0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(11)
Sold By
Sold By
All Sellers
Fishpond
(11)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United States
(5)
United Kingdom
(2)
Canada
(1)
Results for "Effective Python Books"
Effective Python Books
19 results
Filters
Refine By
Category
Category
Networking
(11)
Sold By
Sold By
All Sellers
Fishpond
(11)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United States
(5)
United Kingdom
(2)
Canada
(1)
19 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Hosmer, Chet
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Hosmer, Chet
HK$500
Python Hacking Essentials
By
Earnest Wish
Python Hacking Essentials
By
Earnest Wish
HK$177
Black Hat Python, 2nd Edition (Python Programming for Hackers and Pentesters)
By
Seitz, Justin
,
Arnold, Tim
Black Hat Python, 2nd Edition (Python Programming for Hackers and Pentesters)
By
Seitz, Justin
,
Arnold, Tim
HK$251
Elsewhere
HK$439.65
Save HK$188.65 (43%)
Learning Python for Forensics (Leverage the power of Python in forensic investigations, 2nd Edition)
By
Miller, Preston
,
Bryce, Chapin
Learning Python for Forensics (Leverage the power of Python in forensic investigations, 2nd Edition)
By
Miller, Preston
,
Bryce, Chapin
HK$478
Serious Python (Black-Belt Advice on Deployment, Scalability, Testing, and More)
By
Danjou, Julien
Serious Python (Black-Belt Advice on Deployment, Scalability, Testing, and More)
By
Danjou, Julien
HK$246
Elsewhere
HK$368.06
Save HK$122.06 (33%)
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
HK$1,496
Conducting Network Penetration and Espionage in a Global Environment
By
Bruce Middleton
Conducting Network Penetration and Espionage in a Global Environment
By
Bruce Middleton
HK$676
Coding for Penetration Testers (Building Better Tools)
By
Jason Andress
,
Ryan Linn
Coding for Penetration Testers (Building Better Tools)
By
Jason Andress
,
Ryan Linn
HK$280
1
Conducting Network Penetration and Espionage in a Global Environment
By
Middleton, Bruce
Conducting Network Penetration and Espionage in a Global Environment
By
Middleton, Bruce
HK$1,000
Elsewhere
HK$1,073.82
Save HK$73.82 (7%)
The Techno-Legal Dynamics of Cyber Crimes in Industry 5.0 (Industry 5.0 Transformation Applications)
By
Gagandeep Kaur
,
Tanupriya Choudhury
,
S. Balamurugan
The Techno-Legal Dynamics of Cyber Crimes in Industry 5.0 (Industry 5.0 Transformation Applications)
By
Gagandeep Kaur
,
Tanupriya Choudhury
,
S. Balamurugan
HK$1,696
Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance (Advances in Electronic Government, Digital Divide, and Regional Development)
By
Rajeev Kumar
,
Abu Bakar Abdul Hamid
,
Noor Inayah Binti Ya’akub
,
Tadiwa Elisha Nyamasvisva
Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance (Advances in Electronic Government, Digital Divide, and Regional Development)
By
Rajeev Kumar
,
Abu Bakar Abdul Hamid
,
Noor Inayah Binti Ya’akub
,
Tadiwa Elisha Nyamasvisva
HK$1,300
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Currently
Unavailable
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Currently
Unavailable
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Currently
Unavailable
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Cyber Threat Hunting
By
Nadhem AlFardan
Cyber Threat Hunting
By
Nadhem AlFardan
Currently
Unavailable