0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Special Topics
Filters
Refine By
Category
Category
Information Technology
(9)
Viruses
(9)
Expert Systems
(1)
Management Information Systems
(1)
User Interfaces
(1)
Sold By
Sold By
All Sellers
Fishpond
(20)
Country
Country
All Countries
United States
(8)
United Kingdom
(5)
Canada
(1)
Switzerland
(1)
Results for "Python Forensics"
Python Forensics
23 results
Filters
Refine By
Category
Category
Information Technology
(9)
Viruses
(9)
Expert Systems
(1)
Management Information Systems
(1)
User Interfaces
(1)
Sold By
Sold By
All Sellers
Fishpond
(20)
Country
Country
All Countries
United States
(8)
United Kingdom
(5)
Canada
(1)
Switzerland
(1)
23 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Integrating Python with Leading Computer Forensics Platforms
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
Integrating Python with Leading Computer Forensics Platforms
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
HK$407
Python Passive Network Mapping (P2nmap)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
Python Passive Network Mapping (P2nmap)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
HK$426
Elsewhere
HK$505.42
Save HK$79.42 (16%)
Executing Windows Command Line Investigations (While Ensuring Evidentiary Integrity)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
,
Bartolomie, Joshua (CEECS, CFCE, CISSP, CRISC, CSM, DFCP, Direct
,
Rosanne Pelli
Executing Windows Command Line Investigations (While Ensuring Evidentiary Integrity)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
,
Bartolomie, Joshua (CEECS, CFCE, CISSP, CRISC, CSM, DFCP, Direct
,
Rosanne Pelli
HK$573
Learning Python for Forensics (Leverage the power of Python in forensic investigations, 2nd Edition)
By
Miller, Preston
,
Bryce, Chapin
Learning Python for Forensics (Leverage the power of Python in forensic investigations, 2nd Edition)
By
Miller, Preston
,
Bryce, Chapin
HK$473
Advancements in Cybercrime Investigation and Digital Forensics
By
A. Harisha
,
Amarnath Mishra
,
Chandra Singh
Advancements in Cybercrime Investigation and Digital Forensics
By
A. Harisha
,
Amarnath Mishra
,
Chandra Singh
HK$1,299
Elsewhere
HK$1,457.10
Save HK$158.10 (11%)
Practical Cyber Intelligence (A Hands-on Guide to Digital Forensics)
By
Jakobsen, Adam Tilmar
Practical Cyber Intelligence (A Hands-on Guide to Digital Forensics)
By
Jakobsen, Adam Tilmar
HK$760
Elsewhere
HK$788.02
Save HK$28.02 (4%)
Python for Security and Networking - Third Edition (Leverage Python modules and tools in securing your network and applications)
By
Ortega, José Manuel
Python for Security and Networking - Third Edition (Leverage Python modules and tools in securing your network and applications)
By
Ortega, José Manuel
HK$500
Hiding Behind the Keyboard (Uncovering Covert Communication Methods with Forensic Analysis)
By
Brett Shavers
,
John Bair
Hiding Behind the Keyboard (Uncovering Covert Communication Methods with Forensic Analysis)
By
Brett Shavers
,
John Bair
HK$423
12
Machine Learning with PyTorch and Scikit-Learn (Develop machine learning and deep learning models with Python)
By
Raschka, Sebastian
,
Liu, Yuxi
,
Dmytro Dzhulgakov
Machine Learning with PyTorch and Scikit-Learn (Develop machine learning and deep learning models with Python)
By
Raschka, Sebastian
,
Liu, Yuxi
,
Dmytro Dzhulgakov
HK$600
Python for Cybersecurity Cookbook (80+ practical recipes for detecting, defending, and responding to Cyber threats (English Edition))
By
Krishna, Nishant
Python for Cybersecurity Cookbook (80+ practical recipes for detecting, defending, and responding to Cyber threats (English Edition))
By
Krishna, Nishant
HK$396
Cloud Security (Attacks, Techniques, Tools, and Challenges)
By
Mishra, Preeti
,
Pilli, Emmanuel S
,
R. C. Joshi
Cloud Security (Attacks, Techniques, Tools, and Challenges)
By
Mishra, Preeti
,
Pilli, Emmanuel S
,
R. C. Joshi
HK$800
Elsewhere
HK$1,239.03
Save HK$439.03 (35%)
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
HK$440
Elsewhere
HK$470.83
Save HK$30.83 (7%)
182
Security Power Tools
By
Bryan Burns
,
Dave Killion
,
Nicolas Beauchesne
,
Paul Guersch
Security Power Tools
By
Bryan Burns
,
Dave Killion
,
Nicolas Beauchesne
,
Paul Guersch
HK$440
Elsewhere
HK$475.69
Save HK$35.69 (8%)
Eleventh Hour Linux+ (Exam XK0-003 Study Guide)
By
Graham Speake
,
Brian Barber
,
Chris Happel
,
Terrence V. Lillard
Eleventh Hour Linux+ (Exam XK0-003 Study Guide)
By
Graham Speake
,
Brian Barber
,
Chris Happel
,
Terrence V. Lillard
HK$220
Intelligence-Driven Incident Response (Outwitting the Adversary)
By
Brown, Rebekah
,
Roberts, Scott J
Intelligence-Driven Incident Response (Outwitting the Adversary)
By
Brown, Rebekah
,
Roberts, Scott J
HK$420
Elsewhere
HK$525.25
Save HK$105.25 (20%)
Cloud Security (Attacks, Techniques, Tools, and Challenges)
By
Preeti
,
Emmanuel S
Cloud Security (Attacks, Techniques, Tools, and Challenges)
By
Preeti
,
Emmanuel S
HK$369
Elsewhere
HK$485.60
Save HK$116.60 (24%)
Computer Science Engineering and Emerging Technologies (Proceedings of ICCS 2022)
By
Rajeev Sobti
,
Rachit Garg
,
Ajeet Kumar Srivastava
,
Gurpeet Singh Shahi
Computer Science Engineering and Emerging Technologies (Proceedings of ICCS 2022)
By
Rajeev Sobti
,
Rachit Garg
,
Ajeet Kumar Srivastava
,
Gurpeet Singh Shahi
HK$484
Cyberology (An Optimized Approach to the Cyber-World)
By
Mohd. Shahid Husain
,
Mohammad Faisal
,
Halima Sadia
,
Tasneem Ahmed
Cyberology (An Optimized Approach to the Cyber-World)
By
Mohd. Shahid Husain
,
Mohammad Faisal
,
Halima Sadia
,
Tasneem Ahmed
HK$1,839
Introduction to Kali Purple (Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux)
By
Karl Lane
Introduction to Kali Purple (Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux)
By
Karl Lane
HK$430
Innovative Security Solutions for Information Technology and Communications (9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Ion Bica
,
Reza Reyhanitabar
Innovative Security Solutions for Information Technology and Communications (9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Ion Bica
,
Reza Reyhanitabar
HK$780
Digital Scholarship (A Practical Guide for Working Scholars)
By
Paul Logasa Bogen II
Digital Scholarship (A Practical Guide for Working Scholars)
By
Paul Logasa Bogen II
Currently
Unavailable
ITNG 2023 20th International Conference on Information Technology-New Generations (Advances in Intelligent Systems and Computing)
By
Shahram Latifi
ITNG 2023 20th International Conference on Information Technology-New Generations (Advances in Intelligent Systems and Computing)
By
Shahram Latifi
Currently
Unavailable
ITNG 2023 20th International Conference on Information Technology-New Generations (Advances in Intelligent Systems and Computing)
By
Shahram Latifi
ITNG 2023 20th International Conference on Information Technology-New Generations (Advances in Intelligent Systems and Computing)
By
Shahram Latifi
Currently
Unavailable