0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Science
Movies
Music
All Products
\n
Books
Science
Movies
Music
Science
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Science
Filters
Refine By
Category
Category
Mathematics
(48)
Medical
(10)
Biology
(5)
Environment
(5)
Philosophy & Social Aspects
(4)
Physics
(4)
Chemistry
(3)
General
(3)
Applied Sciences
(2)
Mathematical Physics
(2)
Nature
(1)
Electromagnetism
(1)
Study & Teaching
(1)
System Theory
(1)
Sold By
Sold By
All Sellers
Fishpond
(80)
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(3)
Country
Country
All Countries
Switzerland
(15)
United Kingdom
(13)
Singapore
(12)
United States
(9)
Germany
(4)
More...
Results for ""Phish""
"Phish"
108 results
Filters
Refine By
Category
Category
Mathematics
(48)
Medical
(10)
Biology
(5)
Environment
(5)
Philosophy & Social Aspects
(4)
Physics
(4)
Chemistry
(3)
General
(3)
Applied Sciences
(2)
Mathematical Physics
(2)
Nature
(1)
Electromagnetism
(1)
Study & Teaching
(1)
System Theory
(1)
Sold By
Sold By
All Sellers
Fishpond
(80)
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(3)
Country
Country
All Countries
Switzerland
(15)
United Kingdom
(13)
Singapore
(12)
United States
(9)
Germany
(4)
More...
108 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Fancy Bear Goes Phishing (The Dark History of the Information Age, in Five Extraordinary Hacks)
By
Scott Shapiro
Fancy Bear Goes Phishing (The Dark History of the Information Age, in Five Extraordinary Hacks)
By
Scott Shapiro
HK$134
Phishing Detection Using Content-Based Image Classification
By
Khandelwal, Shekhar
,
Das, Rik
Phishing Detection Using Content-Based Image Classification
By
Khandelwal, Shekhar
,
Das, Rik
HK$435
Elsewhere
HK$554.25
Save HK$119.25 (22%)
Advances in Computers
By
Marvin Zelkowitz
Advances in Computers
By
Marvin Zelkowitz
HK$1,400
Behavior Change Research and Theory (Psychological and Technological Perspectives)
By
Linda Little
,
Adam Joinson
,
Elizabeth Sillence
Behavior Change Research and Theory (Psychological and Technological Perspectives)
By
Linda Little
,
Adam Joinson
,
Elizabeth Sillence
HK$446
Elsewhere
HK$524.01
Save HK$78.01 (15%)
Cybersecurity Analytics (Chapman & Hall/CRC Data Science Series)
By
Verma, Rakesh M.
,
Marchette, David J. (Naval Surface Warfare Center, Dahlgren, Vir
Cybersecurity Analytics (Chapman & Hall/CRC Data Science Series)
By
Verma, Rakesh M.
,
Marchette, David J. (Naval Surface Warfare Center, Dahlgren, Vir
HK$1,097
Elsewhere
HK$1,209.49
Save HK$112.49 (9%)
Cloud Security (Concepts, Applications and Perspectives (Cyber Ecosystem and Security))
By
Brij B. Gupta
Cloud Security (Concepts, Applications and Perspectives (Cyber Ecosystem and Security))
By
Brij B. Gupta
HK$1,160
Elsewhere
HK$1,763.85
Save HK$603.85 (34%)
Big Data Analytics and Computing for Digital Forensic Investigations
By
Suneeta Satpathy
,
Sachi Mohanty
Big Data Analytics and Computing for Digital Forensic Investigations
By
Suneeta Satpathy
,
Sachi Mohanty
HK$600
Elsewhere
HK$786.07
Save HK$186.07 (24%)
Cybersecurity in the COVID-19 Pandemic
By
Kenneth Okereafor
Cybersecurity in the COVID-19 Pandemic
By
Kenneth Okereafor
HK$389
Elsewhere
HK$493.78
Save HK$104.78 (21%)
Cybersecurity in the Covid-19 Pandemic
By
Okereafor, Kenneth
Cybersecurity in the Covid-19 Pandemic
By
Okereafor, Kenneth
HK$204
Cloud Security (Concepts, Applications and Perspectives (Cyber Ecosystem and Security))
By
Brij B. Gupta
Cloud Security (Concepts, Applications and Perspectives (Cyber Ecosystem and Security))
By
Brij B. Gupta
HK$500
Elsewhere
HK$675.20
Save HK$175.20 (26%)
Machine Learning for Computer and Cyber Security (Principle, Algorithms, and Practices (Cyber Ecosystem and Security))
By
Brij B. Gupta
,
Quan Z. Sheng
Machine Learning for Computer and Cyber Security (Principle, Algorithms, and Practices (Cyber Ecosystem and Security))
By
Brij B. Gupta
,
Quan Z. Sheng
HK$460
Elsewhere
HK$524.01
Save HK$64.01 (12%)
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
HK$1,500
From ER to E.T. (How Electromagnetic Technologies Are Changing Our Lives (IEEE Press Series on Electromagnetic Wave Theory))
By
Bansal, Rajeev
From ER to E.T. (How Electromagnetic Technologies Are Changing Our Lives (IEEE Press Series on Electromagnetic Wave Theory))
By
Bansal, Rajeev
HK$414
Elsewhere
HK$483.29
Save HK$69.29 (14%)
Whois Running the Internet (Protocol, Policy, and Privacy)
By
Bruen, Garth O.
Whois Running the Internet (Protocol, Policy, and Privacy)
By
Bruen, Garth O.
HK$900
Do No Harm - Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States
By
Webster, Matthew
Do No Harm - Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States
By
Webster, Matthew
HK$236
Machine Learning for Computer and Cyber Security (Principle, Algorithms, and Practices (Cyber Ecosystem and Security))
By
Brij B. Gupta
,
Quan Z. Sheng
Machine Learning for Computer and Cyber Security (Principle, Algorithms, and Practices (Cyber Ecosystem and Security))
By
Brij B. Gupta
,
Quan Z. Sheng
HK$1,200
Elsewhere
HK$1,763.85
Save HK$563.85 (32%)
Healthy Technology Use (Your Questions Answered (Q & A Health Guides))
By
Bernadette H. Schell
Healthy Technology Use (Your Questions Answered (Q & A Health Guides))
By
Bernadette H. Schell
HK$540
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
Proceedings of the IFIP TC 11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (IFIP Advances in Information and Communication Technology))
By
Sushil Jajodia
,
Pierangela Samarati
,
Stelvio Cimato
HK$1,400
Natural Language Processing in Artificial Intelligence
By
Brojo Kishore Mishra
,
Raghvendra Kumar
Natural Language Processing in Artificial Intelligence
By
Brojo Kishore Mishra
,
Raghvendra Kumar
HK$1,173
Elsewhere
HK$1,320.37
Save HK$147.37 (11%)
Natural Language Processing in Artificial Intelligence
By
Brojo Kishore Mishra
,
Raghvendra Kumar
Natural Language Processing in Artificial Intelligence
By
Brojo Kishore Mishra
,
Raghvendra Kumar
HK$760
Elsewhere
HK$836.47
Save HK$76.47 (9%)
AI, Machine Learning and Deep Learning (A Security Perspective)
By
Fei Hu
,
Xiali Hei
AI, Machine Learning and Deep Learning (A Security Perspective)
By
Fei Hu
,
Xiali Hei
HK$410
Elsewhere
HK$453.46
Save HK$43.46 (10%)
Advanced Circuits and Systems for Healthcare and Security Applications
By
Balwinder Raj
,
Brij B. Gupta
,
Jeetendra Singh
Advanced Circuits and Systems for Healthcare and Security Applications
By
Balwinder Raj
,
Brij B. Gupta
,
Jeetendra Singh
HK$371
Elsewhere
HK$453.46
Save HK$82.46 (18%)
1
2
3
4
5
Next Page
1
2
3
4
5
Next Page