- P2P Networking and Applications
- Packet Analysis with Wireshark
- Packet Forwarding Technologies
- Packet Guide to Core Network Protocols
- Packet Guide to Routing and Switching
- Packet Guide to Voice over IP
- Packet Tracer Network Simulator
- PacketCable Implementation
- Palo Alto Networks
- Palo Bytes
- Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology
- Parallel Algorithms and Cluster Computing
- Parallel and Distributed Computing and Networks
- Parallel and Distributed Computing, Applications and Technologies
- Parallel and Distributed Map Merging and Localization
- Parallel Architectures, Algorithms and Programming
- Parallel Computational Fluid Dynamics '93 (Enhanced Edition)
- Parallel Computational Fluid Dynamics '95 (Enhanced Edition)
- Parallel Computational Fluid Dynamics 2006
- Parallel Computational Technologies
- Parallel Computer Architecture (Enhanced Edition)
- Parallel Computing
- Parallel Computing Hits the Power Wall
- Parallel Computing Technologies
- Parallel Processing and Applied Mathematics
- Parallel Programming
- Parallel Programming in OpenMP
- Parallele Programmierung
- Part Two: Unifying Continuous Performance Management and Insider Threat Prevention Cyber Security
- Passive and Active Measurement
- Passive and Active Network Measurement
- Passive Network Synthesis
- Passive Optical Networks (Enhanced Edition)
- Pattern Recognition
- Pattern Recognition and Artificial Intelligence
- Pattern Recognition and Computer Vision
- Pattern Recognition and Machine Intelligence
- Pattern Recognition Applications and Methods
- Pattern Recognition. ICPR International Workshops and Challenges
- PC Interfacing
- PC Interfacing and Data Acquisition
- Peer-to-Peer
- Peer-to-Peer Computing
- Peer-to-Peer Computing for Mobile Networks
- Peer-to-Peer Video Streaming
- Peer-to-Peer-Netzwerke
- Penetration Testing Bootcamp
- Penetration Testing For Dummies
- Penetration Testing with BackBox
- Penetration Testing with Kali Linux: Learn Hands-on Penetration Testing Using a Process-Driven Frame...
- Penetration Testing with Raspberry Pi
- Pentesting Azure Applications
- People-Centric Security: Transforming Your Enterprise Security Culture
- PeopleSoft HRMS Interview Questions, Answers, and Explanations
- Perception, Representations, Image, Sound, Music
- Perfect Letters and Emails for All Occasions
- Performance Analysis of Computer Networks
- Performance Analysis of Network Architectures
- Performance Evaluation and Benchmarking for the Era of Cloud(s)
- Performance Evaluation for Network Services, Systems and Protocols
- Performance Evaluation Models for Distributed Service Networks
- Performancemanagement für serviceorientierte Java-Anwendungen
- Personal Branding - Market Yourself!
- Personal Satellite Services
- Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems
- Perspectives of System Informatics
- Persuasive Technology
- Persuasive Technology. Designing for Future Change
- Pervasive Collaborative Networks
- Pervasive Communications Handbook
- Pervasive Computing
- Pervasive Computing
- Pervasive Computing Paradigms for Mental Health
- Pervasive Computing: A Networking Perspective and Future Directions
- Pervasive Social Computing
- Pervasive Systems, Algorithms and Networks
- Pervasive Wireless Environments: Detecting and Localizing User Spoofing
- Petri Nets for Modeling of Large Discrete Systems
- PHP in a Nutshell
- Physical Layer Approaches for Securing Wireless Communication Systems
- Physical Layer Security
- Physical Layer Security in Random Cellular Networks
- Physical Layer Security in Wireless Cooperative Networks
- Physical-Layer Security and Quantum Key Distribution
- Physical-Layer Security for Cooperative Relay Networks
- Physiological Computing Systems
- Pipeline as Code
- Piraté
- PKI: Implementing & Managing E-Security
- Planificación de proyectos de implantación de infraestructuras de redes telemáticas
- Planning for IPv6
- Play Therapy Treatment Planning and Interventions (Enhanced Edition)
- PMO. Praktyka zarządzania projektami i portfelem projektów w organizacji
- Podstawy ochrony komputerów
- Policy-Based Autonomic Data Governance
- Policy-Based Network Management (Enhanced Edition)
- Ponte al mando de Airport, Wi-Fi para Mac, iPhone e iPad
- Ponte al mando de comunicación segura con Mail para Mac, iPhone, iPad
- Ponte al mando de Parallels Desktop 13
- Post-Quantum Cryptography
- Postfix: The Definitive Guide
- PostgreSQL Administration Essentials
- Potential Game Theory
- Potential-Based Analysis of Social, Communication, and Distributed Networks
- Power Analysis Attacks
- Power, Thermal, Noise, and Signal Integrity Issues on Substrate/Interconnects Entanglement
- PowerShell for Microsoft SharePoint 2010 Administrators
- PowerShell Troubleshooting Guide
- Practical AI on the Google Cloud Platform
- Practical Artificial Intelligence
- Practical Aspects of Declarative Languages
- Practical Azure Functions
- Practical Bot Development
- Practical Channel-Aware Resource Allocation
- Practical Cloud Security
- Practical Contiki-NG
- Practical Deployment of Cisco Identity Services Engine (ISE)
- Practical DevOps
- Practical Guide to Salesforce Communities
- Practical Industrial Data Communications (Enhanced Edition)
- Practical Industrial Data Networks (Enhanced Edition)
- Practical Internet Security
- Practical IoT Hacking
- Practical IPv6 for Windows Administrators
- Practical Linux Infrastructure
- Practical Load Balancing
- Practical Microservices
- Practical Microsoft Azure IaaS
- Practical Mobile Forensics - Second Edition
- Practical Mobile Forensics - Third Edition
- Practical Modern SCADA Protocols (Enhanced Edition)
- Practical Network Automation
- Practical Network Scanning
- Practical Network Security
- Practical Network Scanning
- Practical Network Security
- Practical Packet Analysis, 3rd Edition
- Practical Smart Device Design and Construction
- Practical Social Network Analysis with Python
- Practical TCP/IP and Ethernet Networking for Industry (Enhanced Edition)
- Practical Tinker Board
- Practical XMPP
- Praktyczne projekty sieciowe
- Praxisratgeber - Windows 8 und Windows Server 2012
- Precision Assembly in the Digital Age
- Precoding Techniques for Digital Communication Systems
- PRedictive Intelligence in MEdicine
- Preparing for the Next Cyber Revolution
- Preserving Privacy Against Side-Channel Leaks
- Preserving Privacy in On-Line Analytical Processing (OLAP)
- PRICAI 2016: Trends in Artificial Intelligence
- PRICAI 2018: Trends in Artificial Intelligence
- PRICAI 2019: Trends in Artificial Intelligence
- PRICAI 2021: Trends in Artificial Intelligence
- PRIMA 2018: Principles and Practice of Multi-Agent Systems
- Prince 2 Foundation Préparation Complète
- Principles and Practice of Constraint Programming
- Principles and Practices of Interconnection Networks (Enhanced Edition)
- Principles of Computer Systems and Network Management
- Principles of Distributed Systems
- Principles of Modeling
- Principles of Protocol Design
- Principles of Security and Trust
- Principles of Synchronous Digital Hierarchy
- Privacy and Identity in a Networked Society
- Privacy and Identity Management for Life
- Privacy and Identity Management. The Smart Revolution
- Privacy Enhancing Technologies
- Privacy in a Digital, Networked World
- Privacy Preserving Data Mining
- Privacy Vulnerabilities and Data Security Challenges in the IoT
- Privacy, Security and Trust within the Context of Pervasive Computing
- Privacy-Enhancing Aggregation Techniques for Smart Grid Communications
- Privacy-Respecting Intrusion Detection
- Private Cloud Computing
- Pro DevOps with Google Cloud Platform
- Pro DNS and BIND
- Pro DNS and BIND 10
- Pro Java Clustering and Scalability
- Pro PowerShell for Amazon Web Services
- Pro PowerShell for Microsoft Azure
- Pro SharePoint 2013 Business Intelligence Solutions
- Problem Solving for Wireless Sensor Networks
- Problem-solving in High Performance Computing
- Proceedings of COOP 2010
- Proceedings of Emerging Trends and Technologies on Intelligent Systems
- Proceedings of Fifth International Congress on Information and Communication Technology
- Proceedings of Integrated Intelligence Enable Networks and Computing
- Proceedings of International Conference on Communication and Computational Technologies
- Proceedings of International Conference on Communication, Circuits, and Systems
- Proceedings of International Conference on Computer Science and Information Technology
- Proceedings of International Conference on Internet Computing and Information Communications
- Proceedings of International Symposium on Sensor Networks, Systems and Security
- Proceedings of Second International Conference on Computing, Communications, and Cyber-Security
- Proceedings of the 2015 International Conference on Communications, Signal Processing, and Systems
- Proceedings of the 3rd European Conference on Computer Network Defense
- Proceedings of the 4th International Conference on Computer Engineering and Networks
- Proceedings of the 7th International Conference on Emerging Databases
- Proceedings of the 9th International Conference on Computer Engineering and Networks
- Proceedings of the European Computing Conference