0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(33)
Sold By
Sold By
All Sellers
Fishpond
(35)
Country
Country
All Countries
United States
(11)
United Kingdom
(6)
Singapore
(5)
Results for "Python For Data Analysis Books"
Python For Data Analysis Books
54 results
Filters
Refine By
Category
Category
Networking
(33)
Sold By
Sold By
All Sellers
Fishpond
(35)
Country
Country
All Countries
United States
(11)
United Kingdom
(6)
Singapore
(5)
54 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Hosmer, Chet
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Hosmer, Chet
HK$478
Python Passive Network Mapping (P2nmap)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
Python Passive Network Mapping (P2nmap)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
HK$426
Elsewhere
HK$505.42
Save HK$79.42 (16%)
Executing Windows Command Line Investigations (While Ensuring Evidentiary Integrity)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
,
Bartolomie, Joshua (CEECS, CFCE, CISSP, CRISC, CSM, DFCP, Direct
,
Rosanne Pelli
Executing Windows Command Line Investigations (While Ensuring Evidentiary Integrity)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
,
Bartolomie, Joshua (CEECS, CFCE, CISSP, CRISC, CSM, DFCP, Direct
,
Rosanne Pelli
HK$573
Data Structures for Engineers and Scientists Using Python
By
Nayak, Rakesh (Department of CSE, Vaagdevi Engineering College,
,
Gupta, Nishu
Data Structures for Engineers and Scientists Using Python
By
Nayak, Rakesh (Department of CSE, Vaagdevi Engineering College,
,
Gupta, Nishu
HK$1,096
Elsewhere
HK$1,635.51
Save HK$539.51 (33%)
Powershell and Python Together (Targeting Digital Investigations)
By
Hosmer, Chet
Powershell and Python Together (Targeting Digital Investigations)
By
Hosmer, Chet
HK$293
Elsewhere
HK$396.39
Save HK$103.39 (26%)
Black Hat Python, 2nd Edition (Python Programming for Hackers and Pentesters)
By
Seitz, Justin
,
Arnold, Tim
Black Hat Python, 2nd Edition (Python Programming for Hackers and Pentesters)
By
Seitz, Justin
,
Arnold, Tim
HK$250
Elsewhere
HK$426.13
Save HK$176.13 (41%)
Learning Python for Forensics (Leverage the power of Python in forensic investigations, 2nd Edition)
By
Miller, Preston
,
Bryce, Chapin
Learning Python for Forensics (Leverage the power of Python in forensic investigations, 2nd Edition)
By
Miller, Preston
,
Bryce, Chapin
HK$473
Serious Python (Black-Belt Advice on Deployment, Scalability, Testing, and More)
By
Danjou, Julien
Serious Python (Black-Belt Advice on Deployment, Scalability, Testing, and More)
By
Danjou, Julien
HK$245
Elsewhere
HK$356.74
Save HK$111.74 (31%)
Data Driven Approach towards Disruptive Technologies
Data Driven Approach towards Disruptive Technologies
HK$2,477
Hacks, Leaks, and Revelations (The Art of Analyzing Hacked and Leaked Data)
By
Lee, Micah
Hacks, Leaks, and Revelations (The Art of Analyzing Hacked and Leaked Data)
By
Lee, Micah
HK$328
Elsewhere
HK$475.69
Save HK$147.69 (31%)
Security and Risk Analysis for Intelligent Cloud Computing (Methods, Applications, and Preventions)
By
Ajay Kumar
,
Sangeeta Rani
,
Sarita Rathee
,
Surbhi Bhatia
Security and Risk Analysis for Intelligent Cloud Computing (Methods, Applications, and Preventions)
By
Ajay Kumar
,
Sangeeta Rani
,
Sarita Rathee
,
Surbhi Bhatia
HK$787
Elsewhere
HK$1,189.47
Save HK$402.47 (34%)
Security and Risk Analysis for Intelligent Cloud Computing (Methods, Applications, and Preventions)
By
Ajay Kumar
,
Sangeeta Rani
,
Sarita Rathee
Security and Risk Analysis for Intelligent Cloud Computing (Methods, Applications, and Preventions)
By
Ajay Kumar
,
Sangeeta Rani
,
Sarita Rathee
HK$600
Generative AI and Implications for Ethics, Security, and Data Management (Advances in Computational Intelligence and Robotics)
By
Jeganathan Gomathi Sankar
,
Arokiaraj David
Generative AI and Implications for Ethics, Security, and Data Management (Advances in Computational Intelligence and Robotics)
By
Jeganathan Gomathi Sankar
,
Arokiaraj David
HK$2,157
Data Driven Approach Towards Disruptive Technologies (Proceedings of MIDAS 2020 (Studies in Autonomic, Data-driven and Industrial Computing))
By
T P Singh
,
Ravi Tomar
,
Tanupriya Choudhury
,
Thinagaran Perumal
Data Driven Approach Towards Disruptive Technologies (Proceedings of MIDAS 2020 (Studies in Autonomic, Data-driven and Industrial Computing))
By
T P Singh
,
Ravi Tomar
,
Tanupriya Choudhury
,
Thinagaran Perumal
HK$2,500
Proceedings of Data Analytics and Management (ICDAM 2021, Volume 1 (Lecture Notes on Data Engineering and Communications Technologies))
By
Deepak Gupta
,
Zdzislaw Polkowski
,
Ashish Khanna
Proceedings of Data Analytics and Management (ICDAM 2021, Volume 1 (Lecture Notes on Data Engineering and Communications Technologies))
By
Deepak Gupta
,
Zdzislaw Polkowski
,
Ashish Khanna
HK$1,658
Elsewhere
HK$1,784.10
Save HK$126.10 (7%)
Proceedings of Data Analytics and Management (ICDAM 2021, Volume 1 (Lecture Notes on Data Engineering and Communications Technologies))
By
Deepak Gupta
,
Zdzislaw Polkowski
,
Ashish Khanna
,
Siddhartha Bhattacharyya
Proceedings of Data Analytics and Management (ICDAM 2021, Volume 1 (Lecture Notes on Data Engineering and Communications Technologies))
By
Deepak Gupta
,
Zdzislaw Polkowski
,
Ashish Khanna
,
Siddhartha Bhattacharyya
HK$1,782
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
HK$540
Elsewhere
HK$1,090.24
Save HK$550.24 (50%)
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
HK$500
Elsewhere
HK$1,090.24
Save HK$590.24 (54%)
Computing Technologies and Applications (Paving Path Towards Society 5.0 (Demystifying Technologies for Computational Excellence))
By
Latesh Malik
,
Sandhya Arora
,
Urmila Shrawankar
,
Maya Ingle
Computing Technologies and Applications (Paving Path Towards Society 5.0 (Demystifying Technologies for Computational Excellence))
By
Latesh Malik
,
Sandhya Arora
,
Urmila Shrawankar
,
Maya Ingle
HK$992
Elsewhere
HK$1,437.27
Save HK$445.27 (31%)
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
HK$440
Elsewhere
HK$470.83
Save HK$30.83 (7%)
182
Network Security with Openssl (Cryptography for Secure Communications)
By
Viega, John
,
Messier, Matt
,
Pravir Chandra
Network Security with Openssl (Cryptography for Secure Communications)
By
Viega, John
,
Messier, Matt
,
Pravir Chandra
HK$269
Elsewhere
HK$317.09
Save HK$48.09 (15%)
66
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
HK$1,489
Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance (Advances in Electronic Government, Digital Divide, and Regional Development)
By
Rajeev Kumar
,
Abu Bakar Abdul Hamid
,
Noor Inayah Binti Ya’akub
,
Tadiwa Elisha Nyamasvisva
Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance (Advances in Electronic Government, Digital Divide, and Regional Development)
By
Rajeev Kumar
,
Abu Bakar Abdul Hamid
,
Noor Inayah Binti Ya’akub
,
Tadiwa Elisha Nyamasvisva
HK$1,300
Decision Making and Security Risk Management for IoT Environments (Advances in Information Security)
By
Wadii Boulila
,
Jawad Ahmad
,
Anis Koubaa
,
Maha Driss
Decision Making and Security Risk Management for IoT Environments (Advances in Information Security)
By
Wadii Boulila
,
Jawad Ahmad
,
Anis Koubaa
,
Maha Driss
HK$1,040
1
2
3
Next Page
1
2
3
Next Page