0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Filters
Refine By
Category
Category
Artificial Intelligence
(307)
Business Software
(21)
Certification
(82)
Cloud Computing
(89)
Computer Science
(360)
Computer Simulation
(31)
Enterprise Applications
(214)
General
(100)
Graphics & Design
(44)
Hardware
(325)
Internet
(63)
Machine Theory
(47)
Networking
(398)
Operating Systems
(61)
Programming
(302)
Security
(506)
Server & Database
(256)
Social Aspects
(73)
Special Topics
(466)
Web
(117)
More Computers Categories...
Sold By
Sold By
All Sellers
Fishpond
(1,645)
SmartSell
(1)
Age Range
Age Range
All Ranges
15+
(70)
All Ages
(34)
Country
Country
All Countries
United States
(589)
United Kingdom
(364)
Switzerland
(201)
Germany
(127)
Singapore
(45)
More...
Results for "Operational Security"
Operational Security
2,543 results
Filters
Refine By
Category
Category
Artificial Intelligence
(307)
Business Software
(21)
Certification
(82)
Cloud Computing
(89)
Computer Science
(360)
Computer Simulation
(31)
Enterprise Applications
(214)
General
(100)
Graphics & Design
(44)
Hardware
(325)
Internet
(63)
Machine Theory
(47)
Networking
(398)
Operating Systems
(61)
Programming
(302)
Security
(506)
Server & Database
(256)
Social Aspects
(73)
Special Topics
(466)
Web
(117)
More Computers Categories...
Sold By
Sold By
All Sellers
Fishpond
(1,645)
SmartSell
(1)
Age Range
Age Range
All Ranges
15+
(70)
All Ages
(34)
Country
Country
All Countries
United States
(589)
United Kingdom
(364)
Switzerland
(201)
Germany
(127)
Singapore
(45)
More...
2,543 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Wireless Operational Security
By
Rittinghouse, PhD, CISM, John (SVP, Professional Security Servic
,
Ransome, PhD, CISM, CISSP, James F. (James F. Ransome, Ph.D., CI
Wireless Operational Security
By
Rittinghouse, PhD, CISM, John (SVP, Professional Security Servic
,
Ransome, PhD, CISM, CISSP, James F. (James F. Ransome, Ph.D., CI
HK$793
Security Risk Assessment (Managing Physical and Operational Security)
By
White, John M. (CPP, CHPA; President and principal consultant, P
Security Risk Assessment (Managing Physical and Operational Security)
By
White, John M. (CPP, CHPA; President and principal consultant, P
HK$376
The Holistic Operational Readiness Security Evaluation (Horse Project Series: Governance Documentation and Information Technology Security Policies Demystified)
By
MR Michael D. Peters
The Holistic Operational Readiness Security Evaluation (Horse Project Series: Governance Documentation and Information Technology Security Policies Demystified)
By
MR Michael D. Peters
HK$495
The Wireshark Field Guide (Analyzing and Troubleshooting Network Traffic)
By
Shimonski, Robert (is a networking and security veteran with ove
The Wireshark Field Guide (Analyzing and Troubleshooting Network Traffic)
By
Shimonski, Robert (is a networking and security veteran with ove
HK$233
Elsewhere
HK$245.34
Save HK$12.34 (5%)
9
Integrated Security Systems Design (A Complete Reference for Building Enterprise-Wide Digital Security Systems)
By
Norman, Thomas L., CPP/PSP/CSC (Global Cyber Security Consultant
Integrated Security Systems Design (A Complete Reference for Building Enterprise-Wide Digital Security Systems)
By
Norman, Thomas L., CPP/PSP/CSC (Global Cyber Security Consultant
HK$500
Penetration Tester's Open Source Toolkit 4e
By
Faircloth, Jeremy
Penetration Tester's Open Source Toolkit 4e
By
Faircloth, Jeremy
HK$500
Effective Security Management 6e
By
Sennewald, Charles A. (Independent security management consultan
,
Baillie, Curtis (President, Security Consulting Strategies, Sand
Effective Security Management 6e
By
Sennewald, Charles A. (Independent security management consultan
,
Baillie, Curtis (President, Security Consulting Strategies, Sand
HK$600
Becoming a Global Chief Security Executive Officer (A How to Guide for Next Generation Security Leaders)
By
Cloutier, Roland (Chief Security Officer, Automatic Data Process
Becoming a Global Chief Security Executive Officer (A How to Guide for Next Generation Security Leaders)
By
Cloutier, Roland (Chief Security Officer, Automatic Data Process
HK$431
Elsewhere
HK$480.56
Save HK$49.56 (10%)
Security Operations Center Guidebook (A Practical Guide for a Successful SOC)
By
Gregory (Security Operations Manager for Corporate Security for
,
Mccoy, Scott
Security Operations Center Guidebook (A Practical Guide for a Successful SOC)
By
Gregory (Security Operations Manager for Corporate Security for
,
Mccoy, Scott
HK$462
Elsewhere
HK$807.82
Save HK$345.82 (43%)
Trojans, Worms, and Spyware (A Computer Security Professional's Guide to Malicious Code)
By
Erbschloe, Michael (Author, educator and security advisor, Washi
Trojans, Worms, and Spyware (A Computer Security Professional's Guide to Malicious Code)
By
Erbschloe, Michael (Author, educator and security advisor, Washi
HK$405
Elsewhere
HK$449.88
Save HK$44.88 (10%)
Building in Security at Agile Speed
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Brook S.E. Schoenfield
Building in Security at Agile Speed
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Brook S.E. Schoenfield
HK$600
Securing Converged IP Networks
By
Macaulay, Tyson (Security Liaison Officer, Bell Canada, Ottawa,
Securing Converged IP Networks
By
Macaulay, Tyson (Security Liaison Officer, Bell Canada, Ottawa,
HK$700
Elsewhere
HK$991.91
Save HK$291.91 (29%)
Business Continuity and Disaster Recovery for InfoSec Managers
By
Rittinghouse, PhD, CISM, John (SVP, Professional Security Servic
,
Ransome, PhD, CISM, CISSP, James F. (James F. Ransome, Ph.D., CI
Business Continuity and Disaster Recovery for InfoSec Managers
By
Rittinghouse, PhD, CISM, John (SVP, Professional Security Servic
,
Ransome, PhD, CISM, CISSP, James F. (James F. Ransome, Ph.D., CI
HK$740
Physical and Logical Security Convergence (Powered by Enterprise Security Management)
By
Crowell, William P (Former Deputy Director, National Security Ag
,
Contos, Brian T
,
William P. Crowell
,
Dan Dunkel
Physical and Logical Security Convergence (Powered by Enterprise Security Management)
By
Crowell, William P (Former Deputy Director, National Security Ag
,
Contos, Brian T
,
William P. Crowell
,
Dan Dunkel
HK$694
Check Point NGX R65 Security Administration
By
Bonnell, Ralph (Senior Information Security Consultant, SiegeWor
Check Point NGX R65 Security Administration
By
Bonnell, Ralph (Senior Information Security Consultant, SiegeWor
HK$459
1
Enterprise Architecture and Information Assurance (Developing a Secure Foundation)
By
Scholz, James A. (Computer Security Consulting, Inc., Mabelvale,
Enterprise Architecture and Information Assurance (Developing a Secure Foundation)
By
Scholz, James A. (Computer Security Consulting, Inc., Mabelvale,
HK$582
Elsewhere
HK$736.23
Save HK$154.23 (21%)
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
HK$900
Elsewhere
HK$1,329.50
Save HK$429.50 (32%)
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
HK$466
Operational Semantics and Verification of Security Protocols (Information Security and Cryptography)
By
Cremers, Cas
,
Mauw, Sjouke
Operational Semantics and Verification of Security Protocols (Information Security and Cryptography)
By
Cremers, Cas
,
Mauw, Sjouke
HK$600
The Change Agent, Auditor Essentials, and Operational Auditing Three-Book Set (Security, Audit and Leadership Series)
By
Murdock, Hernan (Murdock Global Advisors, Wayland, Massachusetts
The Change Agent, Auditor Essentials, and Operational Auditing Three-Book Set (Security, Audit and Leadership Series)
By
Murdock, Hernan (Murdock Global Advisors, Wayland, Massachusetts
HK$940
Information and Operational Technology Security Systems (First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers (Lecture Notes in Computer Science) (Security and Cryptology))
By
Apostolos P. Fournaris
,
Konstantinos Lampropoulos
,
Eva Marín Tordera
Information and Operational Technology Security Systems (First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers (Lecture Notes in Computer Science) (Security and Cryptology))
By
Apostolos P. Fournaris
,
Konstantinos Lampropoulos
,
Eva Marín Tordera
HK$480
Splunk Operational Intelligence Cookbook
By
Paul R. Johnson
,
Josh Diakun
,
Derek Mock
Splunk Operational Intelligence Cookbook
By
Paul R. Johnson
,
Josh Diakun
,
Derek Mock
HK$500
2
UMTS Security
By
Valtteri Niemi
,
Kaisa Nyberg
UMTS Security
By
Valtteri Niemi
,
Kaisa Nyberg
HK$1,200
Complete Guide to Security and Privacy Metrics (Measuring Regulatory Compliance, Operational Resilience, and Roi)
By
Herrmann, Debra S. (Biological Computing Initiative, North Bethe
Complete Guide to Security and Privacy Metrics (Measuring Regulatory Compliance, Operational Resilience, and Roi)
By
Herrmann, Debra S. (Biological Computing Initiative, North Bethe
HK$1,400
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page