0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(61)
General
(1)
Sold By
Sold By
All Sellers
Fishpond
(69)
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(2)
Country
Country
All Countries
United States
(28)
Switzerland
(15)
United Kingdom
(10)
Singapore
(4)
Germany
(3)
More...
Results for "Generation Code Books"
Generation Code Books
104 results
Filters
Refine By
Category
Category
Networking
(61)
General
(1)
Sold By
Sold By
All Sellers
Fishpond
(69)
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(2)
Country
Country
All Countries
United States
(28)
Switzerland
(15)
United Kingdom
(10)
Singapore
(4)
Germany
(3)
More...
104 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Hacking: The Next Generation
By
Dhanjani, Nitesh
,
Rios, Billy
,
Brett Hardin
Hacking: The Next Generation
By
Dhanjani, Nitesh
,
Rios, Billy
,
Brett Hardin
£23.62
Elsewhere
£31.99
Save £8.37 (26%)
1
Binary Code Fingerprinting for Cybersecurity (Application to Malicious Code Fingerprinting (Advances in Information Security))
By
Saed Alrabaee
,
Mourad Debbabi
,
Paria Shirani
,
Lingyu Wang
Binary Code Fingerprinting for Cybersecurity (Application to Malicious Code Fingerprinting (Advances in Information Security))
By
Saed Alrabaee
,
Mourad Debbabi
,
Paria Shirani
,
Lingyu Wang
£115
Elsewhere
£129.99
Save £14.99 (12%)
Binary Code Fingerprinting for Cybersecurity (Application to Malicious Code Fingerprinting (Advances in Information Security))
By
Saed Alrabaee
,
Mourad Debbabi
,
Paria Shirani
Binary Code Fingerprinting for Cybersecurity (Application to Malicious Code Fingerprinting (Advances in Information Security))
By
Saed Alrabaee
,
Mourad Debbabi
,
Paria Shirani
£118
Elsewhere
£129.99
Save £11.99 (9%)
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
£38.66
Elsewhere
£47.50
Save £8.84 (19%)
182
Applied Cryptography - Protocols, Algorithms and Source Code in C 20th Anniversary Edition
By
Schneier, Bruce
Applied Cryptography - Protocols, Algorithms and Source Code in C 20th Anniversary Edition
By
Schneier, Bruce
£36.85
Elsewhere
£58.00
Save £21.15 (36%)
2,128
Trojans, Worms, and Spyware (A Computer Security Professional's Guide to Malicious Code)
By
Erbschloe, Michael (Author, educator and security advisor, Washi
Trojans, Worms, and Spyware (A Computer Security Professional's Guide to Malicious Code)
By
Erbschloe, Michael (Author, educator and security advisor, Washi
£34.01
Elsewhere
£43.99
Save £9.98 (23%)
Codes (The Guide to Secrecy From Ancient to Modern Times (Discrete Mathematics and Its Applications))
By
Mollin, Richard A.
Codes (The Guide to Secrecy From Ancient to Modern Times (Discrete Mathematics and Its Applications))
By
Mollin, Richard A.
£157
Elsewhere
£180.00
Save £23.00 (13%)
Building Digital Experience Platforms (A Guide to Developing Next-Generation Enterprise Applications)
By
Sethii, Sourabhh
,
Shivakumar, Shailesh Kumar
Building Digital Experience Platforms (A Guide to Developing Next-Generation Enterprise Applications)
By
Sethii, Sourabhh
,
Shivakumar, Shailesh Kumar
£41.86
Elsewhere
£54.99
Save £13.13 (24%)
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities (Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) (EAI/Springer Innovations in Communication and Computing))
By
Ahmed A. Abd El-Latif
,
Lo’ai Tawalbeh
,
Yassine Maleh
,
Brij B. Gupta
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities (Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) (EAI/Springer Innovations in Communication and Computing))
By
Ahmed A. Abd El-Latif
,
Lo’ai Tawalbeh
,
Yassine Maleh
,
Brij B. Gupta
£130
This Machine Kills Secrets (Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers)
By
Greenberg, Andy
This Machine Kills Secrets (Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers)
By
Greenberg, Andy
£19.48
1,177
This Machine Kills Secrets (How WikiLeakers, Hacktivists, and Cypherpunks Are Freeing the World's Information)
By
Andy Greenberg
This Machine Kills Secrets (How WikiLeakers, Hacktivists, and Cypherpunks Are Freeing the World's Information)
By
Andy Greenberg
£9.60
Elsewhere
£15.99
Save £6.39 (40%)
1,177
Hacking Exposed Web 2.0 (Web 2.0 Security Secrets and Solutions (Hacking Exposed))
By
Cannings, Rich
,
Dwivedi, Himanshu
,
Zane Lackey
,
Rich Cannings
Hacking Exposed Web 2.0 (Web 2.0 Security Secrets and Solutions (Hacking Exposed))
By
Cannings, Rich
,
Dwivedi, Himanshu
,
Zane Lackey
,
Rich Cannings
£41.10
24 Deadly Sins of Software Security (Programming Flaws and How to Fix Them)
By
Howard, Michael
,
LeBlanc, David
,
John Viega
24 Deadly Sins of Software Security (Programming Flaws and How to Fix Them)
By
Howard, Michael
,
LeBlanc, David
,
John Viega
£45.63
Elsewhere
£60.99
Save £15.36 (25%)
97
Cryptography and Network Security (Principles and Practice)
By
William Stallings
Cryptography and Network Security (Principles and Practice)
By
William Stallings
£197
Redefining Hacking (A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World)
By
Santos, Omar
,
Lazzara, Savannah
Redefining Hacking (A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World)
By
Santos, Omar
,
Lazzara, Savannah
£37.33
Elsewhere
£39.99
Save £2.66 (7%)
UMTS Security
By
Valtteri Niemi
,
Kaisa Nyberg
UMTS Security
By
Valtteri Niemi
,
Kaisa Nyberg
£86.36
Elsewhere
£108.95
Save £22.59 (21%)
Cyber-Security Threats, Actors, and Dynamic Mitigation
By
Nicholas Kolokotronis
,
Stavros Shiaeles
Cyber-Security Threats, Actors, and Dynamic Mitigation
By
Nicholas Kolokotronis
,
Stavros Shiaeles
£94.04
Elsewhere
£120.00
Save £25.96 (22%)
Cyber-Security Threats, Actors, and Dynamic Mitigation
By
Nicholas Kolokotronis
,
Stavros Shiaeles
Cyber-Security Threats, Actors, and Dynamic Mitigation
By
Nicholas Kolokotronis
,
Stavros Shiaeles
£38.82
Elsewhere
£48.99
Save £10.17 (21%)
Introduction to Cryptography (Undergraduate Texts in Mathematics)
By
Buchmann, Johannes
Introduction to Cryptography (Undergraduate Texts in Mathematics)
By
Buchmann, Johannes
£48.07
Elsewhere
£59.99
Save £11.92 (20%)
1
The Perfect Weapon (War, Sabotage, and Fear in the Cyber Age)
By
Sanger, David E.
The Perfect Weapon (War, Sabotage, and Fear in the Cyber Age)
By
Sanger, David E.
£12.71
Elsewhere
£18.00
Save £5.29 (29%)
Network Security with Openssl (Cryptography for Secure Communications)
By
Viega, John
,
Messier, Matt
,
Pravir Chandra
Network Security with Openssl (Cryptography for Secure Communications)
By
Viega, John
,
Messier, Matt
,
Pravir Chandra
£19.39
Elsewhere
£31.99
Save £12.60 (39%)
66
Network Security Tools
By
Nitesh Dhanjani
,
Justin Clarke-Salt
Network Security Tools
By
Nitesh Dhanjani
,
Justin Clarke-Salt
£17.10
Elsewhere
£27.99
Save £10.89 (39%)
Security Power Tools
By
Bryan Burns
,
Dave Killion
,
Nicolas Beauchesne
,
Paul Guersch
Security Power Tools
By
Bryan Burns
,
Dave Killion
,
Nicolas Beauchesne
,
Paul Guersch
£29.21
Elsewhere
£47.99
Save £18.78 (39%)
1
2
3
4
5
Next Page
1
2
3
4
5
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies