0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Filters
Refine By
Category
Category
Security
(17)
Programming
(9)
Hardware
(5)
Networking
(5)
Computer Science
(5)
Special Topics
(2)
Enterprise Applications
(2)
Server & Database
(2)
Operating Systems
(2)
Web
(1)
Certification
(1)
Artificial Intelligence
(1)
Social Aspects
(1)
General
(1)
Sold By
Sold By
All Sellers
Fishpond
(23)
Age Range
Age Range
All Ranges
15+
(3)
All Ages
(2)
Country
Country
All Countries
United States
(17)
Germany
(2)
United Kingdom
(2)
Switzerland
(1)
USA
(1)
Results for "Stack Overflow Hack"
Stack Overflow Hack
55 results
Filters
Refine By
Category
Category
Security
(17)
Programming
(9)
Hardware
(5)
Networking
(5)
Computer Science
(5)
Special Topics
(2)
Enterprise Applications
(2)
Server & Database
(2)
Operating Systems
(2)
Web
(1)
Certification
(1)
Artificial Intelligence
(1)
Social Aspects
(1)
General
(1)
Sold By
Sold By
All Sellers
Fishpond
(23)
Age Range
Age Range
All Ranges
15+
(3)
All Ages
(2)
Country
Country
All Countries
United States
(17)
Germany
(2)
United Kingdom
(2)
Switzerland
(1)
USA
(1)
55 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Buffer Overflow Attacks (Detect, Exploit, Prevent)
By
Jason Deckard
Buffer Overflow Attacks (Detect, Exploit, Prevent)
By
Jason Deckard
HK$307
2
Gray Hat Hacking (The Ethical Hacker's Handbook)
By
Allen Harper
,
Shon Harris
,
Jonathan Ness
,
Chris Eagle
Gray Hat Hacking (The Ethical Hacker's Handbook)
By
Allen Harper
,
Shon Harris
,
Jonathan Ness
,
Chris Eagle
HK$679
1
Android Hacker's Handbook
By
Drake, Joshua J.
,
Lanier, Zach
,
Collin Mulliner
,
Pau Oliva Fora
Android Hacker's Handbook
By
Drake, Joshua J.
,
Lanier, Zach
,
Collin Mulliner
,
Pau Oliva Fora
HK$400
117
Python Hacking Essentials
By
Earnest Wish
Python Hacking Essentials
By
Earnest Wish
HK$190
Gray Hat Hacking (The Ethical Hacker's Handbook, Sixth Edition)
By
Baucom, Michael
,
Frost, Moses
,
Stephen Sims
,
Michael Baucom
Gray Hat Hacking (The Ethical Hacker's Handbook, Sixth Edition)
By
Baucom, Michael
,
Frost, Moses
,
Stephen Sims
,
Michael Baucom
HK$342
Elsewhere
HK$475.10
Save HK$133.10 (28%)
Stack Frames (A Look from Inside: 2016)
By
Di Cataldo, Giuseppe
Stack Frames (A Look from Inside: 2016)
By
Di Cataldo, Giuseppe
HK$416
Certified Ethical Hacker (CEH) Version 9 Cert Guide (Certification Guide)
By
Former Director of the Viral Disease Division of the Centers for
Certified Ethical Hacker (CEH) Version 9 Cert Guide (Certification Guide)
By
Former Director of the Viral Disease Division of the Centers for
HK$588
Elsewhere
HK$619.73
Save HK$31.73 (5%)
Penetration Testing (A Hands-On Introduction to Hacking)
By
Weidman, Georgia
Penetration Testing (A Hands-On Introduction to Hacking)
By
Weidman, Georgia
HK$320
Elsewhere
HK$495.76
Save HK$175.76 (35%)
383
The Shellcoder's Handbook - Discovering and Exploiting Security Holes 2e
By
Anley, Chris
,
Heasman, John
,
Felix Lindner
,
Gerardo Richarte
The Shellcoder's Handbook - Discovering and Exploiting Security Holes 2e
By
Anley, Chris
,
Heasman, John
,
Felix Lindner
,
Gerardo Richarte
HK$314
Elsewhere
HK$340.91
Save HK$26.91 (8%)
331
Security Warrior
By
Peikari, Cyrus
,
Chuvakin, Anton
Security Warrior
By
Peikari, Cyrus
,
Chuvakin, Anton
HK$274
Elsewhere
HK$371.80
Save HK$97.80 (26%)
1
Preventing Web Attacks with Apache
By
Barnett, Ryan C.
Preventing Web Attacks with Apache
By
Barnett, Ryan C.
HK$678
1
The Cert C Secure Coding Standard
By
Robert C. Seacord
The Cert C Secure Coding Standard
By
Robert C. Seacord
HK$800
1
Reversing (Secrets of Reverse Engineering)
By
Eilam, Eldad
Reversing (Secrets of Reverse Engineering)
By
Eilam, Eldad
HK$265
Elsewhere
HK$278.92
Save HK$13.92 (5%)
543
Computer Architecture and Security (Fundamentals of Designing Secure Computer Systems)
By
Shuangbao Paul Wang
,
Robert S. Ledley
Computer Architecture and Security (Fundamentals of Designing Secure Computer Systems)
By
Shuangbao Paul Wang
,
Robert S. Ledley
HK$1,200
Writing Secure Code (Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World)
By
Michael Howard
,
David E. LeBlanc
,
David LeBlanc
Writing Secure Code (Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World)
By
Michael Howard
,
David E. LeBlanc
,
David LeBlanc
HK$473
373
CCNA Cybersecurity Operations Course Booklet (Course Booklets)
By
Cisco Networking Academy
CCNA Cybersecurity Operations Course Booklet (Course Booklets)
By
Cisco Networking Academy
HK$399
2
Programming with 64-Bit Arm Assembly Language (Single Board Computer Development for Raspberry Pi and Mobile Devices)
By
Smith, Stephen
Programming with 64-Bit Arm Assembly Language (Single Board Computer Development for Raspberry Pi and Mobile Devices)
By
Smith, Stephen
HK$410
Elsewhere
HK$516.42
Save HK$106.42 (21%)
A Bug Hunter's Diary (A Guided Tour Through the Wilds of Software Security)
By
Tobias Klein
A Bug Hunter's Diary (A Guided Tour Through the Wilds of Software Security)
By
Tobias Klein
HK$435
247
A Guide to Kernel Exploitation (Attacking the Core)
By
Perla, Enrico
,
Oldani, Massimiliano
A Guide to Kernel Exploitation (Attacking the Core)
By
Perla, Enrico
,
Oldani, Massimiliano
HK$452
51
Machine Intelligence and Emerging Technologies (First International Conference, MIET 2022, Noakhali, Bangladesh, September 23-25, 2022, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunication ..)
By
Md. Shahriare Satu
,
Mohammad Ali Moni
,
M. Shamim Kaiser
,
Mohammad Shamsul Arefin
Machine Intelligence and Emerging Technologies (First International Conference, MIET 2022, Noakhali, Bangladesh, September 23-25, 2022, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunication ..)
By
Md. Shahriare Satu
,
Mohammad Ali Moni
,
M. Shamim Kaiser
,
Mohammad Shamsul Arefin
HK$1,340
Information Security and Cryptology - Icisc 2001 (4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings (Lecture Notes in Computer Science))
By
Kwangjo Kim
Information Security and Cryptology - Icisc 2001 (4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings (Lecture Notes in Computer Science))
By
Kwangjo Kim
HK$587
Grundlagenwissen der Software-Entwicklung [German] (IT-Konzepte und Fachbegriffe für das Projektmanagement (IT kompakt))
By
Winniewski, Philipp
Grundlagenwissen der Software-Entwicklung [German] (IT-Konzepte und Fachbegriffe für das Projektmanagement (IT kompakt))
By
Winniewski, Philipp
HK$203
Hack the Stack (Using Snort and Ethereal to Master the 8 Layers of an Insecure Network)
By
Michael C. Gregg
,
Stephen Watkins
,
George Mays
,
Chris Ries
Hack the Stack (Using Snort and Ethereal to Master the 8 Layers of an Insecure Network)
By
Michael C. Gregg
,
Stephen Watkins
,
George Mays
,
Chris Ries
1
Currently
Unavailable
1
2
3
Next Page
1
2
3
Next Page