0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Filters
Refine By
Category
Category
Security
(83)
Programming
(75)
Server & Database
(71)
Special Topics
(59)
Networking
(54)
Computer Science
(53)
Hardware
(41)
Artificial Intelligence
(34)
Web
(33)
Enterprise Applications
(28)
Operating Systems
(15)
Certification
(11)
General
(11)
Social Aspects
(9)
Internet
(7)
Data Processing
(5)
Graphics & Design
(5)
Machine Theory
(3)
Applications
(2)
Desktop Publishing
(2)
Cloud Computing
(1)
Computer Simulation
(1)
Project Management
(1)
Sold By
Sold By
All Sellers
Fishpond
(230)
Age Range
Age Range
All Ranges
15+
(16)
All Ages
(7)
Country
Country
All Countries
United States
(117)
United Kingdom
(46)
Germany
(26)
Switzerland
(18)
USA
(5)
More...
Results for "SQL Exploits"
SQL Exploits
380 results
Filters
Refine By
Category
Category
Security
(83)
Programming
(75)
Server & Database
(71)
Special Topics
(59)
Networking
(54)
Computer Science
(53)
Hardware
(41)
Artificial Intelligence
(34)
Web
(33)
Enterprise Applications
(28)
Operating Systems
(15)
Certification
(11)
General
(11)
Social Aspects
(9)
Internet
(7)
Data Processing
(5)
Graphics & Design
(5)
Machine Theory
(3)
Applications
(2)
Desktop Publishing
(2)
Cloud Computing
(1)
Computer Simulation
(1)
Project Management
(1)
Sold By
Sold By
All Sellers
Fishpond
(230)
Age Range
Age Range
All Ranges
15+
(16)
All Ages
(7)
Country
Country
All Countries
United States
(117)
United Kingdom
(46)
Germany
(26)
Switzerland
(18)
USA
(5)
More...
380 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Expert Oracle JDBC Programming (High Performance Applications With Oracle 10g)
By
R.M. Menon
Expert Oracle JDBC Programming (High Performance Applications With Oracle 10g)
By
R.M. Menon
HK$459
Elsewhere
HK$514.84
Save HK$55.84 (11%)
1
Pro Openssh
By
Michael Stahnke
,
John Traenkenschuh
Pro Openssh
By
Michael Stahnke
,
John Traenkenschuh
HK$278
Elsewhere
HK$324.31
Save HK$46.31 (14%)
2
Pro ASP.NET 2.0 Website Programming
By
D. Armstrong
Pro ASP.NET 2.0 Website Programming
By
D. Armstrong
HK$391
Elsewhere
HK$406.70
Save HK$15.70 (4%)
Pro Active Record (Databases with Ruby and Rails)
By
Marshall, Kevin
,
Pytel, Chad
,
Kevin Marshall
Pro Active Record (Databases with Ruby and Rails)
By
Marshall, Kevin
,
Pytel, Chad
,
Kevin Marshall
HK$288
Elsewhere
HK$324.31
Save HK$36.31 (11%)
Expert Oracle Indexing and Access Paths (Maximum Performance for Your Database)
By
Kuhn, Darl
,
Alapati, Sam R.
,
Bill Padfield
Expert Oracle Indexing and Access Paths (Maximum Performance for Your Database)
By
Kuhn, Darl
,
Alapati, Sam R.
,
Bill Padfield
HK$600
Elsewhere
HK$669.33
Save HK$69.33 (10%)
Big Data Smack (A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka)
By
Estrada, Raul
,
Ruiz, Isaac
Big Data Smack (A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka)
By
Estrada, Raul
,
Ruiz, Isaac
HK$418
From Hacking to Report Writing (An Introduction to Security and Penetration Testing)
By
Svensson, Robert
From Hacking to Report Writing (An Introduction to Security and Penetration Testing)
By
Svensson, Robert
HK$760
Beginning Ethical Hacking with Kali Linux (Computational Techniques for Resolving Security Issues)
By
Sinha, Sanjib
Beginning Ethical Hacking with Kali Linux (Computational Techniques for Resolving Security Issues)
By
Sinha, Sanjib
HK$500
Elsewhere
HK$669.33
Save HK$169.33 (25%)
Cyber Operations (Building, Defending, and Attacking Modern Computer Networks)
By
O'Leary, Mike
Cyber Operations (Building, Defending, and Attacking Modern Computer Networks)
By
O'Leary, Mike
HK$800
Practical Cyber Forensics (An Incident-Based Approach to Forensic Investigations)
By
Reddy, Niranjan
Practical Cyber Forensics (An Incident-Based Approach to Forensic Investigations)
By
Reddy, Niranjan
HK$343
Elsewhere
HK$411.85
Save HK$68.85 (17%)
Self-Service AI with Power Bi Desktop (Machine Learning Insights for Business)
By
Ehrenmueller-Jensen, Markus
Self-Service AI with Power Bi Desktop (Machine Learning Insights for Business)
By
Ehrenmueller-Jensen, Markus
HK$486
Elsewhere
HK$566.34
Save HK$80.34 (14%)
Cyber Security on Azure (An IT Professional’s Guide to Microsoft Azure Security)
By
Jacobs, Matthew
,
Copeland, Marshall
Cyber Security on Azure (An IT Professional’s Guide to Microsoft Azure Security)
By
Jacobs, Matthew
,
Copeland, Marshall
HK$459
Elsewhere
HK$566.34
Save HK$107.34 (19%)
Mastering Snowflake Solutions (Supporting Analytics and Data Sharing)
By
Morton, Adam
Mastering Snowflake Solutions (Supporting Analytics and Data Sharing)
By
Morton, Adam
HK$399
Elsewhere
HK$566.34
Save HK$167.34 (30%)
Programming Google App Engine with Java (Build & Run Scalable Java Applications on Google's Infrastructure)
By
Sanderson, Dan
Programming Google App Engine with Java (Build & Run Scalable Java Applications on Google's Infrastructure)
By
Sanderson, Dan
HK$293
Elsewhere
HK$370.66
Save HK$77.66 (21%)
Programming Google App Engine with Python (Build and Run Scalable Python Apps on Google's Infrastructure)
By
Sanderson, Dan
Programming Google App Engine with Python (Build and Run Scalable Python Apps on Google's Infrastructure)
By
Sanderson, Dan
HK$298
Elsewhere
HK$370.66
Save HK$72.66 (20%)
Les 5 Etapes pour Creer des Applications JavaScript Performantes ! [French] (Comment utiliser le potentiel de JavaScript et d'AJAX, creer des applications performantes que vos visiteurs adorent ! (Developpement Facile))
By
Matthieu Deloison
Les 5 Etapes pour Creer des Applications JavaScript Performantes ! [French] (Comment utiliser le potentiel de JavaScript et d'AJAX, creer des applications performantes que vos visiteurs adorent ! (Developpement Facile))
By
Matthieu Deloison
HK$177
Guidelines on Securing Public Web Servers
By
National Istitute of Standards and Techn
Guidelines on Securing Public Web Servers
By
National Istitute of Standards and Techn
HK$139
Analyzing Data with Power BI and Power Pivot for Excel (Business Skills)
By
Ferrari, Alberto
,
Russo, Marco
Analyzing Data with Power BI and Power Pivot for Excel (Business Skills)
By
Ferrari, Alberto
,
Russo, Marco
HK$282
Elsewhere
HK$303.71
Save HK$21.71 (7%)
81
Hacking: Penetration Testing with Kali Linux (Guide for Beginners)
By
William Rowley
Hacking: Penetration Testing with Kali Linux (Guide for Beginners)
By
William Rowley
HK$119
Beginning JavaScript Charts (With Jqplot, D3, and Highcharts)
By
Nelli, Fabio
Beginning JavaScript Charts (With Jqplot, D3, and Highcharts)
By
Nelli, Fabio
HK$584
Testing Code Security
By
Linden, Maura A. van der
Testing Code Security
By
Linden, Maura A. van der
HK$900
Elsewhere
HK$1,009.19
Save HK$109.19 (11%)
Web Hacking Arsenal and Ethical Hacking Set
By
Rafay Baloch
Web Hacking Arsenal and Ethical Hacking Set
By
Rafay Baloch
HK$729
Large-Scale Data Analytics with Python and Spark (A Hands-On Guide to Implementing Machine Learning Solutions)
By
Triguero, Isaac
,
Galar, Mikel
Large-Scale Data Analytics with Python and Spark (A Hands-On Guide to Implementing Machine Learning Solutions)
By
Triguero, Isaac
,
Galar, Mikel
HK$323
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page
Previous Page
1
2
3
4
5
6
7
8
9
10
Next Page