Security, Audit and Leadership Series))
By
Rainer Lenz
,
Barrie Enslin
The Gardener of Governance (A Call to Action for Effective Internal Auditing (Security, Audit and Leadership Series))
By
Rainer Lenz
,
Barrie Enslin
HK$390
Elsewhere
HK$505.86
Save HK$115.86 (23%)
Gray Hat Hacking (The Ethical Hacker's Handbook, Sixth Edition)
By
Baucom, Michael
,
Frost, Moses
,
Stephen Sims
,
Michael Baucom
Gray Hat Hacking (The Ethical Hacker's Handbook, Sixth Edition)
By
Baucom, Michael
,
Frost, Moses
,
Stephen Sims
,
Michael Baucom
HK$342
Elsewhere
HK$474.88
Save HK$132.88 (28%)
Rootkits and Bootkits (Reversing Modern Malware and Next Generation Threats)
By
Matrosov, Alex
,
Rodionov, Eugene
,
Sergey Bratus
Rootkits and Bootkits (Reversing Modern Malware and Next Generation Threats)
By
Matrosov, Alex
,
Rodionov, Eugene
,
Sergey Bratus
HK$312
Elsewhere
HK$495.53
Save HK$183.53 (37%)
44
Mastering Reverse Engineering (Re-engineer your ethical hacking skills)
By
Wong, Reginald
Mastering Reverse Engineering (Re-engineer your ethical hacking skills)
By
Wong, Reginald
HK$479
Computational Data and Social Networks (8th International Conference, CSoNet 2019, Ho Chi Minh City, Vietnam, November 18–20, 2019, Proceedings (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
Andrea Tagarelli
,
Hanghang Tong
Computational Data and Social Networks (8th International Conference, CSoNet 2019, Ho Chi Minh City, Vietnam, November 18–20, 2019, Proceedings (Theoretical Computer Science and General Issues) (Lecture Notes in Computer Science))
By
Andrea Tagarelli
,
Hanghang Tong
HK$560
Big Data Privacy and Security in Smart Cities (Advanced Sciences and Technologies for Security Applications)
By
Richard Jiang
,
Ahmed Bouridane
,
Chang-Tsun Li
,
Danny Crookes
Big Data Privacy and Security in Smart Cities (Advanced Sciences and Technologies for Security Applications)
By
Richard Jiang
,
Ahmed Bouridane
,
Chang-Tsun Li
,
Danny Crookes
HK$855
Elsewhere
HK$929.21
Save HK$74.21 (8%)
1
2
Next Page
1
2
Next Page