- S-BPM ONE - Learning by Doing - Doing by Learning
- SAE and the Evolved Packet Core
- Safer @ Home with pfSense®
- Safety and Security in Multiagent Systems
- Safety Message Broadcast in Vehicular Networks
- Saia Do While
- Salesforce ADM-201 Exam Preparation
- Salesforce CRM Admin Cookbook
- Salesforce CRM: The Definitive Admin Handbook
- Salesforce Lightning Reporting and Dashboards
- Salt Cookbook
- SAN Multiprotocol Routing: An Introduction and Implementation
- Satellite Communications and Navigation Systems
- Satellite Data Compression
- Satellite Network Robust QoS-aware Routing
- SC-900 Microsoft Security, Compliance, Identity Fundamentals Complete Preparation - LATEST Version
- Scalability of Networks and Services
- Scalable Big Data Analytics for Protein Bioinformatics
- Scalable Cloud Ops with Fugue
- Scalable Network Monitoring in High Speed Networks
- Scalable Uncertainty Management
- Scams: The Ultimate Guide On How To Recognize And Avoid Them
- Scene of the Cybercrime: Computer Forensics Handbook (Enhanced Edition)
- Schaum's Outline of Computer Graphics 2/E
- Scheduling and Congestion Control for Wireless Internet
- Scheduling in Distributed Computing Systems
- Schieb-Wissen: Sicher surfen per VPN
- Science and Technologies for Smart Cities
- Science of Cyber Security
- Science: Image in Action
- Scienza delle reti
- ScreenOS Cookbook
- SDL 2009: Design for Motes and Mobiles
- SDL 2015: Model-Driven Engineering for Smart Cities
- SDL 2017: Model-Driven Engineering for Future Internet
- SDN/NFV:重构网络架构 建设未来网络
- SDN: Software Defined Networks
- Seamless and Secure Communications over Heterogeneous Wireless Networks
- Search Wonder
- Search-Based Software Engineering
- Second International Conference on Sustainable Technologies for Computational Intelligence
- Secure and Trust Computing, Data Management, and Applications
- Secure and Trustworthy Transportation Cyber-Physical Systems
- Secure Cloud Computing
- Secure Data Management
- Secure Data Management in Decentralized Systems
- Secure Group Communications Over Data Networks
- Secure IP Mobility Management for VANET
- Secure IT Systems
- Secure Key Establishment
- Secure Knowledge Management In Artificial Intelligence Era
- Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
- Secure Multi-Party Non-Repudiation Protocols and Applications
- Secure Networked Inference with Unreliable Data Sources
- Secure Programming Cookbook for C and C++
- Secure Roaming in 802.11 Networks
- Secure Searchable Encryption and Data Management
- Secure Smart Embedded Devices, Platforms and Applications
- Secure Wireless Sensor Networks
- Secure Your Node.js Web Application
- Securing Cloud and Mobility
- Securing Cloud Services
- Securing HP NonStop Servers in an Open Systems World (Enhanced Edition)
- Securing the Clicks Network Security in the Age of Social Media
- Securing the Cloud (Enhanced Edition)
- Securing the Internet of Things (Enhanced Edition)
- Securing the Internet of Things (Enhanced Edition)
- Securing the Smart Grid
- Securing VoIP (Enhanced Edition)
- Security Analytics for the Internet of Everything
- Security and Auditing of Smart Devices
- Security and Cryptography for Networks
- Security and Data Reliability in Cooperative Wireless Networks
- Security and Dependability for Ambient Intelligence
- Security and its Challenges in the 21st Century
- Security and Organization within IoT and Smart Cities
- Security and Privacy
- Security and Privacy for Mobile Healthcare Networks
- Security and Privacy in Communication Networks
- Security and Privacy in Digital Economy
- Security and Privacy in Mobile Social Networks
- Security and Privacy in New Computing Environments
- Security and Privacy in Social Networks
- Security and Privacy in Social Networks and Big Data
- Security and Resiliency Analytics for Smart Grids
- Security and Safety Interplay of Intelligent Software Systems
- Security and the Networked Society
- Security and Trust Management
- Security Assessment in Vehicular Networks
- Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP
- Security CCNA 210-260. Zostań administratorem sieci komputerowych Cisco
- Security Convergence
- Security Designs for the Cloud, IoT, and Social Networking
- Security for Microsoft Windows System Administrators
- Security for Multi-hop Wireless Networks
- Security for Telecommunications Networks
- Security for Wireless Sensor Networks
- Security in Computer and Information Sciences
- Security in Computing and Communications
- Security in Distributed, Grid, Mobile, and Pervasive Computing
- Security in Emerging Wireless Communication and Networking Systems
- Security in IoT-Enabled Spaces
- Security in Network Coding
- Security in Network Functions Virtualization (Enhanced Edition)
- Security in Wireless Mesh Networks
- Security in Wireless Sensor Networks
- Security Information and Event Management (SIEM) Implementation
- Security Management of Next Generation Telecommunications Networks and Services
- Security Metrics, a Beginner's Guide
- Security Monitoring
- Security of Industrial Control Systems and Cyber Physical Systems
- Security of Industrial Control Systems and Cyber-Physical Systems
- Security of Networks and Services in an All-Connected World
- Security Planning and Disaster Recovery
- Security Power Tools
- Security Protocols
- Security Protocols XXII
- Security Protocols XXIII
- Security Protocols XXIV
- Security Protocols XXVI
- Security Protocols XXVII
- Security Sage's Guide to Hardening the Network Infrastructure
- Security Standardisation Research
- Security Warrior
- Security without Obscurity
- Security, Privacy and Anonymity in Computation, Communication and Storage
- Security, Privacy and Trust in the IoT Environment
- Security, Privacy, and Anonymity in Computation, Communication, and Storage
- Security, Privacy, and Applied Cryptography Engineering
- Security, Privacy, and Digital Forensics in the Cloud
- Security-aware Cooperation in Cognitive Radio Networks
- Security-Aware Design for Cyber-Physical Systems
- Security-Aware Device-to-Device Communications Underlaying Cellular Networks
- Security-Enriched Urban Computing and Smart Grid
- Seeking SRE
- Segurança em Redes sem Fio
- Segurança na computação em nuvem
- Selected Areas in Cryptography
- Selected Areas in Cryptography – SAC 2018
- Selected Areas in Cryptography – SAC 2019
- Self-* and P2P for Network Management
- Self-Organized Lightwave Networks
- Self-Organizing Systems
- SELinux Cookbook
- Semantic Grid: Model, Methodology, and Applications
- Semantic Systems. The Power of AI and Knowledge Graphs
- Semantic Web
- Semantic Web and Peer-to-Peer
- Semantic Web Collaborative Spaces
- Semantic Web Services
- Semantic Web Services for Web Databases
- Semantic Web Services, Processes and Applications
- Semantic Web-based Intelligent Geospatial Web Services
- Semantics in Data and Knowledge Bases
- Semantics, Analytics, Visualization. Enhancing Scholarly Data
- Semi-Blind Carrier Frequency Offset Estimation and Channel Equalization
- Sendmail
- Sensing and Systems in Pervasive Computing
- Sensor and Ad-Hoc Networks
- Sensor Networks
- Sensor Networks and Configuration
- Sensor Networks and Signal Processing
- Sensor Networks with IEEE 802.15.4 Systems
- Sensor Systems and Software
- Sensors, Cloud, and Fog
- Sentinel
- SEO Básico
- Sequence Data Mining
- Sequences and Their Applications - SETA 2014
- Sequences, Subsequences, and Consequences
- Sequential Learning and Decision-Making in Wireless Resource Management
- Serial Communication over RTP/CDP
- Serious Games
- Server Architectures (Enhanced Edition)
- Server im Internet und ihre Dienste
- Serverless Computing Using Azure Functions: Build, Deploy, Automate, and Secure Serverless Applicati...
- Serverless Security
- Serverless Single Page Apps
- Service Computing: Concept, Method and Technology
- Service Level Agreements for Cloud Computing
- Service Orchestration as Organization (Enhanced Edition)
- Service Quality of Cloud-Based Applications
- Service-Oriented and Cloud Computing
- Service-Oriented Computing
- Service-Oriented Computing - ICSOC 2007
- Service-Oriented Computing - ICSOC 2007 Workshops
- Service-Oriented Computing - ICSOC 2008
- Service-Oriented Computing – ICSOC 2015 Workshops
- Service-Oriented Computing – ICSOC 2016 Workshops
- Service-Oriented Computing – ICSOC 2018 Workshops
- Service-Oriented Computing – ICSOC 2019 Workshops
- Service-Oriented Computing: Agents, Semantics, and Engineering
- Services Computing – SCC 2018
- Services Computing – SCC 2019
- Services Computing – SCC 2020
- Services – SERVICES 2020