- Deep Learning with Applications Using Python
- Deep Learning with Azure
- Deep Learning with Hadoop
- Deep Learning with Keras
- Deep Learning with Keras: Beginner’s Guide to Deep Learning with Keras
- Deep Learning with Microsoft Cognitive Toolkit Quick Start Guide
- Deep Learning with Python
- Deep Learning With Python Illustrated Guide For Beginners & Intermediates
- Deep Learning With Python Illustrated Guide For Beginners & Intermediates: The Future Is Here!
- Deep Learning with PyTorch Quick Start Guide
- Deep Learning with R
- Deep Learning with R Cookbook
- Deep Learning with R for Beginners
- Deep Learning with TensorFlow
- Deep Learning with TensorFlow 2 and Keras
- Deep Learning with Theano
- Deep Learning-Based Approaches for Sentiment Analysis
- Deep Learning. Praca z językiem Python i biblioteką Keras
- Deep Learning. Praktyczne wprowadzenie
- Deep Learning. Receptury
- Deep Learning. Uczenie głębokie z językiem Python. Sztuczna inteligencja i sieci neuronowe
- Deep Learning: Algorithms and Applications
- Deep Learning: An Essential Guide to Deep Learning for Beginners Who Want to Understand How Deep Neu...
- Deep Learning: Concepts and Architectures
- Deep Learning: Convergence to Big Data Analytics
- Deep learning: deep learning explained to your granny – a guide for beginners
- Deep Learning: Fundamentals, Theory and Applications
- Deep Learning: Practical Neural Networks with Java
- Deep Neural Networks
- Deep Neural Networks in a Mathematical Framework
- Deep Neuro-Fuzzy Systems with Python
- Deep Reinforcement Learning
- Deep Reinforcement Learning for Wireless Networks
- Deep Reinforcement Learning Hands-On
- Deep Search: How to Explore the Internet More Effectively
- Deep Tech
- Deep thinking
- Deep Web for Journalists: Comms, Counter-Surveillance, Search
- Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond
- Deepfakes
- Defending IoT Infrastructures with the Raspberry Pi
- Defending Your Computer from Hackers and Spammers
- Defending Yourself from Hackers and Spammers
- Defense In Depth: An Impractical Strategy for a Cyber-World
- Defense Industry Applications of Autonomous Agents and Multi-Agent Systems
- Defensive Tactics for Today’s Law Enforcement
- Definindo Escopo em Projetos de Software
- Definitive Guide to Arm Cortex-M23 and Cortex-M33 Processors (Enhanced Edition)
- Definitive MPLS Network Designs
- Deformable Models
- Deformers and Influence
- Defying Reality
- Degrees of Belief
- Dehumanisierung der Kriegführung
- Dehumanization of Warfare
- Dein Samsung Galaxy S6
- Dein Samsung Galaxy S8 und S8+
- Dein Smartphone mit Android 10
- Del bit a la Nube
- Del clic al tap
- Delay and Disruption Tolerant Networks
- Delay Differential Equations
- Delay Tolerant Networks
- Delete
- Delete Me
- Delft Pneumatic Bipeds
- Deliberation, Representation, Equity
- Delicje i łakocie
- Deliver Modern UI for IBM BPM with the Coach Framework and Other Approaches
- Delivering Applications with VMware App Volumes 4
- Delivering Consistency and Automation with Operational Runbooks
- Delivering IT and eBusiness Value
- Delivering on Digital
- Delivering Police Services Effectively
- Delivering the General Curriculum: Pre-Service Teacher Perspectives Regarding a Technological Approa...
- Delphi Cookbook
- Delphi in a Nutshell
- Delphi Programming: Questions and Answers
- Delphi Programming: Questions and Answers (2020 Edition)
- Delphi XE Development Essentials
- Delta from SAP ERP Financials to SAP S/4HANA Finance
- Dem Computer ins Hirn geschaut
- Demand Planning with SAP APO - Concepts and Design
- Demand Planning with SAP APO - Execution
- Demand-Driven Associative Classification
- Demand-Driven Replenishment in SAP Purchasing (MM)
- Dementia Lab 2019. Making Design Work: Engaging with Dementia in Context
- Democracy after the Internet - Brazil between Facts, Norms, and Code
- Democracy Hacked
- Democratization of Artificial Intelligence for the Future of Humanity
- Democratization of Expertise
- Demographic Change and Economic Growth
- Demonstrating Design for Six Sigma
- Demystifying Internet of Things Security
- Demystifying Smart Cities
- Demystifying the Brain
- Demystifying the Microchip PIC Microcontroller for Engineering Students
- Den digitala arbetsplatsen - Strategi och design
- Den store tech-revolution
- Den tredje AI-vågen
- Denk en investeer als Warren Buffett
- Denoising of Photographic Images and Video
- Dense and Green Building Typologies
- Dense Image Correspondences for Computer Vision
- Dental Image Analysis for Disease Diagnosis
- Dental Image Processing for Human Identification
- Dentsply GAC/ Pride Offer Practice Management
- Deontic Logic in Computer Science
- Department: Job Accommodation.
- Department: K-12 (ITDV01N# K12).
- Department: K-12.
- Dependability Engineering and Complex Systems
- Dependability in Electronic Systems
- Dependability in Sensor, Cloud, and Big Data Systems and Applications
- Dependability Metrics
- Dependability of Networked Computer-based Systems
- Dependable and Adaptable Networks and Services
- Dependable Computer Systems
- Dependable and Adaptable Networks and Services
- Dependable Computer Systems
- Dependable Computing
- Dependable Computing - EDCC 2020 Workshops
- Dependable Computing - EDCC 2021 Workshops
- Dependable Embedded Systems
- Dependable Multicore Architectures at Nanoscale
- Dependable Software Engineering. Theories, Tools, and Applications
- Dependable Software Engineering: Theories, Tools, and Applications
- Dependence in Probability and Statistics
- Dependencies among Software Development Teams. Coordination, Communication and Collaboration
- Dependency Injection in .NET Core 2.0
- Dependency Injection in Java
- Dependency Structures and Lexicalized Grammars
- Deploy Containers on AWS
- Deployable Machine Learning for Security Defense
- Deploying a Cloud on IBM System z
- Deploying a Database Instance in an IBM Cloud Private Cluster on IBM Z
- Deploying AI in the Enterprise
- Deploying Chromebooks in the Classroom
- Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services (Enhan...
- Deploying Cloud Components on POWER
- Deploying Microsoft 365 Teamwork: Exam MS-300 Guide
- Deploying Microsoft System Center Configuration Manager
- Deploying Microsoft® Forefront® Protection 2010 for Exchange Server
- Deploying Microsoft® Forefront® Threat Management Gateway 2010
- Deploying Microsoft® Forefront® Unified Access Gateway 2010
- Deploying Node.js
- Deploying PowerHA Solution with AIX HyperSwap
- Deploying Raspberry Pi in the Classroom
- Deploying SAP Software in Red Hat OpenShift on IBM Power Systems
- Deploying Secure Containers for Training and Development
- Deploying SharePoint 2016
- Deploying WebSphere Business Process Management V7 in Secured Production Environments
- Deploying Windows Sharepoint Services
- Deployment and Usage Guide for Running AI Workloads on Red Hat OpenShift and NVIDIA DGX Systems with...
- Deployment of Rare Earth Materials in Microware Devices, RF Transmitters, and Laser Systems
- Der 'Browser-Krieg' - eine wettbewerbsstrategische Analyse
- Der Architekturreview
- Der Blick in den See
- Der Chief Digital Officer
- Der Computer - Mein Lebenswerk
- Der Computer erscheint im Holozän
- Der Cumulus-Praktiker
- Der Cyber Survival Guide
- Der Cyber-Effekt
- Der Cyber-Versicherungsmarkt in Deutschland
- Der digitale Prototyp
- Der dritte Parameter und die asymmetrische Varianz
- Der Einfluss des Internets auf Intermediäre im Tourismus
- Der Einfluss von 'Big Data'. Eine Revolution ohne Entkommen?
- Der Einsatz von Dock&Yard Management im Schnittstellenmanagement
- Der ERP-Irrglaube im Mittelstand
- Der IT Business Case
- Der IT Security Manager
- Der Lächerlich Einfache Leitfaden Für Die Apple Watch Series 4
- Der lächerlich einfache Leitfaden für Google Apps (G Suite)
- Der lächerlich einfache Leitfaden für Google Docs