0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Movies
Music
All Products
\n
Books
Movies
Music
Books
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Filters
Refine By
Category
Category
Computers
(97)
Professional & Vocational
(37)
Nonfiction
(29)
Science
(17)
Fiction & Literature
(10)
Tertiary Education (US: College)
(6)
History
(6)
Business
(5)
Postgraduate, Research & Scholarly
(3)
Biography
(2)
Arts & Photography
(2)
Sports & Recreation
(2)
Sold By
Sold By
All Sellers
Fishpond
(116)
Format
Format
All Formats
Paperback
(81)
Hardback
(30)
Electronic Book Text
(3)
Mixed media product
(2)
Results for "Python Forensics"
Python Forensics
173 results
Filters
Refine By
Category
Category
Computers
(97)
Professional & Vocational
(37)
Nonfiction
(29)
Science
(17)
Fiction & Literature
(10)
Tertiary Education (US: College)
(6)
History
(6)
Business
(5)
Postgraduate, Research & Scholarly
(3)
Biography
(2)
Arts & Photography
(2)
Sports & Recreation
(2)
Sold By
Sold By
All Sellers
Fishpond
(116)
Format
Format
All Formats
Paperback
(81)
Hardback
(30)
Electronic Book Text
(3)
Mixed media product
(2)
173 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Reconnoitering the Landscape of Edge Intelligence in Healthcare
By
Suneeta Satpathy
,
Sachi Nandan Mohanty
,
Sirisha Potluri
Reconnoitering the Landscape of Edge Intelligence in Healthcare
By
Suneeta Satpathy
,
Sachi Nandan Mohanty
,
Sirisha Potluri
£91.65
Elsewhere
£131.00
Save £39.35 (30%)
Mastering Metasploit, Second Edition
By
Jaswal, Nipun
Mastering Metasploit, Second Edition
By
Jaswal, Nipun
£38.65
Network Protocols for Security Professionals (Probe and identify network-based vulnerabilities and safeguard against network protocol breaches)
By
Yoram Orzach
,
Deepanshu Khanna
Network Protocols for Security Professionals (Probe and identify network-based vulnerabilities and safeguard against network protocol breaches)
By
Yoram Orzach
,
Deepanshu Khanna
£36.86
The Covers Are Off (Civil War at Lord's)
By
Charles Sale
,
Matthew Engel
The Covers Are Off (Civil War at Lord's)
By
Charles Sale
,
Matthew Engel
£22.95
Elsewhere
£25.00
Save £2.05 (8%)
The Covers Are Off (Civil War at Lord's)
By
Charles Sale
,
Matthew Engel
The Covers Are Off (Civil War at Lord's)
By
Charles Sale
,
Matthew Engel
£42.28
Elsewhere
£50.00
Save £7.72 (15%)
Introduction to Kali Purple (Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux)
By
Karl Lane
Introduction to Kali Purple (Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux)
By
Karl Lane
£32.90
Intelligent Computing and Networking (Proceedings of IC-ICN 2020 (Lecture Notes in Networks and Systems))
By
Valentina Emilia Balas
,
Vijay Bhaskar Semwal
,
Anand Khandare
,
Megharani Patil
Intelligent Computing and Networking (Proceedings of IC-ICN 2020 (Lecture Notes in Networks and Systems))
By
Valentina Emilia Balas
,
Vijay Bhaskar Semwal
,
Anand Khandare
,
Megharani Patil
£131
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
£50.29
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
Information Retrieval and Natural Language Processing (A Graph Theory Approach (Studies in Big Data))
By
Sheetal S. Sonawane
,
Parikshit N. Mahalle
,
Archana S. Ghotkar
£48.93
Elsewhere
£109.99
Save £61.06 (56%)
Data Engineering and Intelligent Computing (Proceedings of 5th ICICC 2021, Volume 1 (Lecture Notes in Networks and Systems))
By
Vikrant Bhateja
,
Lai Khin Wee
Data Engineering and Intelligent Computing (Proceedings of 5th ICICC 2021, Volume 1 (Lecture Notes in Networks and Systems))
By
Vikrant Bhateja
,
Lai Khin Wee
£198
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
£205
Elsewhere
£217.25
Save £12.25 (6%)
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
Revolutionizing Data Science and Analytics for Industry Transformation
By
Paul Devasahayam Manuel
,
Kalim Uddin Qureshi
,
Thamilarasi Venkatachalam
£156
Elsewhere
£163.06
Save £7.06 (4%)
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (Advances in Intelligent Systems and Computing)
By
Ajith Abraham
,
Yukio Ohsawa
,
Niketa Gandhi
,
M.A. Jabbar
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (Advances in Intelligent Systems and Computing)
By
Ajith Abraham
,
Yukio Ohsawa
,
Niketa Gandhi
,
M.A. Jabbar
£177
Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence)
By
Abdel-Basset, Mohamed
,
Ding, Weiping
,
Hossam Hawash
,
Weiping Ding
Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence)
By
Abdel-Basset, Mohamed
,
Ding, Weiping
,
Hossam Hawash
,
Weiping Ding
£131
Elsewhere
£139.99
Save £8.99 (6%)
Rough Sets (International Joint Conference, IJCRS 2022, Suzhou, China, November 11–14, 2022, Proceedings (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
JingTao Yao
,
Hamido Fujita
,
Xiaodong Yue
,
Duoqian Miao
Rough Sets (International Joint Conference, IJCRS 2022, Suzhou, China, November 11–14, 2022, Proceedings (Lecture Notes in Artificial Intelligence) (Lecture Notes in Computer Science))
By
JingTao Yao
,
Hamido Fujita
,
Xiaodong Yue
,
Duoqian Miao
£66.51
Innovative Security Solutions for Information Technology and Communications (9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Ion Bica
,
Reza Reyhanitabar
Innovative Security Solutions for Information Technology and Communications (9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers (Security and Cryptology) (Lecture Notes in Computer Science))
By
Ion Bica
,
Reza Reyhanitabar
£47.88
Cybersecurity Simplified (A Guide for Beginners, Students, and Job Seekers)
By
Inderjit Singh
,
Gaurav Aroraa
Cybersecurity Simplified (A Guide for Beginners, Students, and Job Seekers)
By
Inderjit Singh
,
Gaurav Aroraa
£12.25
Elsewhere
£16.99
Save £4.74 (28%)
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Chet Hosmer
Python Forensics (A Workbench for Inventing and Sharing Digital Forensic Technology)
By
Chet Hosmer
Currently
Unavailable
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Currently
Unavailable
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Currently
Unavailable
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Exploring the Cybersecurity Landscape Through Cyber Forensics
By
Mohd Shahid Husain
Currently
Unavailable
Previous Page
1
2
3
4
5
6
7
8
Next Page
Previous Page
1
2
3
4
5
6
7
8
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies