0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Special Topics
Viruses
Filters
Sold By
Sold By
All Sellers
Fishpond
(27)
Country
Country
All Countries
United States
(16)
United Kingdom
(4)
USA
(1)
Results for "API"
API
34 results
Filters
Sold By
Sold By
All Sellers
Fishpond
(27)
Country
Country
All Countries
United States
(16)
United Kingdom
(4)
USA
(1)
Related Searches:
linux api
rest api
web api
api 579-1
"api 579"
web api 2
$sj pulse desktop api url$
api ponds and accessories
34 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
£44.57
Elsewhere
£47.50
Save £2.93 (6%)
182
Security Power Tools
By
Bryan Burns
,
Dave Killion
,
Nicolas Beauchesne
,
Paul Guersch
Security Power Tools
By
Bryan Burns
,
Dave Killion
,
Nicolas Beauchesne
,
Paul Guersch
£34.36
Elsewhere
£47.99
Save £13.63 (28%)
The Art of Memory Forensics (Detecting Malware and Threats in Windows, Linux, and Mac Memory)
By
Hale Ligh, Michael
,
Case, Andrew
,
Jamie Levy
The Art of Memory Forensics (Detecting Malware and Threats in Windows, Linux, and Mac Memory)
By
Hale Ligh, Michael
,
Case, Andrew
,
Jamie Levy
£64.32
122
Hunting Cyber Criminals - A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
By
Troia, Vinny
Hunting Cyber Criminals - A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
By
Troia, Vinny
£24.74
Elsewhere
£33.00
Save £8.26 (25%)
Corporate Cybersecurity (Identifying Risks and the Bug Bounty Program (IEEE Press))
By
Jackson, John
Corporate Cybersecurity (Identifying Risks and the Bug Bounty Program (IEEE Press))
By
Jackson, John
£78.88
Elsewhere
£93.95
Save £15.07 (16%)
MC Microsoft Certified Azure Data Fundamentals Study Guide (Exam Dp-900)
By
Jake Switzer
MC Microsoft Certified Azure Data Fundamentals Study Guide (Exam Dp-900)
By
Jake Switzer
£29.40
Elsewhere
£37.99
Save £8.59 (23%)
Data Exfiltration Threats and Prevention Techniques (Machine Learning and Memory-Based Data Security)
By
Zahir Tari
,
Nasrin Sohrabi
,
Yasaman Samadi
Data Exfiltration Threats and Prevention Techniques (Machine Learning and Memory-Based Data Security)
By
Zahir Tari
,
Nasrin Sohrabi
,
Yasaman Samadi
£79.64
Elsewhere
£102.00
Save £22.36 (22%)
Practical Malware Analysis (The Hands-On Guide to Dissecting Malicious Software)
By
Sikorski, Michael
,
Honig, Andrew
Practical Malware Analysis (The Hands-On Guide to Dissecting Malicious Software)
By
Sikorski, Michael
,
Honig, Andrew
£33.69
Elsewhere
£56.99
Save £23.30 (41%)
593
Android Security Internals (An In-Depth Guide to Android's Security Architecture)
By
Elenkov, Nikolay
Android Security Internals (An In-Depth Guide to Android's Security Architecture)
By
Elenkov, Nikolay
£27.63
Elsewhere
£47.99
Save £20.36 (42%)
Black Hat Go (Go Programming for Hackers and Pentesters)
By
Steele, Tom
,
Patten, Chris
,
Dan Kottmann
Black Hat Go (Go Programming for Hackers and Pentesters)
By
Steele, Tom
,
Patten, Chris
,
Dan Kottmann
£27.26
Elsewhere
£42.99
Save £15.73 (37%)
81
Application Security for the Android Platform (Processes, Permissions, and Other Safeguards)
By
Six, Jeff
Application Security for the Android Platform (Processes, Permissions, and Other Safeguards)
By
Six, Jeff
£12.53
Elsewhere
£14.50
Save £1.97 (14%)
The Architecture of Privacy (On Engineering Technologies That Can Deliver Trustworthy Safeguards)
By
Bowman, Courtney
,
Gesher, Ari
,
John K. Grant
The Architecture of Privacy (On Engineering Technologies That Can Deliver Trustworthy Safeguards)
By
Bowman, Courtney
,
Gesher, Ari
,
John K. Grant
£18.97
Elsewhere
£23.99
Save £5.02 (21%)
Evasive Malware (A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats)
By
Cucci, Kyle
Evasive Malware (A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats)
By
Cucci, Kyle
£39.24
Elsewhere
£66.99
Save £27.75 (41%)
The Art of Mac Malware, Volume 2 (Detecting Malicious Software)
By
Patrick Wardle
The Art of Mac Malware, Volume 2 (Detecting Malicious Software)
By
Patrick Wardle
£34.01
Elsewhere
£53.99
Save £19.98 (37%)
Alice and Bob Learn Secure Coding
By
Tanya Janca
Alice and Bob Learn Secure Coding
By
Tanya Janca
£27.96
Elsewhere
£37.99
Save £10.03 (26%)
A Beginner's Guide To Web Application Penetration Testing (Tech Today)
By
Ali Abdollahi
A Beginner's Guide To Web Application Penetration Testing (Tech Today)
By
Ali Abdollahi
£35.43
Elsewhere
£37.99
Save £2.56 (7%)
PowerShell Automation and Scripting for Cybersecurity (Hacking and defense for red and blue teamers)
By
Miriam C. Wiesner
,
Tanya Janca
PowerShell Automation and Scripting for Cybersecurity (Hacking and defense for red and blue teamers)
By
Miriam C. Wiesner
,
Tanya Janca
£36.19
Elsewhere
£37.99
Save £1.80 (5%)
Mastering Microsoft 365 Defender (Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats)
By
Ru Campbell
,
Viktor Hedberg
,
Heike Ritter
Mastering Microsoft 365 Defender (Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats)
By
Ru Campbell
,
Viktor Hedberg
,
Heike Ritter
£37.90
Elsewhere
£39.99
Save £2.09 (5%)
Implementing Palo Alto Networks Prisma(R) Access (Learn real-world network protection)
By
Tom Piens Aka 'Reaper'
,
Rutger Truyers
Implementing Palo Alto Networks Prisma(R) Access (Learn real-world network protection)
By
Tom Piens Aka 'Reaper'
,
Rutger Truyers
£39.33
Elsewhere
£41.99
Save £2.66 (6%)
Mastering Microsoft Defender for Office 365 (Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting)
By
Samuel Soto
Mastering Microsoft Defender for Office 365 (Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting)
By
Samuel Soto
£31.97
Elsewhere
£33.99
Save £2.02 (6%)
Microsoft Defender for Identity in Depth (An exhaustive guide to ITDR, breach prevention, and cyberattack response)
By
Pierre Thoor
,
Matthew Zorich
Microsoft Defender for Identity in Depth (An exhaustive guide to ITDR, breach prevention, and cyberattack response)
By
Pierre Thoor
,
Matthew Zorich
£31.98
Elsewhere
£33.99
Save £2.01 (6%)
Automating Security Detection Engineering (A hands-on guide to implementing Detection as Code)
By
Dennis Chow
,
David Bruskin
Automating Security Detection Engineering (A hands-on guide to implementing Detection as Code)
By
Dennis Chow
,
David Bruskin
£39.26
Elsewhere
£41.99
Save £2.73 (7%)
Malware Analysis Techniques (Tricks for the triage of adversarial software)
By
Barker, Dylan
Malware Analysis Techniques (Tricks for the triage of adversarial software)
By
Barker, Dylan
£37.44
Elsewhere
£39.99
Save £2.55 (6%)
Cybersecurity Design Principles (Building Secure Resilient Architecture)
By
Miller, Richie
Cybersecurity Design Principles (Building Secure Resilient Architecture)
By
Miller, Richie
£23.91
1
2
Next Page
1
2
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies