0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Security
Filters
Refine By
Category
Category
Networking
(33)
Sold By
Sold By
All Sellers
Fishpond
(35)
Country
Country
All Countries
United States
(11)
United Kingdom
(6)
Singapore
(5)
Results for "Python For Data Analysis Books"
Python For Data Analysis Books
54 results
Filters
Refine By
Category
Category
Networking
(33)
Sold By
Sold By
All Sellers
Fishpond
(35)
Country
Country
All Countries
United States
(11)
United Kingdom
(6)
Singapore
(5)
54 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Hosmer, Chet
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Hosmer, Chet
£45.53
Elsewhere
£47.99
Save £2.46 (5%)
Python Passive Network Mapping (P2nmap)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
Python Passive Network Mapping (P2nmap)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
£45.33
Elsewhere
£50.99
Save £5.66 (11%)
Executing Windows Command Line Investigations (While Ensuring Evidentiary Integrity)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
,
Bartolomie, Joshua (CEECS, CFCE, CISSP, CRISC, CSM, DFCP, Direct
,
Rosanne Pelli
Executing Windows Command Line Investigations (While Ensuring Evidentiary Integrity)
By
Hosmer, Chet (President, Python Forensics, Inc.<br>Assistant Pro
,
Bartolomie, Joshua (CEECS, CFCE, CISSP, CRISC, CSM, DFCP, Direct
,
Rosanne Pelli
£59.71
Data Structures for Engineers and Scientists Using Python
By
Nayak, Rakesh (Department of CSE, Vaagdevi Engineering College,
,
Gupta, Nishu
Data Structures for Engineers and Scientists Using Python
By
Nayak, Rakesh (Department of CSE, Vaagdevi Engineering College,
,
Gupta, Nishu
£104
Elsewhere
£165.00
Save £61.00 (37%)
Powershell and Python Together (Targeting Digital Investigations)
By
Hosmer, Chet
Powershell and Python Together (Targeting Digital Investigations)
By
Hosmer, Chet
£30.26
Elsewhere
£39.99
Save £9.73 (24%)
Black Hat Python, 2nd Edition (Python Programming for Hackers and Pentesters)
By
Seitz, Justin
,
Arnold, Tim
Black Hat Python, 2nd Edition (Python Programming for Hackers and Pentesters)
By
Seitz, Justin
,
Arnold, Tim
£29.59
Elsewhere
£42.99
Save £13.40 (31%)
Learning Python for Forensics (Leverage the power of Python in forensic investigations, 2nd Edition)
By
Miller, Preston
,
Bryce, Chapin
Learning Python for Forensics (Leverage the power of Python in forensic investigations, 2nd Edition)
By
Miller, Preston
,
Bryce, Chapin
£34.89
Elsewhere
£37.99
Save £3.10 (8%)
Serious Python (Black-Belt Advice on Deployment, Scalability, Testing, and More)
By
Danjou, Julien
Serious Python (Black-Belt Advice on Deployment, Scalability, Testing, and More)
By
Danjou, Julien
£23.35
Elsewhere
£35.99
Save £12.64 (35%)
Data Driven Approach towards Disruptive Technologies
Data Driven Approach towards Disruptive Technologies
£252
Hacks, Leaks, and Revelations (The Art of Analyzing Hacked and Leaked Data)
By
Lee, Micah
Hacks, Leaks, and Revelations (The Art of Analyzing Hacked and Leaked Data)
By
Lee, Micah
£28.25
Elsewhere
£47.99
Save £19.74 (41%)
Security and Risk Analysis for Intelligent Cloud Computing (Methods, Applications, and Preventions)
By
Ajay Kumar
,
Sangeeta Rani
,
Sarita Rathee
,
Surbhi Bhatia
Security and Risk Analysis for Intelligent Cloud Computing (Methods, Applications, and Preventions)
By
Ajay Kumar
,
Sangeeta Rani
,
Sarita Rathee
,
Surbhi Bhatia
£107
Elsewhere
£120.00
Save £13.00 (11%)
Security and Risk Analysis for Intelligent Cloud Computing (Methods, Applications, and Preventions)
By
Ajay Kumar
,
Sangeeta Rani
,
Sarita Rathee
Security and Risk Analysis for Intelligent Cloud Computing (Methods, Applications, and Preventions)
By
Ajay Kumar
,
Sangeeta Rani
,
Sarita Rathee
£54.06
Data Driven Approach Towards Disruptive Technologies (Proceedings of MIDAS 2020 (Studies in Autonomic, Data-driven and Industrial Computing))
By
T P Singh
,
Ravi Tomar
,
Tanupriya Choudhury
,
Thinagaran Perumal
Data Driven Approach Towards Disruptive Technologies (Proceedings of MIDAS 2020 (Studies in Autonomic, Data-driven and Industrial Computing))
By
T P Singh
,
Ravi Tomar
,
Tanupriya Choudhury
,
Thinagaran Perumal
£252
Proceedings of Data Analytics and Management (ICDAM 2021, Volume 1 (Lecture Notes on Data Engineering and Communications Technologies))
By
Deepak Gupta
,
Zdzislaw Polkowski
,
Ashish Khanna
Proceedings of Data Analytics and Management (ICDAM 2021, Volume 1 (Lecture Notes on Data Engineering and Communications Technologies))
By
Deepak Gupta
,
Zdzislaw Polkowski
,
Ashish Khanna
£179
Proceedings of Data Analytics and Management (ICDAM 2021, Volume 1 (Lecture Notes on Data Engineering and Communications Technologies))
By
Deepak Gupta
,
Zdzislaw Polkowski
,
Ashish Khanna
,
Siddhartha Bhattacharyya
Proceedings of Data Analytics and Management (ICDAM 2021, Volume 1 (Lecture Notes on Data Engineering and Communications Technologies))
By
Deepak Gupta
,
Zdzislaw Polkowski
,
Ashish Khanna
,
Siddhartha Bhattacharyya
£182
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
£50.30
Elsewhere
£109.99
Save £59.69 (54%)
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
£50.22
Elsewhere
£109.99
Save £59.77 (54%)
Generative AI and Implications for Ethics, Security, and Data Management (Advances in Computational Intelligence and Robotics)
By
Jeganathan Gomathi Sankar
,
Arokiaraj David
Generative AI and Implications for Ethics, Security, and Data Management (Advances in Computational Intelligence and Robotics)
By
Jeganathan Gomathi Sankar
,
Arokiaraj David
£205
Computing Technologies and Applications (Paving Path Towards Society 5.0 (Demystifying Technologies for Computational Excellence))
By
Latesh Malik
,
Sandhya Arora
,
Urmila Shrawankar
,
Maya Ingle
Computing Technologies and Applications (Paving Path Towards Society 5.0 (Demystifying Technologies for Computational Excellence))
By
Latesh Malik
,
Sandhya Arora
,
Urmila Shrawankar
,
Maya Ingle
£101
Elsewhere
£145.00
Save £44.00 (30%)
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
Malware Analyst's Cookbook and DVD (Tools and Techniques for Fighting Malicious Code [With DVD])
By
Ligh, Michael
,
Adair, Steven
,
Blake Hartstein
,
Matthew Richard
£44.57
Elsewhere
£47.50
Save £2.93 (6%)
182
Network Security with Openssl (Cryptography for Secure Communications)
By
Viega, John
,
Messier, Matt
,
Pravir Chandra
Network Security with Openssl (Cryptography for Secure Communications)
By
Viega, John
,
Messier, Matt
,
Pravir Chandra
£22.87
Elsewhere
£31.99
Save £9.12 (29%)
66
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
Effective Strategies for Combatting Social Engineering in Cybersecurity (Advances in Information Security, Privacy, and Ethics)
By
Rajeev Kumar
,
Saurabh Srivastava
,
Ahmed A. Elngar
£138
Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance (Advances in Electronic Government, Digital Divide, and Regional Development)
By
Rajeev Kumar
,
Abu Bakar Abdul Hamid
,
Noor Inayah Binti Ya’akub
,
Tadiwa Elisha Nyamasvisva
Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance (Advances in Electronic Government, Digital Divide, and Regional Development)
By
Rajeev Kumar
,
Abu Bakar Abdul Hamid
,
Noor Inayah Binti Ya’akub
,
Tadiwa Elisha Nyamasvisva
£123
Decision Making and Security Risk Management for IoT Environments (Advances in Information Security)
By
Wadii Boulila
,
Jawad Ahmad
,
Anis Koubaa
,
Maha Driss
Decision Making and Security Risk Management for IoT Environments (Advances in Information Security)
By
Wadii Boulila
,
Jawad Ahmad
,
Anis Koubaa
,
Maha Driss
£99.25
1
2
3
Next Page
1
2
3
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies