0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Computers
Filters
Refine By
Category
Category
Security
(50)
Programming
(31)
Computer Science
(22)
Special Topics
(20)
Artificial Intelligence
(16)
Hardware
(14)
Server & Database
(12)
Entertainment & Games
(9)
Web
(7)
Networking
(7)
General
(6)
Graphics & Design
(5)
Operating Systems
(5)
Enterprise Applications
(4)
Certification
(3)
Data Processing
(3)
Cloud Computing
(2)
Computer Simulation
(2)
Social Aspects
(1)
Sold By
Sold By
All Sellers
Fishpond
(96)
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(3)
Country
Country
All Countries
United States
(40)
United Kingdom
(22)
Singapore
(4)
Switzerland
(4)
Canada
(1)
More...
Results for "Python Forensics"
Python Forensics
130 results
Filters
Refine By
Category
Category
Security
(50)
Programming
(31)
Computer Science
(22)
Special Topics
(20)
Artificial Intelligence
(16)
Hardware
(14)
Server & Database
(12)
Entertainment & Games
(9)
Web
(7)
Networking
(7)
General
(6)
Graphics & Design
(5)
Operating Systems
(5)
Enterprise Applications
(4)
Certification
(3)
Data Processing
(3)
Cloud Computing
(2)
Computer Simulation
(2)
Social Aspects
(1)
Sold By
Sold By
All Sellers
Fishpond
(96)
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(3)
Country
Country
All Countries
United States
(40)
United Kingdom
(22)
Singapore
(4)
Switzerland
(4)
Canada
(1)
More...
130 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Next Generation Mechanisms for Data Encryption
By
Keshav Kumar
,
Bishwajeet Kumar Pandey
Next Generation Mechanisms for Data Encryption
By
Keshav Kumar
,
Bishwajeet Kumar Pandey
HK$860
Elsewhere
HK$1,288.59
Save HK$428.59 (33%)
Intelligence-Driven Incident Response (Outwitting the Adversary)
By
Brown, Rebekah
,
Roberts, Scott J
Intelligence-Driven Incident Response (Outwitting the Adversary)
By
Brown, Rebekah
,
Roberts, Scott J
HK$420
Elsewhere
HK$525.25
Save HK$105.25 (20%)
Cloud Security (Attacks, Techniques, Tools, and Challenges)
By
Preeti
,
Emmanuel S
Cloud Security (Attacks, Techniques, Tools, and Challenges)
By
Preeti
,
Emmanuel S
HK$369
Elsewhere
HK$485.60
Save HK$116.60 (24%)
Computer Science Engineering and Emerging Technologies (Proceedings of ICCS 2022)
By
Rajeev Sobti
,
Rachit Garg
,
Ajeet Kumar Srivastava
,
Gurpeet Singh Shahi
Computer Science Engineering and Emerging Technologies (Proceedings of ICCS 2022)
By
Rajeev Sobti
,
Rachit Garg
,
Ajeet Kumar Srivastava
,
Gurpeet Singh Shahi
HK$484
Cyberology (An Optimized Approach to the Cyber-World)
By
Mohd. Shahid Husain
,
Mohammad Faisal
,
Halima Sadia
,
Tasneem Ahmed
Cyberology (An Optimized Approach to the Cyber-World)
By
Mohd. Shahid Husain
,
Mohammad Faisal
,
Halima Sadia
,
Tasneem Ahmed
HK$1,839
Computer Vision (Object Detection In Adversarial Vision)
By
Bhowmik, inal Kanti
Computer Vision (Object Detection In Adversarial Vision)
By
Bhowmik, inal Kanti
HK$952
Elsewhere
HK$1,486.83
Save HK$534.83 (36%)
AI in Agriculture for Sustainable and Economic Management (Artificial Intelligence for Sustainable Engineering and Management)
By
Sirisha Potluri
,
Suneeta Satpathy
,
Santi Swarup Basa
,
Antonio Zuorro
AI in Agriculture for Sustainable and Economic Management (Artificial Intelligence for Sustainable Engineering and Management)
By
Sirisha Potluri
,
Suneeta Satpathy
,
Santi Swarup Basa
,
Antonio Zuorro
HK$800
Elsewhere
HK$1,189.47
Save HK$389.47 (33%)
Reconnoitering the Landscape of Edge Intelligence in Healthcare
By
Suneeta Satpathy
,
Sachi Nandan Mohanty
,
Sirisha Potluri
Reconnoitering the Landscape of Edge Intelligence in Healthcare
By
Suneeta Satpathy
,
Sachi Nandan Mohanty
,
Sirisha Potluri
HK$860
Elsewhere
HK$1,298.50
Save HK$438.50 (34%)
Mastering Metasploit, Second Edition
By
Jaswal, Nipun
Mastering Metasploit, Second Edition
By
Jaswal, Nipun
HK$500
Network Protocols for Security Professionals (Probe and identify network-based vulnerabilities and safeguard against network protocol breaches)
By
Yoram Orzach
,
Deepanshu Khanna
Network Protocols for Security Professionals (Probe and identify network-based vulnerabilities and safeguard against network protocol breaches)
By
Yoram Orzach
,
Deepanshu Khanna
HK$500
Introduction to Kali Purple (Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux)
By
Karl Lane
Introduction to Kali Purple (Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux)
By
Karl Lane
HK$430
Intelligent Computing and Networking (Proceedings of IC-ICN 2020 (Lecture Notes in Networks and Systems))
By
Valentina Emilia Balas
,
Vijay Bhaskar Semwal
,
Anand Khandare
,
Megharani Patil
Intelligent Computing and Networking (Proceedings of IC-ICN 2020 (Lecture Notes in Networks and Systems))
By
Valentina Emilia Balas
,
Vijay Bhaskar Semwal
,
Anand Khandare
,
Megharani Patil
HK$1,296
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
HK$540
Elsewhere
HK$1,090.24
Save HK$550.24 (50%)
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
HK$500
Elsewhere
HK$1,090.24
Save HK$590.24 (54%)
Data Engineering and Intelligent Computing (Proceedings of 5th ICICC 2021, Volume 1 (Lecture Notes in Networks and Systems))
By
Vikrant Bhateja
,
Lai Khin Wee
Data Engineering and Intelligent Computing (Proceedings of 5th ICICC 2021, Volume 1 (Lecture Notes in Networks and Systems))
By
Vikrant Bhateja
,
Lai Khin Wee
HK$1,734
Elsewhere
HK$1,982.34
Save HK$248.34 (13%)
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
HK$2,171
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
HK$1,660
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (Advances in Intelligent Systems and Computing)
By
Ajith Abraham
,
Yukio Ohsawa
,
Niketa Gandhi
,
M.A. Jabbar
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (Advances in Intelligent Systems and Computing)
By
Ajith Abraham
,
Yukio Ohsawa
,
Niketa Gandhi
,
M.A. Jabbar
HK$1,800
Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence)
By
Abdel-Basset, Mohamed
,
Ding, Weiping
,
Hossam Hawash
,
Weiping Ding
Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence)
By
Abdel-Basset, Mohamed
,
Ding, Weiping
,
Hossam Hawash
,
Weiping Ding
HK$1,300
Elsewhere
HK$1,387.61
Save HK$87.61 (6%)
Rough Sets (International Joint Conference, IJCRS 2022, Suzhou, China, November 11–14, 2022, Proceedings (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
JingTao Yao
,
Hamido Fujita
,
Xiaodong Yue
,
Duoqian Miao
Rough Sets (International Joint Conference, IJCRS 2022, Suzhou, China, November 11–14, 2022, Proceedings (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
JingTao Yao
,
Hamido Fujita
,
Xiaodong Yue
,
Duoqian Miao
HK$700
Innovative Security Solutions for Information Technology and Communications (9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Ion Bica
,
Reza Reyhanitabar
Innovative Security Solutions for Information Technology and Communications (9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Ion Bica
,
Reza Reyhanitabar
HK$780
Previous Page
1
2
3
4
5
6
Next Page
Previous Page
1
2
3
4
5
6
Next Page