0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(23)
Sold By
Sold By
All Sellers
Fishpond
(27)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United States
(11)
United Kingdom
(6)
Canada
(1)
Switzerland
(1)
Results for "Team, Python Development"
Team, Python Development
40 results
Filters
Refine By
Category
Category
Networking
(23)
Sold By
Sold By
All Sellers
Fishpond
(27)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United States
(11)
United Kingdom
(6)
Canada
(1)
Switzerland
(1)
40 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Python Passive Network Mapping (P2nmap)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
Python Passive Network Mapping (P2nmap)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
HK$450
Elsewhere
HK$525.14
Save HK$75.14 (14%)
Executing Windows Command Line Investigations (While Ensuring Evidentiary Integrity)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
,
Bartolomie, Joshua (CEECS, CFCE, CISSP, CRISC, CSM, DFCP, Direct
,
Rosanne Pelli
Executing Windows Command Line Investigations (While Ensuring Evidentiary Integrity)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
,
Bartolomie, Joshua (CEECS, CFCE, CISSP, CRISC, CSM, DFCP, Direct
,
Rosanne Pelli
HK$591
Learning Penetration Testing with Python
By
Christopher Duffy
Learning Penetration Testing with Python
By
Christopher Duffy
HK$468
7
Powershell and Python Together (Targeting Digital Investigations)
By
Hosmer, Chet
Powershell and Python Together (Targeting Digital Investigations)
By
Hosmer, Chet
HK$288
Elsewhere
HK$411.85
Save HK$123.85 (30%)
Security Automation with Python (Practical Python solutions for automating and scaling security operations)
By
Corey Charles Sr.
,
Frank McMahon
Security Automation with Python (Practical Python solutions for automating and scaling security operations)
By
Corey Charles Sr.
,
Frank McMahon
HK$452
Crafting Test-Driven Software with Python (Write test suites that scale with your applications' needs and complexity using Python and PyTest)
By
Molina, Alessandro
Crafting Test-Driven Software with Python (Write test suites that scale with your applications' needs and complexity using Python and PyTest)
By
Molina, Alessandro
HK$447
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1 (The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity)
By
Alan Grid
HK$306
Elsewhere
HK$360.46
Save HK$54.46 (15%)
Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance (Advances in Electronic Government, Digital Divide, and Regional Development)
By
Rajeev Kumar
,
Abu Bakar Abdul Hamid
,
Noor Inayah Binti Ya’akub
,
Tadiwa Elisha Nyamasvisva
Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance (Advances in Electronic Government, Digital Divide, and Regional Development)
By
Rajeev Kumar
,
Abu Bakar Abdul Hamid
,
Noor Inayah Binti Ya’akub
,
Tadiwa Elisha Nyamasvisva
HK$1,334
31 Days Before Your CCNP and CCIE Enterprise Core Exam
By
Gargano, Patrick
31 Days Before Your CCNP and CCIE Enterprise Core Exam
By
Gargano, Patrick
HK$318
Elsewhere
HK$339.76
Save HK$21.76 (6%)
Cybersecurity (Managing Systems, Conducting Testing, and Investigating Intrusions)
By
Mowbray, Thomas J.
Cybersecurity (Managing Systems, Conducting Testing, and Investigating Intrusions)
By
Mowbray, Thomas J.
HK$487
1
Defending Iot Infrastructures with the Raspberry Pi (Monitoring and Detecting Nefarious Behavior in Real Time)
By
Hosmer, Chet
Defending Iot Infrastructures with the Raspberry Pi (Monitoring and Detecting Nefarious Behavior in Real Time)
By
Hosmer, Chet
HK$224
Elsewhere
HK$288.27
Save HK$64.27 (22%)
How to Create a Web3 Startup (A Guide for Tomorrow's Breakout Companies)
By
Taulli, Tom
How to Create a Web3 Startup (A Guide for Tomorrow's Breakout Companies)
By
Taulli, Tom
HK$283
Elsewhere
HK$411.85
Save HK$128.85 (31%)
Phishing Detection Using Content-Based Image Classification
By
Khandelwal, Shekhar
,
Das, Rik
Phishing Detection Using Content-Based Image Classification
By
Khandelwal, Shekhar
,
Das, Rik
HK$440
Elsewhere
HK$566.34
Save HK$126.34 (22%)
Phishing Detection Using Content-Based Image Classification
By
Shekhar
,
Das, Rik
Phishing Detection Using Content-Based Image Classification
By
Shekhar
,
Das, Rik
HK$170
Elsewhere
HK$195.58
Save HK$25.58 (13%)
Cyberology (An Optimized Approach to the Cyber-World)
By
Mohd. Shahid Husain
,
Mohammad Faisal
,
Halima Sadia
,
Tasneem Ahmed
Cyberology (An Optimized Approach to the Cyber-World)
By
Mohd. Shahid Husain
,
Mohammad Faisal
,
Halima Sadia
,
Tasneem Ahmed
HK$1,097
Elsewhere
HK$1,596.33
Save HK$499.33 (31%)
Gray Hat Hacking (The Ethical Hacker's Handbook, Sixth Edition)
By
Baucom, Michael
,
Frost, Moses
,
Stephen Sims
,
Michael Baucom
Gray Hat Hacking (The Ethical Hacker's Handbook, Sixth Edition)
By
Baucom, Michael
,
Frost, Moses
,
Stephen Sims
,
Michael Baucom
HK$377
Elsewhere
HK$473.65
Save HK$96.65 (20%)
Alice and Bob Learn Secure Coding
By
Tanya Janca
Alice and Bob Learn Secure Coding
By
Tanya Janca
HK$347
Elsewhere
HK$391.26
Save HK$44.26 (11%)
Mastering Metasploit, Second Edition
By
Jaswal, Nipun
Mastering Metasploit, Second Edition
By
Jaswal, Nipun
HK$500
Defending APIs (Uncover advanced defense techniques to craft secure application programming interfaces)
By
Colin Domoney
,
Chris Wysopal
Defending APIs (Uncover advanced defense techniques to craft secure application programming interfaces)
By
Colin Domoney
,
Chris Wysopal
HK$440
Advancements in Cybercrime Investigation and Digital Forensics
By
A. Harisha
,
Amarnath Mishra
,
Chandra Singh
Advancements in Cybercrime Investigation and Digital Forensics
By
A. Harisha
,
Amarnath Mishra
,
Chandra Singh
HK$1,340
Elsewhere
HK$1,513.94
Save HK$173.94 (11%)
ChatGPT for Cybersecurity Cookbook (Learn practical generative AI recipes to supercharge your cybersecurity skills)
By
Clint Bodungen
,
Aaron Crow
ChatGPT for Cybersecurity Cookbook (Learn practical generative AI recipes to supercharge your cybersecurity skills)
By
Clint Bodungen
,
Aaron Crow
HK$475
Introduction to Kali Purple (Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux)
By
Karl Lane
Introduction to Kali Purple (Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux)
By
Karl Lane
HK$437
Automating Security Detection Engineering (A hands-on guide to implementing Detection as Code)
By
Dennis Chow
,
David Bruskin
Automating Security Detection Engineering (A hands-on guide to implementing Detection as Code)
By
Dennis Chow
,
David Bruskin
HK$483
Mastering Metasploit - Fourth Edition (Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework)
By
Jaswal, Nipun
Mastering Metasploit - Fourth Edition (Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework)
By
Jaswal, Nipun
HK$487
1
2
Next Page
1
2
Next Page