- Dark Web Investigation
- Das Android Tablet-Buch
- Das globale Netz
- Das große inoffizielle FRITZ!Box-Handbuch
- Das Internet der Dinge
- Das Internet der Dinge und Künstliche Intelligenz als Game Changer
- Das passende Handbuch Kindle Fire und Kindle Fire HD - Mit Anleitungen, Apps, Tipps und Tricks, um m...
- Data Acquisition Techniques Using PCs
- Data Analysis and Optimization for Engineering and Computing Problems
- Data Analytics
- Data Analytics and Management in Data Intensive Domains
- Data Analytics for Renewable Energy Integration. Technologies, Systems and Society
- Data Analytics for Renewable Energy Integration: Informing the Generation and Distribution of Renewa...
- Data Analytics in Digital Humanities
- Data Analytics in the Era of the Industrial Internet of Things
- Data and Applications Security and Privacy XXIX
- Data and Applications Security and Privacy XXV
- Data and Applications Security and Privacy XXXI
- Data and Applications Security and Privacy XXXIV
- Data and Applications Security and Privacy XXXV
- Data and Information in Online Environments
- Data Center Networks
- Data Center Storage
- Data Driven e-Science
- Data Engineering on Azure
- Data Governance: The Definitive Guide
- Data Infrastructure Management
- Data Integration in the Life Sciences
- Data Management in Grid and Peer-to-Peer Systems
- Data Management on New Hardware
- Data Mining and Big Data
- Data Mining and Knowledge Discovery Handbook
- Data Mining Techniques in Sensor Networks
- Data Networks (Enhanced Edition)
- Data Pipelines with Apache Airflow
- Data Privacy Management and Autonomous Spontaneous Security
- Data Processing and Modeling with Hadoop: Mastering Hadoop Ecosystem Including ETL, Data Vault, DMBo...
- Data Protection and Privacy in Healthcare
- Data Science
- Data Science and Analytics
- Data Science and Big Data Computing
- Data Science and Security
- Data Science for Business Professionals: A Practical Guide for Beginners
- Data Security in Cloud Storage
- Data Streams
- Data Transmission at Millimeter Waves
- Data Warehousing and Data Mining Techniques for Cyber Security
- Data Warehousing and Knowledge Discovery
- Data-Driven Mining, Learning and Analytics for Secured Smart Cities
- Database and Expert Systems Applications
- Database and Expert Systems Applications - DEXA 2021 Workshops
- Database and XML Technologies
- Database Systems for Advanced Applications
- Database Systems for Advanced Applications. DASFAA 2021 International Workshops
- Databases Theory and Applications
- Databases, Information Systems, and Peer-to-Peer Computing
- Datenschutzaufsicht nach der EU-Datenschutz-Grundverordnung
- Day One: ADVPN Design and Implementation
- Day One: Amazon Web Services with vSRX Cookbook
- Day One: Automating Junos with Salt
- Day One: Automating Junos® with Ansible, 2nd Edition
- Day One: Building Containers with Docker and the cSRX
- Day One: Building Containers with Docker and the cSRX
- Day One: Building Containers with Kubernetes and Contrail
- Day One: Configuring EX Series Ethernet Switches, Second Edition
- Day One: Configuring Segment Routing with Junos
- Day One: Data Center Fundamentals
- Day One: Deploying BGP Routing Security
- Day One: Deploying Junos Route Servers
- Day One: Deploying Zero Touch Provisioning
- Day One: Enabling Automated Network Verifications with JSNAPy
- Day One: EX Series Up and Running
- Day One: Exploring the Junos CLI, Second Edition
- Day One: Finishing Junos Deployments
- Day One: Inside Junos® Node Slicing
- Day One: Inside Segment Routing
- Day One: IPsec VPN Cookbook 2018
- Day One: Juniper Ambassadors’ Cookbook 2017
- Day One: Juniper Ambassadors’ Cookbook for 2014
- Day One: Juniper Ambassadors’ Cookbook for 2018
- Day One: Juniper Ambassadors’ Cookbook for 2019
- Day One: Juniper Ambassadors’ Cookbook for Enterprise
- Day One: Junos for IOS Engineers
- Day One: Junos Fusion Data Center Up and Running
- Day One: Junos PyEZ Cookbook
- Day One: Junos QoS for IOS Engineers
- Day One: MACsec Up and Running
- Day One: MPLS for Enterprise Engineers
- Day One: MPLS Up and Running On Junos
- Day One: NorthStar Controller Up and Running
- Day One: SRX Series Up and Running with Advanced Security Services
- Day One: Using Ethernet VPNs for Data Center Interconnect
- Day One: Using JSNAP to Automate Network Verifications
- Day One: vMX Up and Running
- Day One: vSRX on KVM
- De coders
- Dealing with E-mail
- Debian GNU/Linux in der Praxis
- Decentralized Reasoning in Ambient Intelligence
- Decentralized Systems with Design Constraints
- Decision and Game Theory for Security
- Declarative Programming and Knowledge Management
- Defense Mechanisms
- Delay Tolerant Networks
- Delivering Carrier Ethernet: Extending Ethernet Beyond the LAN
- Demain, territoire de tous les possibles
- Democracy Hacked
- Demystifying Internet of Things Security
- Demystifying Smart Cities
- Dependability in Sensor, Cloud, and Big Data Systems and Applications
- Dependable and Adaptable Networks and Services
- Dependable Computing - EDCC 2020 Workshops
- Dependable Computing - EDCC 2021 Workshops
- Dependable Software Engineering. Theories, Tools, and Applications
- Deployable Machine Learning for Security Defense
- Deploying and Managing a Cloud Infrastructure
- Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
- Deploying IP and MPLS QoS for Multiservice Networks
- Deploying Linux On the Desktop
- Deploying Next Generation Multicast-enabled Applications
- Deploying OpenStack
- Deploying QoS for Cisco IP and Next Generation Networks
- Der Cumulus-Praktiker
- Der IT Security Manager
- Der lächerlich einfache Leitfaden für Google Drive
- Der OpenWrt-Praktiker
- Der VyOS-Praktiker
- Desarrolla tu marca personal
- Desarrollo de aplicaciones web distribuidas
- Descomplicando o Docker
- Descomplicando o Docker 2a edição
- Design and Analysis of Distributed Energy Management Systems
- Design and Analysis of Security Protocol for Communication
- Design and Build Modern Datacentres, A to Z practical guide
- Design and Implementation of Datacenter Protocols for Cloud Computing
- Design and Implementation of Practical Schedulers for M2M Uplink Networks
- Design and Performance of 3G Wireless Networks and Wireless LANs
- Design Cybernetics
- Design Frameworks for Wireless Networks
- Design of Ultra Wideband Antenna Matching Networks
- Design, Launch, and Scale IoT Services
- Design, Operation and Evaluation of Mobile Communications
- Design, User Experience, and Usability. Case Studies in Public and Personal Interactive Systems
- Design, User Experience, and Usability. Design for Contemporary Interactive Environments
- Design, User Experience, and Usability. Interaction Design
- Design, User Experience, and Usability. Practice and Case Studies
- Design, User Experience, and Usability: Designing Interactions
- Design, User Experience, and Usability: Theory and Practice
- Design, User Experience, and Usability: Users, Contexts and Case Studies
- Designing A Wireless Network
- Designing and Building Security Operations Center
- Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services
- Designing Cloud Data Platforms
- Designing Distributed Systems
- Designing for a Digital and Globalized World
- Designing for Digital Transformation. Co-Creating Services with Citizens and Industry
- Designing Large Scale Lans
- Designing Microservices Using Django: Structuring, Deploying and Managing the Microservices Architec...
- Designing Networks for Innovation and Improvisation
- Designing Reliable Distributed Systems
- Designing Storage for Exchange 2007 SP1
- Designing the Digital Transformation
- Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems
- Detection of Intrusions and Malware, and Vulnerability Assessment
- Developer's Guide to Collections in Microsoft® .NET
- Developing .Net Web Services With XML (Enhanced Edition)
- Developing Cloud Native Applications in Azure using .NET Core : A Practitioner’s Guide to Design, De...
- Developing IP-Based Services (Enhanced Edition)
- Developing Networks using Artificial Intelligence
- Developing Practical Wireless Applications (Enhanced Edition)
- Developing Security Tools of WSN and WBAN Networks Applications
- Development of a Remote Laboratory for Engineering Education
- Development of Transport by Telematics
- Developments in Cognitive Radio Networks
- Device-Free Object Tracking Using Passive Tags
- Device-to-Device based Proximity Service
- Device-to-Device Communications in Cellular Networks
- DevOps - Erfolgreich Entwicklung und IT-Betrieb verbinden
- DevOps Automation Cookbook
- DevOps for Networking
- Dictionary Learning Algorithms and Applications
- Dictionary of Computer
- Die Burg IT-Sicherheit
- Die granulare Gesellschaft