0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Special Topics
Viruses
Filters
Sold By
Sold By
All Sellers
Fishpond
(26)
Country
Country
All Countries
United States
(15)
United Kingdom
(4)
USA
(1)
Results for "API"
API
35 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(26)
Country
Country
All Countries
United States
(15)
United Kingdom
(4)
USA
(1)
Related Searches:
linux api
rest api
web api
api 579-1
"api 579"
web api 2
$sj pulse desktop api url$
api ponds and accessories
35 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
HK$440
Elsewhere
HK$475.59
Save HK$35.59 (7%)
182
Security Power Tools
By
Bryan Burns
,
Dave Killion
,
Nicolas Beauchesne
,
Paul Guersch
Security Power Tools
By
Bryan Burns
,
Dave Killion
,
Nicolas Beauchesne
,
Paul Guersch
HK$440
Elsewhere
HK$480.50
Save HK$40.50 (8%)
The Art of Memory Forensics (Detecting Malware and Threats in Windows, Linux, and Mac Memory)
By
Hale Ligh, Michael
,
Case, Andrew
,
Jamie Levy
The Art of Memory Forensics (Detecting Malware and Threats in Windows, Linux, and Mac Memory)
By
Hale Ligh, Michael
,
Case, Andrew
,
Jamie Levy
HK$500
Elsewhere
HK$520.65
Save HK$20.65 (4%)
122
Hunting Cyber Criminals - A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
By
Troia, Vinny
Hunting Cyber Criminals - A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
By
Troia, Vinny
HK$284
Elsewhere
HK$330.41
Save HK$46.41 (14%)
Corporate Cybersecurity (Identifying Risks and the Bug Bounty Program (IEEE Press))
By
Jackson, John
Corporate Cybersecurity (Identifying Risks and the Bug Bounty Program (IEEE Press))
By
Jackson, John
HK$600
Elsewhere
HK$940.67
Save HK$340.67 (36%)
MC Microsoft Certified Azure Data Fundamentals Study Guide (Exam Dp-900)
By
Jake Switzer
MC Microsoft Certified Azure Data Fundamentals Study Guide (Exam Dp-900)
By
Jake Switzer
HK$325
Elsewhere
HK$380.37
Save HK$55.37 (15%)
Data Exfiltration Threats and Prevention Techniques (Machine Learning and Memory-Based Data Security)
By
Zahir Tari
,
Nasrin Sohrabi
,
Yasaman Samadi
Data Exfiltration Threats and Prevention Techniques (Machine Learning and Memory-Based Data Security)
By
Zahir Tari
,
Nasrin Sohrabi
,
Yasaman Samadi
HK$900
Elsewhere
HK$1,021.27
Save HK$121.27 (12%)
Practical Malware Analysis (The Hands-On Guide to Dissecting Malicious Software)
By
Sikorski, Michael
,
Honig, Andrew
Practical Malware Analysis (The Hands-On Guide to Dissecting Malicious Software)
By
Sikorski, Michael
,
Honig, Andrew
HK$437
Elsewhere
HK$570.61
Save HK$133.61 (23%)
592
Black Hat Go (Go Programming for Hackers and Pentesters)
By
Steele, Tom
,
Patten, Chris
,
Dan Kottmann
Black Hat Go (Go Programming for Hackers and Pentesters)
By
Steele, Tom
,
Patten, Chris
,
Dan Kottmann
HK$280
Elsewhere
HK$430.44
Save HK$150.44 (35%)
81
Application Security for the Android Platform (Processes, Permissions, and Other Safeguards)
By
Six, Jeff
Application Security for the Android Platform (Processes, Permissions, and Other Safeguards)
By
Six, Jeff
HK$124
Elsewhere
HK$145.18
Save HK$21.18 (15%)
The Architecture of Privacy (On Engineering Technologies That Can Deliver Trustworthy Safeguards)
By
Bowman, Courtney
,
Gesher, Ari
,
John K. Grant
The Architecture of Privacy (On Engineering Technologies That Can Deliver Trustworthy Safeguards)
By
Bowman, Courtney
,
Gesher, Ari
,
John K. Grant
HK$184
Elsewhere
HK$240.20
Save HK$56.20 (23%)
Evasive Malware (A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats)
By
Cucci, Kyle
Evasive Malware (A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats)
By
Cucci, Kyle
HK$452
Elsewhere
HK$670.73
Save HK$218.73 (33%)
The Art of Mac Malware, Volume 2 (Detecting Malicious Software)
By
Patrick Wardle
The Art of Mac Malware, Volume 2 (Detecting Malicious Software)
By
Patrick Wardle
HK$383
Elsewhere
HK$540.57
Save HK$157.57 (29%)
Alice and Bob Learn Secure Coding
By
Tanya Janca
Alice and Bob Learn Secure Coding
By
Tanya Janca
HK$344
Elsewhere
HK$380.37
Save HK$36.37 (10%)
A Beginner's Guide To Web Application Penetration Testing (Tech Today)
By
Ali Abdollahi
A Beginner's Guide To Web Application Penetration Testing (Tech Today)
By
Ali Abdollahi
HK$324
Elsewhere
HK$380.37
Save HK$56.37 (15%)
PowerShell Automation and Scripting for Cybersecurity (Hacking and defense for red and blue teamers)
By
Miriam C. Wiesner
,
Tanya Janca
PowerShell Automation and Scripting for Cybersecurity (Hacking and defense for red and blue teamers)
By
Miriam C. Wiesner
,
Tanya Janca
HK$540
Mastering Microsoft 365 Defender (Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats)
By
Ru Campbell
,
Viktor Hedberg
,
Heike Ritter
Mastering Microsoft 365 Defender (Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats)
By
Ru Campbell
,
Viktor Hedberg
,
Heike Ritter
HK$534
Implementing Palo Alto Networks Prisma(R) Access (Learn real-world network protection)
By
Tom Piens Aka 'Reaper'
,
Rutger Truyers
Implementing Palo Alto Networks Prisma(R) Access (Learn real-world network protection)
By
Tom Piens Aka 'Reaper'
,
Rutger Truyers
HK$500
Mastering Microsoft Defender for Office 365 (Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting)
By
Samuel Soto
Mastering Microsoft Defender for Office 365 (Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting)
By
Samuel Soto
HK$447
Microsoft Defender for Identity in Depth (An exhaustive guide to ITDR, breach prevention, and cyberattack response)
By
Pierre Thoor
,
Matthew Zorich
Microsoft Defender for Identity in Depth (An exhaustive guide to ITDR, breach prevention, and cyberattack response)
By
Pierre Thoor
,
Matthew Zorich
HK$435
Automating Security Detection Engineering (A hands-on guide to implementing Detection as Code)
By
Dennis Chow
,
David Bruskin
Automating Security Detection Engineering (A hands-on guide to implementing Detection as Code)
By
Dennis Chow
,
David Bruskin
HK$481
Malware Analysis Techniques (Tricks for the triage of adversarial software)
By
Barker, Dylan
Malware Analysis Techniques (Tricks for the triage of adversarial software)
By
Barker, Dylan
HK$469
Cybersecurity Design Principles (Building Secure Resilient Architecture)
By
Miller, Richie
Cybersecurity Design Principles (Building Secure Resilient Architecture)
By
Miller, Richie
HK$238
Red Team Operations (Black Box Hacking, Social Engineering & Web App Scanning)
By
Botwright, Rob
Red Team Operations (Black Box Hacking, Social Engineering & Web App Scanning)
By
Botwright, Rob
HK$382
1
2
Next Page
1
2
Next Page