0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(14)
Sold By
Sold By
All Sellers
Fishpond
(15)
Country
Country
All Countries
United States
(8)
Germany
(2)
United Kingdom
(2)
India
(1)
Results for "SQL Data Analyst"
SQL Data Analyst
28 results
Filters
Refine By
Category
Category
Networking
(14)
Sold By
Sold By
All Sellers
Fishpond
(15)
Country
Country
All Countries
United States
(8)
Germany
(2)
United Kingdom
(2)
India
(1)
28 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
SQL & Nosql Databases (Models, Languages, Consistency Options and Architectures for Big Data Management)
By
Kaufmann, Michael
,
Meier, Andreas
SQL & Nosql Databases (Models, Languages, Consistency Options and Architectures for Big Data Management)
By
Kaufmann, Michael
,
Meier, Andreas
HK$492
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
HK$440
Elsewhere
HK$470.83
Save HK$30.83 (7%)
182
Hacking Exposed Mobile (Mobile Security Secrets & Solutions)
By
Bergman, Neil
,
Stanfield, Mike
,
Jason Rouse
,
Joel Scambray
Hacking Exposed Mobile (Mobile Security Secrets & Solutions)
By
Bergman, Neil
,
Stanfield, Mike
,
Jason Rouse
,
Joel Scambray
HK$368
Elsewhere
HK$545.07
Save HK$177.07 (32%)
36
Hardening Network Security
By
John Mallery
,
Patrick Kelly
,
Patrick Kelly
,
Wesley J. Noonan
Hardening Network Security
By
John Mallery
,
Patrick Kelly
,
Patrick Kelly
,
Wesley J. Noonan
HK$433
Security Warrior
By
Peikari, Cyrus
,
Chuvakin, Anton
Security Warrior
By
Peikari, Cyrus
,
Chuvakin, Anton
HK$288
Elsewhere
HK$356.74
Save HK$68.74 (19%)
1
CCNA Cybersecurity Operations Course Booklet (Course Booklets)
By
Cisco Networking Academy
CCNA Cybersecurity Operations Course Booklet (Course Booklets)
By
Cisco Networking Academy
HK$379
2
Seven Deadliest Microsoft Attacks
By
Kraus, Rob (CISSP, C|EH, MCSE; Senior Security Consultant for So
,
Barber, Brian
,
Mike Borkin
,
Naomi J. Alpern
Seven Deadliest Microsoft Attacks
By
Kraus, Rob (CISSP, C|EH, MCSE; Senior Security Consultant for So
,
Barber, Brian
,
Mike Borkin
,
Naomi J. Alpern
HK$247
Practical Cyber Forensics (An Incident-Based Approach to Forensic Investigations)
By
Reddy, Niranjan
Practical Cyber Forensics (An Incident-Based Approach to Forensic Investigations)
By
Reddy, Niranjan
HK$347
Elsewhere
HK$396.39
Save HK$49.39 (12%)
It Security Controls (A Guide to Corporate Standards and Frameworks)
By
Kuyucu, Oben
,
Viegas, Virgilio
It Security Controls (A Guide to Corporate Standards and Frameworks)
By
Kuyucu, Oben
,
Viegas, Virgilio
HK$493
Elsewhere
HK$545.07
Save HK$52.07 (10%)
Secure Your Node.Js Web Application (Keep Attackers Out and Users Happy)
By
Duuna, Karl
Secure Your Node.Js Web Application (Keep Attackers Out and Users Happy)
By
Duuna, Karl
HK$222
Elsewhere
HK$287.36
Save HK$65.36 (23%)
iOS Forensics for Investigators (Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence)
By
Gianluca Tiepolo
iOS Forensics for Investigators (Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence)
By
Gianluca Tiepolo
HK$411
Expert Oracle and Java Security (Programming Secure Oracle Database Applications with Java)
By
Coffin, David
Expert Oracle and Java Security (Programming Secure Oracle Database Applications with Java)
By
Coffin, David
HK$591
Ethical Hacker's Penetration Testing Guide (Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks (Eng)
By
Rakshit, Samir Kumar
Ethical Hacker's Penetration Testing Guide (Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks (Eng)
By
Rakshit, Samir Kumar
HK$288
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences & Innovative Business Technology)
By
Adarsh Kumar
,
Neelu Jyothi Ahuja
,
Keshav Kaushik
,
Deepak Singh Tomar
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences & Innovative Business Technology)
By
Adarsh Kumar
,
Neelu Jyothi Ahuja
,
Keshav Kaushik
,
Deepak Singh Tomar
HK$1,140
Elsewhere
HK$1,288.49
Save HK$148.49 (12%)
SQL Server Forensic Analysis (paperback)
By
Kevvie Fowler
SQL Server Forensic Analysis (paperback)
By
Kevvie Fowler
1
Currently
Unavailable
Snort for Dummies
By
Charlie Scott
,
Paul Wolfe
,
Bert Hayes
Snort for Dummies
By
Charlie Scott
,
Paul Wolfe
,
Bert Hayes
1
Currently
Unavailable
Snort?For Dummies
By
Charlie Scott
,
Paul Wolfe
,
Bert Hayes
Snort?For Dummies
By
Charlie Scott
,
Paul Wolfe
,
Bert Hayes
Currently
Unavailable
Snort (TM) for Dummies
By
Charlie Scott
,
Paul Wolfe
,
Bert Hayes
Snort (TM) for Dummies
By
Charlie Scott
,
Paul Wolfe
,
Bert Hayes
Currently
Unavailable
Special Ops (Host and Network Security for Microsoft Unix and Oracle)
By
Eric Pace Birkholz
,
Stuart McClure
Special Ops (Host and Network Security for Microsoft Unix and Oracle)
By
Eric Pace Birkholz
,
Stuart McClure
Currently
Unavailable
Intrusion Detection with Snort
By
Koziol, Jack
Intrusion Detection with Snort
By
Koziol, Jack
12
Currently
Unavailable
Cybersecurity in Knowledge Management (Cyberthreats and Solutions)
By
Narasimha Rao Vajjhala
,
Kenneth David Strang
Cybersecurity in Knowledge Management (Cyberthreats and Solutions)
By
Narasimha Rao Vajjhala
,
Kenneth David Strang
Currently
Unavailable
Cybersecurity in Knowledge Management (Cyberthreats and Solutions)
By
Narasimha Rao Vajjhala
,
Kenneth David Strang
Cybersecurity in Knowledge Management (Cyberthreats and Solutions)
By
Narasimha Rao Vajjhala
,
Kenneth David Strang
Currently
Unavailable
Casp: Comptia Advanced Security Practitioner Study Guide Authorized Courseware (Exam Cas-001)
By
Michael Gregg
,
Billy Haines
Casp: Comptia Advanced Security Practitioner Study Guide Authorized Courseware (Exam Cas-001)
By
Michael Gregg
,
Billy Haines
Currently
Unavailable
1
2
Next Page
1
2
Next Page