- S-BPM ONE - Learning by Doing - Doing by Learning
- SAE and the Evolved Packet Core
- Safe C++
- Safe Robot Navigation Among Moving and Steady Obstacles (Enhanced Edition)
- Sails.js Essentials
- Sails.js in Action
- Sakai OAE Deployment and Management
- SalesForce Guide
- Salesforce.com Lightning Process Builder and Visual Workflow
- Salt Open
- Samsung Galaxy S20 For Seniors
- Samsung Galaxy S20 Learners Guide
- SAP ABAP Advanced Cookbook
- SAP für Java-Entwickler
- SAP List Viewer (ALV)
- SAP Security Configuration and Deployment
- Sarbanes-Oxley IT Compliance Using Open Source Tools (Enhanced Edition)
- SAS for R Users
- SAS Programming and Data Visualization Techniques
- SAS Programming for Enterprise Guide Users, Second Edition
- SAS Programming with Medicare Administrative Data
- Sass and Compass Designer's Cookbook
- Sass and Compass for Designers
- Sass, Compass et Less par la pratique
- Satellite and Terrestrial Radio Positioning Techniques (Enhanced Edition)
- Savegame
- SC-900 Microsoft Security, Compliance, Identity Fundamentals Complete Preparation - LATEST Version
- Scala
- Scala Cookbook
- Scala Data Analysis Cookbook
- Scala Design Patterns
- Scala Design Patterns.
- Scala for Data Science
- Scala for Java Developers
- Scala for Machine Learning
- Scala Functional Programming Patterns
- Scala High Performance Programming
- Scala in Action
- Scala in Depth
- Scala Microservices
- Scala Programming for Big Data Analytics
- Scala Reactive Programming
- Scala: From a Functional Programming Perspective
- Scala:Applied Machine Learning
- Scalability Patterns
- Scalable Uncertainty Management
- Scale Space and Variational Methods in Computer Vision
- Scaling OpenMP for Exascale Performance and Portability
- Scattering, Natural Surfaces, and Fractals
- Schauplatz Computerspiele
- Scheduling for Parallel Processing
- Schnelleinstieg App Usability
- Schnellstart Python
- Scientific and Statistical Database Management
- Scientific Computing and Algorithms in Industrial Simulations
- Scientific Computing with Scala
- Scientific Computing, Computer Arithmetic, and Validated Numerics
- Scientific Programming: C-Language, Algorithms and Models in Science
- Scilab : De la théorie à la pratique
- Scilab : De la théorie à la pratique - II. Modéliser et simuler avec Xcos
- SciPy and NumPy
- Scratch
- Scratch + Ready-Steady-Code: Flip Card Projects For 8-12 Year Olds
- Scratch 2.0 Beginner's Guide Second Edition
- Scratch 2.0少儿游戏趣味编程
- Scratch bez tajemnic. Programowanie gier od podstaw
- Scratch by Example
- Scratch Cookbook
- Scratch Programming in easy steps
- Scratch本格入門 命令機能詳細・プログラミング作法・デバッグがわかる
- Scripting in Java
- Scroll Views
- Scroll Views in iOS 12
- Scrum 360
- Scrum pour les Nuls
- Scrum. Schnelleinstieg (3. Aufl.)
- SDL '97: Time for Testing
- SDL '99
- SDL 2007: Design for Dependable Systems
- SDL 2009: Design for Motes and Mobiles
- SDL 2015: Model-Driven Engineering for Smart Cities
- SDL 2017: Model-Driven Engineering for Future Internet
- SDL Game Development
- Seam in Action
- Search and Optimization by Metaheuristics
- Search Based Software Engineering
- Search Computing
- Search Engine Optimization: How to Make your Site Stand Out from the Apocalyptic Horde
- Search-Based Software Engineering
- Searching & Sorting for Coding Interviews
- Secret Recipes of the Python Ninja
- Secrets of the JavaScript Ninja
- Secrets to Good Habits
- Secure and Resilient Software Development
- Secure and Trust Computing, Data Management, and Applications
- Secure IT Systems
- Secure Programming Cookbook for C and C++
- Securing Hadoop
- Securing Office 365
- Securing PHP Apps
- Securing SQL Server
- Security and Cryptography for Networks
- Security and Privacy in Ad-hoc and Sensor Networks
- Security and Privacy in Mobile Information and Communication Systems
- Security and Trust Management
- Security for Software Engineers
- Security for Web Developers
- Security in E-Learning
- Security of Industrial Control Systems and Cyber-Physical Systems
- Security Protocols
- Security Standardisation Research
- Security with Noisy Data
- Security, Privacy, and Anonymity in Computation, Communication, and Storage
- Security, Privacy, and Applied Cryptography Engineering
- Selected Areas in Cryptography
- Selected Areas in Cryptography - SAC 2015
- Selected Areas in Cryptography -- SAC 2013
- Selected Areas in Cryptography -- SAC 2014
- Selected Areas in Cryptography – SAC 2016
- Selectors, Specificity, and the Cascade
- Selenium Design Patterns and Best Practices
- Selenium Interview Questions & Answers
- Selenium Testing Tools Interview Questions You'll Most Likely Be Asked
- Selenium WebDriver
- Selenium WebDriver Quick Start Guide
- Selenium WebDriver Recipes in C#
- Selenium Webdriver: Book1
- Selenium: Questions and Answers
- Self-Service AI with Power BI Desktop
- Self-Sustaining Systems
- Semantic Computing
- Semantic Management of Middleware
- Semantic Web for the Working Ontologist (Enhanced Edition)
- Semantic Web, Ontologies and Databases
- Semantics and Algebraic Specification
- Semantics of Probabilistic Processes
- Semantics with Applications: An Appetizer
- Semantics, Logics, and Calculi
- Semantics-Oriented Natural Language Processing
- Sencha Architect App Development
- Sencha Touch 2 Mobile JavaScript Framework
- Sencha Touch 2 Up and Running
- Sencha Touch in Action
- Sencha Touch: Questions and Answers
- Sensing Vehicle Conditions for Detecting Driving Behaviors
- Sensor Applications, Experimentation, and Logistics
- Sensor Technologies
- Sensor Technology Handbook
- Sensors: Theory, Algorithms, and Applications
- Sensory Systems