- Principles of Synchronous Digital Hierarchy
- Principles of the Spin Model Checker
- Principles of Transaction Processing (Enhanced Edition)
- Principles of VLSI RTL Design
- Principles of War for Cyberspace: Cultures of Strategy in Cyberspace, Clausewitzian Cyberthink, Sun ...
- Principles of Web Design
- Principles, Strategies, Tools for Design Thinking
- Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Genera...
- Princípios de lógica de programação
- Princípios de Orientação a Objetos em JavaScript
- Print On Demand Profits
- Print vs. Digital
- Print Your Own Booklet Using Microsoft Word
- Printing in Plastic
- Prioritising Business Processes
- Privacidad es poder
- Privacy
- Privacy and Anonymity in Information Management Systems
- Privacy and Big Data
- Privacy and Capitalism in the Age of Social Media
- Privacy and Data Protection Challenges in the Distributed Era
- Privacy and Data Protection in Software Services
- Privacy and Data Protection Issues of Biometric Applications
- Privacy and Data Protection Seals
- Privacy and Freedom Insights
- Privacy and Identity in a Networked Society
- Privacy and Identity Management
- Privacy and Identity Management for the Future Internet in the Age of Globalisation
- Privacy and Identity Management. Facing up to Next Steps
- Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data
- Privacy and Identity Management. The Smart Revolution
- Privacy and Identity Management. Time for a Revolution?
- Privacy and Personality
- Privacy and Security for Cloud Computing
- Privacy and Security in the 21st Century
- Privacy and Security Issues in Big Data
- Privacy and Security Issues in Data Mining and Machine Learning
- Privacy and Security of Modern Technology
- Privacy and Technologies of Identity
- Privacy e sicurezza online: questa sconosciuta
- Privacy in a Digital, Networked World
- Privacy in America
- Privacy in Dynamical Systems
- Privacy in Statistical Databases
- Privacy in the Age of Big Data
- Privacy Is Hard and Seven Other Myths
- Privacy is Power
- Privacy Online
- Privacy Online: The Practical Privacy Guide For Anyone
- Privacy Preserving Data Mining
- Privacy Research and Best Practices
- Privacy Technologies and Policy
- Privacy Vulnerabilities and Data Security Challenges in the IoT
- Privacy, Data Protection and Cybersecurity in Europe
- Privacy, Due Process and the Computational Turn
- Privacy, Security and Trust within the Context of Pervasive Computing
- Privacy, Security, and Trust in KDD
- Privacy-Enhancing Aggregation Techniques for Smart Grid Communications
- Privacy-Enhancing Fog Computing and Its Applications
- Privacy-Invading Technologies and Privacy by Design
- Privacy-Preserving Data Mining
- Privacy-Preserving Deep Learning
- Privacy-Respecting Intrusion Detection
- Private Cloud Computing
- Private Data and Public Value
- Private Investigation and Homeland Security
- Private Label Rights: The Basics
- Private Security and the Law
- Privately and Publicly Verifiable Computing Techniques
- Privatsphäre durch die Delegation von Rechten
- Privilege Escalation Techniques
- Privileged Access Management for Secure Storage Administration: IBM Spectrum Scale with IBM Security...
- Privileged Attack Vectors
- Pro (IBM) WebSphere Application Server 7 Internals
- Pro .NET 1.1 Remoting, Reflection, and Threading
- Pro .NET 2.0 Code and Design Standards in C#
- Pro .NET 2.0 Extreme Programming
- Pro .NET 2.0 Graphics Programming
- Pro .NET 2.0 Windows Forms and Custom Controls in C#
- Pro .NET 2.0 XML
- Pro .NET 4 Parallel Programming in C#
- Pro .NET 5 Custom Libraries
- Pro .NET Benchmarking
- Pro .NET Best Practices
- Pro .NET Framework with the Base Class Library
- Pro .NET Memory Management
- Pro .NET Performance
- Pro Access 2007
- Pro Access 2010 Development
- Pro Active Record
- Pro ADO.NET 2.0
- Pro ADO.NET Data Services
- Pro Agile .NET Development with SCRUM
- Pro Ajax and Java Frameworks
- Pro Ajax and the .NET 2.0 Platform
- Pro Android
- Pro Android 2
- Pro Android 3
- Pro Android 4
- Pro Android 5
- Pro Android Apps Performance Optimization
- Pro Android Augmented Reality
- Pro Android C++ with the NDK
- Pro Android Games
- Pro Android Graphics
- Pro Android Media
- Pro Android Python with SL4A
- Pro Android UI
- Pro Android Wearables
- Pro Android Web Apps
- Pro Android Web Game Apps
- Pro Android with Kotlin
- Pro Angular
- Pro Angular 6
- Pro Angular 9
- Pro AngularJS
- Pro Apache Ant
- Pro Apache Beehive
- Pro Apache Geronimo
- Pro Apache Hadoop
- Pro Apache JMeter
- Pro Apache Log4j
- Pro Apache NetBeans
- Pro Apache Phoenix
- Pro Apache Struts with Ajax
- Pro Apache Tomcat 6
- Pro Apache XML
- Pro Application Lifecycle Management with Visual Studio 2012
- Pro Arduino
- Pro ASP.NET 1.1 in VB .NET
- Pro Arduino
- Pro ASP.NET 1.1 in VB .NET
- Pro ASP.NET 2.0 in VB 2005
- Pro ASP.NET 2.0 Website Programming
- Pro ASP.NET 3.5 Server Controls and AJAX Components
- Pro ASP.NET 4 CMS
- Pro ASP.NET 4 in C# 2010
- Pro ASP.NET 4 in VB 2010
- Pro ASP.NET 4.5 in C#
- Pro ASP.NET 4.5 in VB
- Pro ASP.NET Core 3
- Pro ASP.NET Core Identity
- Pro ASP.NET Core MVC
- Pro ASP.NET Core MVC 2
- Pro ASP.NET Extensibility
- Pro ASP.NET MVC 2 Framework
- Pro ASP.NET MVC 3 Framework
- Pro ASP.NET MVC 4
- Pro ASP.NET MVC 5
- Pro ASP.NET MVC 5 Platform
- Pro ASP.NET MVC Framework
- Pro ASP.NET SharePoint 2010 Solutions
- Pro ASP.NET SignalR
- Pro ASP.NET Web API
- Pro ASP.NET Web API Security
- Pro Asynchronous Programming with .NET
- Pro Azure Administration and Automation
- Pro Azure Governance and Security
- Pro Bash Programming
- Pro Bash Programming, Second Edition
- Pro BizTalk 2006
- Pro BizTalk 2009
- Pro Business Applications with Silverlight 4
- Pro Business Applications with Silverlight 5
- Pro C# 2005 and the .NET 2.0 Platform
- Pro C# 2010 and the .NET 4 Platform
- Pro C# 5.0 and the .NET 4.5 Framework
- Pro C# 8 with .NET Core 3
- Pro C# 9 with .NET 5
- Pro C# with .NET 3.0, Special Edition
- Pro CDI 2 in Java EE 8
- Pro Continuous Delivery
- Pro Core Data for iOS
- Pro Core Data for iOS, Second Edition
- Pro Couchbase Development
- Pro Couchbase Server
- Pro Cryptography and Cryptanalysis
- Pro Cryptography and Cryptanalysis with C++20
- Pro Crystal Enterprise / BusinessObjects XI Programming
- Pro CSS and HTML Design Patterns
- Pro CSS for High Traffic Websites
- Pro CSS3 Animation
- Pro CSS3 Layout Techniques
- Pro D3.js
- Pro Data Backup and Recovery
- Pro Data Visualization using R and JavaScript
- Pro Data Visualization Using R and JavaScript
- Pro DAX with Power BI
- Pro Deep Learning with TensorFlow
- Pro Design Patterns in Swift
- Pro DevOps with Google Cloud Platform
- Pro Django
- Pro DLR in .NET 4
- Pro DNS and BIND