- BackTrack 4: Assuring Security by Penetration Testing
- BackTrack - Testing Wireless Network Security
- Balanced Website Design
- Bandwidth Extension of Speech Signals
- Banner Christian School Network
- Basic Networking Level 1
- Basic Networking Level 2
- Basics of Computer
- Basiswissen Energieinformatik
- Beacon Technologies
- BeagleBone Black Cookbook
- BeagleBone By Example
- Become ITIL Foundation Certified in 7 Days
- Becoming Digital
- Beginning Application Lifecycle Management
- Beginning Data Science, IoT, and AI on Single Board Computers
- Beginning FPGA: Programming Metal
- Beginning Kubernetes on the Google Cloud Platform
- Beginning LoRa Radio Networks with Arduino
- Beginning NFC
- Beginning Sensor Networks with XBee, Raspberry Pi, and Arduino
- Beginning SharePoint Communication Sites
- Behavioral Analytics in Social and Ubiquitous Environments
- Being Online
- Belief Functions: Theory and Applications
- Benchmarking Peer-to-Peer Systems
- Benchmarking, Measuring, and Optimizing
- Benutzerzentrierte Unternehmensarchitekturen
- Betriebssysteme
- Betriebssysteme kompakt
- Better, Faster, Lighter Java
- Beyond Databases, Architectures and Structures. Facing the Challenges of Data Proliferation and Grow...
- Beyond Databases, Architectures and Structures. Paving the Road to Smart Data Processing and Analysi...
- Beyond E-Business
- Beyond Interactions
- Bezpieczeństwo aplikacji internetowych dla programistów. Rzeczywiste zagrożenia, praktyczna ochrona
- Bezpieczeństwo nowoczesnych aplikacji internetowych. Przewodnik po zabezpieczeniach
- Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
- BGP
- BGP and the Internet
- Bias and Social Aspects in Search and Recommendation
- Biblioteki cyfrowe: tworzenie, zarządzanie, odbiór
- Big Data
- Big Data Analytics
- Big Data Analytics and Knowledge Discovery
- Big Data and Computational Intelligence in Networking
- Big Data and Security
- Big Data Benchmarks, Performance Optimization, and Emerging Hardware
- Big Data Computing and Communications
- Big Data Concepts, Theories, and Applications
- Big Data in Emergency Management: Exploitation Techniques for Social and Mobile Data
- Big Data Platforms and Applications
- Big Data Technologies and Applications
- Big Data – BigData 2018
- Big Data – BigData 2019
- Big Data – BigData 2020
- Big Data, Machine Learning, and Applications
- Big Scientific Data Management
- Big Scientific Data Management
- Big Social Data and Urban Computing
- Big-Data Analytics and Cloud Computing
- Bio-inspired Computing: Theories and Applications
- Bio-Inspired Computing: Theories and Applications
- Bio-inspired Computing: Theories and Applications
- Bio-inspired Information and Communication Technologies
- Bio-Inspired Models of Network, Information, and Computing Systems
- Bio-inspired Networking
- Bioengineering and Biomedical Signal and Image Processing
- Bioinformatics and Biomedical Engineering
- Bioinformatics Research and Applications
- Bioinspired Optimization Methods and Their Applications
- Biomedical Data Management and Graph Online Querying
- Biomedical Engineering Systems and Technologies
- Biomedical Image Registration
- Biometric Recognition
- Biometrics
- Biomimetic and Biohybrid Systems
- Bitcoin Cloud Mining: 'It's the increasing difficulty, stupid!'
- BizTalk 2013 EDI for Health Care
- Black Hat Python, 2nd Edition
- Black Hat Python. Język Python dla hakerów i pentesterów
- BlackBerry Hacks
- Blended Learning. Education in a Smart Learning Environment
- Blended Learning. Enhancing Learning Success
- Block Trace Analysis and Storage System Optimization
- Blockchain : bulle ou révolution ?
- Blockchain and IoT Integration
- Blockchain and the Law
- Blockchain and Trustworthy Systems
- Blockchain Cybersecurity, Trust and Privacy
- Blockchain for International Security
- Blockchain in Action
- Blockchain Revolution
- Blockchain Revolution: Understanding the Crypto Economy of the Future. A Non-Technical Guide to the ...
- Blockchain Technology
- Blockchain Technology and Application
- Blockchain Technology in Internet of Things
- Blockchain – ICBC 2019
- Blockchain – ICBC 2020
- Blockchain-enabled Fog and Edge Computing: Concepts, Architectures and Applications
- Blockchain: Empowering Secure Data Sharing
- Bloker kæde Teknologi - den næste store ting
- Blue team i cyberbezpieczeństwo. Zestaw narzędzi dla specjalistów od zabezpieczeń w sieci
- Bluetooth Application Programming with the Java APIs
- Bluetooth Application Programming with the Java APIs Essentials Edition (Enhanced Edition)
- Bluetooth Essentials for Programmers
- Bluetooth Security Attacks
- Body Area Networks. Smart IoT and Big Data for Intelligent Health
- Body Area Networks: Smart IoT and Big Data for Intelligent Health Management
- Body Sensor Networks
- BOINC
- Boost.Asio C++ Network Programming
- Boost.Asio C++ Network Programming - Second Edition
- Boost.Asio C++ Network Programming Cookbook
- Boosting Collaborative Networks 4.0
- Bootstrapping Trust in Modern Computers
- Botnet Detection
- Botnets
- Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries
- Breast Imaging
- Bring your own Device
- Broadband Cable Access Networks (Enhanced Edition)
- Broadband Communications, Networks, and Systems
- Broadband Fixed Wireless Access
- Broadband Matching: Theory And Implementations (3rd Edition)
- Broadband RF and Microwave Amplifiers
- Broadcast Design in Cognitive Radio Ad Hoc Networks
- Budowa i obsługa domowych sieci komputerowych. Ćwiczenia praktyczne
- Budowa sieci komputerowych na przełącznikach i routerach Cisco
- Bug Bounty Bootcamp
- Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based ...
- Build Your Own Wireless Lans
- Building a Cisco Wireless Lan
- Building a Home Security System with Arduino
- Building a NAS Server with Raspberry Pi and Openmediavault
- Building a Pentesting Lab for Wireless Networks
- Building a Windows IT Infrastructure in the Cloud
- Building an Intelligence-Led Security Program
- Building Applications on Mesos
- Building Applications with iBeacon
- Building Arduino Projects for the Internet of Things
- Building Automation
- Building Bluetooth Low Energy Systems
- Building CISCO Networks for Windows 2000
- Building Cisco Remote Access Networks (Enhanced Edition)
- Building Cloud and Virtualization Infrastructure: A Hands-on Approach to Virtualization and Implemen...
- Building Decentralized Blockchain Applications: Learn How to Use Blockchain as the Foundation for Ne...
- Building DMZs For Enterprise Networks (Enhanced Edition)
- Building Enterprise Blockchain Solutions on AWS: A Developer's Guide to Build, Deploy, and Managed A...
- Building Ethereum Dapps
- Building Event-Driven Microservices
- Building Machine Learning Pipelines
- Building Modern Networks
- Building Modern Serverless Web APIs: Develop Microservices and Implement Serverless Applications wit...
- Building Modular Cloud Apps with OSGi
- Building Networks and Servers Using BeagleBone
- Building Secure and Reliable Systems
- Building Server-side and Microservices with Go: Building Modern Backends and Microservices Using Go,...
- Building Serverless Applications with Google Cloud Run
- Building Serverless Apps with Azure Functions and Cosmos DB: Leverage Azure functions and Cosmos DB ...
- Building Telephony Systems with OpenSIPS - Second Edition
- Building the Network of the Future
- Building the Web of Things
- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Building VMware Software-Defined Data Centers
- Building Wireless Sensor Networks
- Bulletproof Wireless Security
- Business Continuity and Disaster Recovery for InfoSec Managers (Enhanced Edition)
- Business in Real-Time Using Azure IoT and Cortana Intelligence Suite
- Business Information Systems Workshops
- Business Intelligence (Enhanced Edition)
- Business Intelligence for Enterprise Internet of Things