0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(13)
Sold By
Sold By
All Sellers
Fishpond
(17)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
United States
(7)
United Kingdom
(6)
Germany
(1)
Switzerland
(1)
Results for "Swift Programming"
Swift Programming
19 results
Filters
Refine By
Category
Category
Networking
(13)
Sold By
Sold By
All Sellers
Fishpond
(17)
Age Range
Age Range
All Ranges
All Ages
(1)
Country
Country
All Countries
United States
(7)
United Kingdom
(6)
Germany
(1)
Switzerland
(1)
19 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
CyberDynamX (The Art and Science of Building a Simplified Digital Security Program)
By
Curtis L. Blais
CyberDynamX (The Art and Science of Building a Simplified Digital Security Program)
By
Curtis L. Blais
HK$500
Cryptography and Cryptanalysis in Java (Creating and Programming Advanced Algorithms with Java Se 17 Lts and Jakarta Ee 10)
By
Mihailescu, Marius Iulian
,
Nita, Stefania Loredana
Cryptography and Cryptanalysis in Java (Creating and Programming Advanced Algorithms with Java Se 17 Lts and Jakarta Ee 10)
By
Mihailescu, Marius Iulian
,
Nita, Stefania Loredana
HK$432
Privacy, Regulations, and Cybersecurity - The Essential Business Guide
By
Chris Moschovitis
Privacy, Regulations, and Cybersecurity - The Essential Business Guide
By
Chris Moschovitis
HK$320
Elsewhere
HK$360.36
Save HK$40.36 (11%)
Cyber Threat Intelligence
By
Lee, Martin
Cyber Threat Intelligence
By
Lee, Martin
HK$855
Beginning SQL Server for Developers
By
Dewson, Robin
Beginning SQL Server for Developers
By
Dewson, Robin
HK$559
Karma-Based API on Apple Platforms (Building Privacy Into IOS and Macos Apps)
By
Carrasco Molina, Manuel
Karma-Based API on Apple Platforms (Building Privacy Into IOS and Macos Apps)
By
Carrasco Molina, Manuel
HK$229
Elsewhere
HK$288.27
Save HK$59.27 (21%)
Big Breaches (Cybersecurity Lessons for Everyone)
By
Elbayadi, Moudy
,
Daswani, Neil
Big Breaches (Cybersecurity Lessons for Everyone)
By
Elbayadi, Moudy
,
Daswani, Neil
HK$264
Elsewhere
HK$288.27
Save HK$24.27 (8%)
Mergers & Acquisitions Cybersecurity (The Framework For Maximizing Value)
By
Grant, Lawrence
Mergers & Acquisitions Cybersecurity (The Framework For Maximizing Value)
By
Grant, Lawrence
HK$500
Blockchain Developer's Guide (Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda)
By
Chopra, Samanyu
,
Hill, Brenn
,
Paul Valencourt
,
Narayan Prusty
Blockchain Developer's Guide (Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda)
By
Chopra, Samanyu
,
Hill, Brenn
,
Paul Valencourt
,
Narayan Prusty
HK$536
Mobile App Reverse Engineering (Get started with discovering, analyzing, and exploring the internals of Android and iOS apps)
By
Abhinav Mishra
Mobile App Reverse Engineering (Get started with discovering, analyzing, and exploring the internals of Android and iOS apps)
By
Abhinav Mishra
HK$314
Practical Threat Detection Engineering (A hands-on guide to planning, developing, and validating detection capabilities)
By
Roddie, Megan
,
Deyalsingh, Jason
,
Gary J. Katz
Practical Threat Detection Engineering (A hands-on guide to planning, developing, and validating detection capabilities)
By
Roddie, Megan
,
Deyalsingh, Jason
,
Gary J. Katz
HK$552
Digital Forensics and Incident Response - Third Edition (Incident response tools and techniques for effective cyber threat response)
By
Gerard Johansen
Digital Forensics and Incident Response - Third Edition (Incident response tools and techniques for effective cyber threat response)
By
Gerard Johansen
HK$537
Digital Forensics and Incident Response (Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition)
By
Johansen, Gerard
Digital Forensics and Incident Response (Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition)
By
Johansen, Gerard
HK$558
Advances in Artificial Intelligence and Security (7th International Conference, ICAIS 2021, Dublin, Ireland, July 16-19, 2021, Proceedings, Part II (Communications in Computer and Information Science))
By
Xingming Sun
,
Xiaorui Zhang
,
Zhihua Xia
,
Elisa Bertino
Advances in Artificial Intelligence and Security (7th International Conference, ICAIS 2021, Dublin, Ireland, July 16-19, 2021, Proceedings, Part II (Communications in Computer and Information Science))
By
Xingming Sun
,
Xiaorui Zhang
,
Zhihua Xia
,
Elisa Bertino
HK$1,040
Human Digital Twin (Exploring Connectivity and Security Issues (SpringerBriefs in Computer Science))
By
Samuel D. Okegbile
,
Jun Cai
,
Changyan Yi
Human Digital Twin (Exploring Connectivity and Security Issues (SpringerBriefs in Computer Science))
By
Samuel D. Okegbile
,
Jun Cai
,
Changyan Yi
HK$382
Elsewhere
HK$463.35
Save HK$81.35 (18%)
Image Analysis and Recognition (6th International Conference, ICIAR 2009, Halifax, Canada, July 6-8, 2009, Proceedings (Lecture Notes in Computer Science) (Image Processing, Computer Vision, Pattern Recognition, and Graphics))
By
Mohamed Kamel
,
Aurelio Campilho
Image Analysis and Recognition (6th International Conference, ICIAR 2009, Halifax, Canada, July 6-8, 2009, Proceedings (Lecture Notes in Computer Science) (Image Processing, Computer Vision, Pattern Recognition, and Graphics))
By
Mohamed Kamel
,
Aurelio Campilho
HK$1,085
The Five Anchors of Cyber Resilience (Why some enterprises are hacked into bankruptcy, while others easily bounce back)
By
Zongo, Phillimon
The Five Anchors of Cyber Resilience (Why some enterprises are hacked into bankruptcy, while others easily bounce back)
By
Zongo, Phillimon
Currently
Unavailable
Cyberattacken [German] (Cybersecurity-Lektionen Für Jedermann)
By
Neil Daswani
,
Moudy Elbayadi
Cyberattacken [German] (Cybersecurity-Lektionen Für Jedermann)
By
Neil Daswani
,
Moudy Elbayadi
Currently
Unavailable