0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(13)
Sold By
Sold By
All Sellers
Fishpond
(13)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
United States
(6)
United Kingdom
(5)
Canada
(1)
Results for "Programming Ruby"
Programming Ruby
17 results
Filters
Refine By
Category
Category
Networking
(13)
Sold By
Sold By
All Sellers
Fishpond
(13)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
United States
(6)
United Kingdom
(5)
Canada
(1)
17 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Ruby Developers Guide
By
Robert Feldt
,
Lyle R. Johnson
,
Michael Neumann
Ruby Developers Guide
By
Robert Feldt
,
Lyle R. Johnson
,
Michael Neumann
HK$589
Gray Hat Hacking (The Ethical Hacker's Handbook)
By
Allen Harper
,
Shon Harris
,
Jonathan Ness
,
Chris Eagle
Gray Hat Hacking (The Ethical Hacker's Handbook)
By
Allen Harper
,
Shon Harris
,
Jonathan Ness
,
Chris Eagle
HK$673
1
Conducting Network Penetration and Espionage in a Global Environment
By
Middleton, Bruce
Conducting Network Penetration and Espionage in a Global Environment
By
Middleton, Bruce
HK$1,000
Elsewhere
HK$1,080.57
Save HK$80.57 (7%)
Beginning Ethical Hacking with Kali Linux (Computational Techniques for Resolving Security Issues)
By
Sinha, Sanjib
Beginning Ethical Hacking with Kali Linux (Computational Techniques for Resolving Security Issues)
By
Sinha, Sanjib
HK$500
Elsewhere
HK$668.82
Save HK$168.82 (25%)
Practical Blockchains and Cryptocurrencies (Speed Up Your Application Development Process and Develop Distributed Applications with Confidence)
By
Garewal, Karan Singh
Practical Blockchains and Cryptocurrencies (Speed Up Your Application Development Process and Develop Distributed Applications with Confidence)
By
Garewal, Karan Singh
HK$244
Conducting Network Penetration and Espionage in a Global Environment
By
Bruce Middleton
Conducting Network Penetration and Espionage in a Global Environment
By
Bruce Middleton
HK$680
Alice and Bob Learn Secure Coding
By
Tanya Janca
Alice and Bob Learn Secure Coding
By
Tanya Janca
HK$354
Elsewhere
HK$390.96
Save HK$36.96 (9%)
Coding for Penetration Testers (Building Better Tools)
By
Jason Andress
,
Ryan Linn
Coding for Penetration Testers (Building Better Tools)
By
Jason Andress
,
Ryan Linn
HK$284
1
OAuth 2.0 Cookbook
By
Nascimento, Adolfo Eloy
OAuth 2.0 Cookbook
By
Nascimento, Adolfo Eloy
HK$476
Hands-On Bug Hunting for Penetration Testers (A practical guide to help ethical hackers discover web application security flaws)
By
Marshall, Joseph
Hands-On Bug Hunting for Penetration Testers (A practical guide to help ethical hackers discover web application security flaws)
By
Marshall, Joseph
HK$357
Improving your Penetration Testing Skills (Strengthen your defense against web attacks with Kali Linux and Metasploit)
By
Najera-Gutierrez, Gilberto
,
Ahmed Ansari, Juned
,
Daniel Teixeira
,
Abhinav Singh
Improving your Penetration Testing Skills (Strengthen your defense against web attacks with Kali Linux and Metasploit)
By
Najera-Gutierrez, Gilberto
,
Ahmed Ansari, Juned
,
Daniel Teixeira
,
Abhinav Singh
HK$540
Mastering Metasploit - Fourth Edition (Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework)
By
Jaswal, Nipun
Mastering Metasploit - Fourth Edition (Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework)
By
Jaswal, Nipun
HK$487
Metasploit, 2nd Edition
By
David Kennedy
,
Mati Aharoni
,
Devon Kearns
,
Jim O'Gorman
Metasploit, 2nd Edition
By
David Kennedy
,
Mati Aharoni
,
Devon Kearns
,
Jim O'Gorman
HK$360
Elsewhere
HK$586.49
Save HK$226.49 (39%)
Informants and Undercover Investigations (A Practical Guide to Law, Policy, and Procedure (Practical Aspects of Criminal and Forensic Investigations))
By
Dennis G. Fitzgerald
Informants and Undercover Investigations (A Practical Guide to Law, Policy, and Procedure (Practical Aspects of Criminal and Forensic Investigations))
By
Dennis G. Fitzgerald
Currently
Unavailable
Ajax Security
By
Billy Hoffman
,
Bryan Sullivan
Ajax Security
By
Billy Hoffman
,
Bryan Sullivan
Currently
Unavailable
Pro Spring Security (Securing Spring Framework 5 and Boot 2-Based Java Applications)
By
Nardone, Massimo
,
Scarioni, Carlo
Pro Spring Security (Securing Spring Framework 5 and Boot 2-Based Java Applications)
By
Nardone, Massimo
,
Scarioni, Carlo
Currently
Unavailable
Clarke, G (CompTIA PenTest+ Certification For Dummies)
By
Glen E. Clarke
Clarke, G (CompTIA PenTest+ Certification For Dummies)
By
Glen E. Clarke
Currently
Unavailable