- BackTrack 5 Wireless Penetration Testing Beginner's Guide
- Backup & Recovery
- Bash Command Line Pro Tips
- Bash Pocket Reference
- Bash – uso professionale della shell
- Basics with Windows Powershell
- Beginning Apache Pig
- Beginning DevOps with Docker
- Beginning jOOQ
- Behavior Computing
- Behavioral Analytics in Social and Ubiquitous Environments
- Belief Functions: Theory and Applications
- Best Practices for the Knowledge Society. Knowledge, Learning, Development and Technology for All
- Beyond Cryptographic Routing: The Echo Protocol in the new Era of Exponential Encryption (EEE)
- Beyond Databases, Architectures and Structures. Towards Efficient Solutions for Data Analysis and Kn...
- Bezpieczeństwo kontenerów w DevOps. Zabezpieczanie i monitorowanie kontenerów Docker
- Biblia Windows Server 2012. Podręcznik Administratora
- Big Data Analytics
- Big Data Analytics and Knowledge Discovery
- Big Data Analytics for Sensor-Network Collected Intelligence
- Big Data Analytics in the Social and Ubiquitous Context
- Big Data and Smart Service Systems (Enhanced Edition)
- Big Data Benchmarking
- Big Data Benchmarks, Performance Optimization, and Emerging Hardware
- Big Data Benchmarks, Performance Optimization, and Emerging Hardware
- Big Data Computing and Communications
- Big Data im Gesundheitswesen kompakt
- Big Data in Emergency Management: Exploitation Techniques for Social and Mobile Data
- Big Data Management and Analytics
- Big Data Networked Storage Solution for Hadoop
- Big Data Platforms and Applications
- Big Data Technology and Applications
- Big data à l'âge Petabyte
- Big Data, Cloud and Applications
- Bilddatenkompression
- Bioinformatics and Computational Biology
- Bioinformatics Research and Development
- Biomedical Data Management and Graph Online Querying
- Biometric ID Management and Multimodal Communication
- Biometrics and ID Management
- Biometrics and Identity Management
- Bitcoin and Cryptocurrency Technologies
- Blended Learning mit MOODLE
- Blended Learning. New Challenges and Innovative Practices
- Blended Learning: Aligning Theory with Practices
- Blended Learning: Educational Innovation for Personalized Learning
- Blockchain and the Law
- Blockchain Basics
- Blockchain – ICBC 2019
- Blockchain: Empowering Secure Data Sharing
- Blowout
- Bootstrapping Trust in Modern Computers
- Broad Bandwidth and High Dimensional Quantum Memory Based on Atomic Ensembles
- Bug Bounty Hunting mit Kali-Linux oder Parrot Security OS
- Build a Next-Generation Digital Workplace
- Building a Columnar Database on RAMCloud
- Building a Plex Server with Raspberry Pi
- Building A Responsive Mailing List
- Building Secure and Reliable Systems
- Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
- Building VMware Software-Defined Data Centers
- Bulletproof Wireless Security (Enhanced Edition)
- Business Analytics Using R - A Practical Approach
- Business Information Systems
- Business Information Systems Workshops
- Business Integration mit SAP-Lösungen
- Business Intelligence and Big Data
- Business Intelligence for the Real-Time Enterprise
- Business Intelligence for the Real-Time Enterprises
- Business Intelligence Tools for Small Companies