0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Movies
Music
All Products
\n
Books
Movies
Music
Books
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
All Products
Books
Filters
Refine By
Category
Category
Computers
(97)
Professional & Vocational
(37)
Nonfiction
(29)
Science
(17)
Fiction & Literature
(10)
Tertiary Education (US: College)
(6)
History
(6)
Business
(5)
Postgraduate, Research & Scholarly
(3)
Biography
(2)
Arts & Photography
(2)
Sports & Recreation
(2)
Sold By
Sold By
All Sellers
Fishpond
(116)
Format
Format
All Formats
Paperback
(81)
Hardback
(30)
Electronic Book Text
(3)
Mixed media product
(2)
Results for "Python Forensics"
Python Forensics
173 results
Filters
Refine By
Category
Category
Computers
(97)
Professional & Vocational
(37)
Nonfiction
(29)
Science
(17)
Fiction & Literature
(10)
Tertiary Education (US: College)
(6)
History
(6)
Business
(5)
Postgraduate, Research & Scholarly
(3)
Biography
(2)
Arts & Photography
(2)
Sports & Recreation
(2)
Sold By
Sold By
All Sellers
Fishpond
(116)
Format
Format
All Formats
Paperback
(81)
Hardback
(30)
Electronic Book Text
(3)
Mixed media product
(2)
173 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Reconnoitering the Landscape of Edge Intelligence in Healthcare
By
Suneeta Satpathy
,
Sachi Nandan Mohanty
,
Sirisha Potluri
Reconnoitering the Landscape of Edge Intelligence in Healthcare
By
Suneeta Satpathy
,
Sachi Nandan Mohanty
,
Sirisha Potluri
HK$872
Elsewhere
HK$1,311.63
Save HK$439.63 (34%)
Mastering Metasploit, Second Edition
By
Jaswal, Nipun
Mastering Metasploit, Second Edition
By
Jaswal, Nipun
HK$500
Network Protocols for Security Professionals (Probe and identify network-based vulnerabilities and safeguard against network protocol breaches)
By
Yoram Orzach
,
Deepanshu Khanna
Network Protocols for Security Professionals (Probe and identify network-based vulnerabilities and safeguard against network protocol breaches)
By
Yoram Orzach
,
Deepanshu Khanna
HK$500
The Covers Are Off (Civil War at Lord's)
By
Charles Sale
,
Matthew Engel
The Covers Are Off (Civil War at Lord's)
By
Charles Sale
,
Matthew Engel
HK$265
The Covers Are Off (Civil War at Lord's)
By
Charles Sale
,
Matthew Engel
The Covers Are Off (Civil War at Lord's)
By
Charles Sale
,
Matthew Engel
HK$557
Introduction to Kali Purple (Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux)
By
Karl Lane
Introduction to Kali Purple (Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux)
By
Karl Lane
HK$434
Intelligent Computing and Networking (Proceedings of IC-ICN 2020 (Lecture Notes in Networks and Systems))
By
Valentina Emilia Balas
,
Vijay Bhaskar Semwal
,
Anand Khandare
,
Megharani Patil
Intelligent Computing and Networking (Proceedings of IC-ICN 2020 (Lecture Notes in Networks and Systems))
By
Valentina Emilia Balas
,
Vijay Bhaskar Semwal
,
Anand Khandare
,
Megharani Patil
HK$1,300
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
HK$540
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
HK$500
Elsewhere
HK$1,101.27
Save HK$601.27 (55%)
Data Engineering and Intelligent Computing (Proceedings of 5th ICICC 2021, Volume 1 (Lecture Notes in Networks and Systems))
By
Vikrant Bhateja
,
Lai Khin Wee
Data Engineering and Intelligent Computing (Proceedings of 5th ICICC 2021, Volume 1 (Lecture Notes in Networks and Systems))
By
Vikrant Bhateja
,
Lai Khin Wee
HK$1,752
Elsewhere
HK$2,002.39
Save HK$250.39 (13%)
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
HK$2,193
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
HK$1,678
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (Advances in Intelligent Systems and Computing)
By
Ajith Abraham
,
Yukio Ohsawa
,
Niketa Gandhi
,
M.A. Jabbar
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (Advances in Intelligent Systems and Computing)
By
Ajith Abraham
,
Yukio Ohsawa
,
Niketa Gandhi
,
M.A. Jabbar
HK$1,940
Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence)
By
Abdel-Basset, Mohamed
,
Ding, Weiping
,
Hossam Hawash
,
Weiping Ding
Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence)
By
Abdel-Basset, Mohamed
,
Ding, Weiping
,
Hossam Hawash
,
Weiping Ding
HK$1,300
Elsewhere
HK$1,401.64
Save HK$101.64 (7%)
Rough Sets (International Joint Conference, IJCRS 2022, Suzhou, China, November 11–14, 2022, Proceedings (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
JingTao Yao
,
Hamido Fujita
,
Xiaodong Yue
,
Duoqian Miao
Rough Sets (International Joint Conference, IJCRS 2022, Suzhou, China, November 11–14, 2022, Proceedings (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
JingTao Yao
,
Hamido Fujita
,
Xiaodong Yue
,
Duoqian Miao
HK$700
Innovative Security Solutions for Information Technology and Communications (9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Ion Bica
,
Reza Reyhanitabar
Innovative Security Solutions for Information Technology and Communications (9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Ion Bica
,
Reza Reyhanitabar
HK$788
Cybersecurity Simplified (A Guide for Beginners, Students, and Job Seekers)
By
Inderjit Singh
,
Gaurav Aroraa
Cybersecurity Simplified (A Guide for Beginners, Students, and Job Seekers)
By
Inderjit Singh
,
Gaurav Aroraa
HK$157
Elsewhere
HK$170.11
Save HK$13.11 (8%)
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Chet Hosmer
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Chet Hosmer
Currently
Unavailable
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Currently
Unavailable
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Currently
Unavailable
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Currently
Unavailable
Previous Page
1
2
3
4
5
6
7
8
Next Page
Previous Page
1
2
3
4
5
6
7
8
Next Page