0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(11)
Sold By
Sold By
All Sellers
Fishpond
(11)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United States
(5)
United Kingdom
(2)
Canada
(1)
Results for "Effective Python Books"
Effective Python Books
19 results
Filters
Refine By
Category
Category
Networking
(11)
Sold By
Sold By
All Sellers
Fishpond
(11)
Age Range
Age Range
All Ranges
15+
(1)
Country
Country
All Countries
United States
(5)
United Kingdom
(2)
Canada
(1)
19 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Hosmer, Chet
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Hosmer, Chet
£46.21
Elsewhere
£47.99
Save £1.78 (4%)
Python Hacking Essentials
By
Earnest Wish
Python Hacking Essentials
By
Earnest Wish
£15.80
Learning Python for Forensics (Leverage the power of Python in forensic investigations, 2nd Edition)
By
Miller, Preston
,
Bryce, Chapin
Learning Python for Forensics (Leverage the power of Python in forensic investigations, 2nd Edition)
By
Miller, Preston
,
Bryce, Chapin
£33.91
Elsewhere
£37.99
Save £4.08 (11%)
Black Hat Python, 2nd Edition (Python Programming for Hackers and Pentesters)
By
Seitz, Justin
,
Arnold, Tim
Black Hat Python, 2nd Edition (Python Programming for Hackers and Pentesters)
By
Seitz, Justin
,
Arnold, Tim
£29.59
Elsewhere
£42.99
Save £13.40 (31%)
Serious Python (Black-Belt Advice on Deployment, Scalability, Testing, and More)
By
Danjou, Julien
Serious Python (Black-Belt Advice on Deployment, Scalability, Testing, and More)
By
Danjou, Julien
£24.54
Elsewhere
£35.99
Save £11.45 (32%)
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
£134
Elsewhere
£139.46
Save £5.46 (4%)
Conducting Network Penetration and Espionage in a Global Environment
By
Middleton, Bruce
Conducting Network Penetration and Espionage in a Global Environment
By
Middleton, Bruce
£84.65
Elsewhere
£105.00
Save £20.35 (19%)
Conducting Network Penetration and Espionage in a Global Environment
By
Bruce Middleton
Conducting Network Penetration and Espionage in a Global Environment
By
Bruce Middleton
£54.19
Elsewhere
£56.99
Save £2.80 (5%)
The Techno-Legal Dynamics of Cyber Crimes in Industry 5.0 (Industry 5.0 Transformation Applications)
By
Gagandeep Kaur
,
Tanupriya Choudhury
,
S. Balamurugan
The Techno-Legal Dynamics of Cyber Crimes in Industry 5.0 (Industry 5.0 Transformation Applications)
By
Gagandeep Kaur
,
Tanupriya Choudhury
,
S. Balamurugan
£130
Elsewhere
£170.00
Save £40.00 (24%)
Coding for Penetration Testers (Building Better Tools)
By
Jason Andress
,
Ryan Linn
Coding for Penetration Testers (Building Better Tools)
By
Jason Andress
,
Ryan Linn
£22.76
Elsewhere
£27.99
Save £5.23 (19%)
1
Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance (Advances in Electronic Government, Digital Divide, and Regional Development)
By
Rajeev Kumar
,
Abu Bakar Abdul Hamid
,
Noor Inayah Binti Ya’akub
,
Tadiwa Elisha Nyamasvisva
Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance (Advances in Electronic Government, Digital Divide, and Regional Development)
By
Rajeev Kumar
,
Abu Bakar Abdul Hamid
,
Noor Inayah Binti Ya’akub
,
Tadiwa Elisha Nyamasvisva
£120
Elsewhere
£124.38
Save £4.38 (4%)
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Currently
Unavailable
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Currently
Unavailable
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Currently
Unavailable
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Kali Linux for Beginners (2 Books in 1: Computer Hacking & Programming Guide with Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Hacking With Kali Linux (2 Books in 1: A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1 and Part 2))
By
Learn Computer Hacking in Deep
Currently
Unavailable
Cyber Threat Hunting
By
Nadhem AlFardan
Cyber Threat Hunting
By
Nadhem AlFardan
Currently
Unavailable
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies