• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2009

Junos Enterprise Switching: A Practical Guide to Junos Switches and Certification by Marschke, Doug, Reynolds, Harry
Secure Data Management: 6th Vldb Workshop, Sdm 2009, Lyon, France, August 28, 2009, Proceedings by
Dnssec Specifications by
Optical Networks: A Practical Perspective by Sivarajan, Kumar, Sasaki, Galen, Ramaswami, Rajiv
Make: Technology on Your Time Volume 19 by Frauenfelder, Mark
Protocol Design and Performance Analysis for Mobile Ad Hoc Networks by Leng, Supeng
Stateful intrusion detection in high-speed networks by Foschini, Luca
Wireless Sensor Networks: A Networking Perspective by Jamalipour, Abbas, Zheng, Jun
SQL the Complete Reference, 3rd Edition by Oppel, Andy, Groff, James R., Weinberg, Paul N.
Multiagent System Technologies: 7th German Conference, MATES 2009 Hamburg, Germany, September 9-11, 2009 Proceedings by
Analysis, Architectures and Modelling of Embedded Systems by
Management Enabling the Future Internet for Changing Business and New Computing Services: 12th Asia-Pacific Network Operations and Management Symposiu by
OPS Networks by Ghaffarpour Rahbar, Akbar
IEEE 802.11 Wireless Networks by Biju, Issac
Distributed Computing: 23rd International Symposium, DISC 2009, Elche, Spain, September 23-25, 2009, Proceedings by
How to Renovate Your Business: The Information Best Practice Makeover That Really Works by White, Kirby
Multiresolution Analysis for Effective Dynamic Bandwidth Management by Turner, Claude
Security and Privacy in Mobile Information and Communication Systems: First International Icst Conference, Mobisec 2009, Turin, Italy, June 3-5, 2009, by
Communication Protocol Engineering of Wireless Networks by Latkoski, Pero
Wireless Communication in Underground Mines: Rfid-Based Sensor Networking by Bandyopadhyay, L. K., Chaulya, S. K., Mishra, P. K.
Sdl 2009: Design for Motes and Mobiles: 14th International Sdl Forum Bochum, Germany, September 22-24, 2009 Proceedings by
Performance of Wireless Mesh Networks by Scalabrino, Nicola
Mitigating Rapidly Propagating Worm Threats in Emergent Networks by Xie, Liang
Cloud Computing Explained by Rhoton, John
Security in Ad Hoc and Sensor Networks by McNair, Janise, Beyah, Raheem A., Corbett, Cherita L.
Stochastic Geometry and Wireless Networks: Volume I Theory by Baccelli, Francois, Blaszczyszyn, Bartlomiej
Stochastic Geometry and Wireless Networks: Volume II Applications by Blaszczyszyn, Bartlomiej, Baccelli, Francois
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them by Viega, John, Howard, Michael, LeBlanc, David
Grid Computing: Techniques and Applications by Wilkinson, Barry
Planning, Negotiating, Implementing, and Managing Wide Area Networks: A Practical Guide by Augusto De Carvalho, Luiz, Naude, Benjamin
Planning, Negotiating, Implementing, and Managing Wide Area Networks: A Practical Guide by Naude, Benjamin, Augusto De Carvalho, Luiz
Junos High Availability by Sonderegger, James, Blomberg, Orin, Milne, Kieran
Next Generation Information Technologies and Systems: 7th International Conference, NGITS 2009, Haifa, Israel, June 16-18, 2009, Revised Selected Pape by
Mobile Design and Development: Practical Concepts and Techniques for Creating Mobile Sites and Web Apps by Fling, Brian
Data-Exchange Standards and International Organizations: Adoption and Diffusion by Thomas, Josephine Wapakabulo
Eleventh Hour Security+: Exam Sy0-201 Study Guide by Dubrawsky, Ido
Network+: Exam N10-004 Study Guide by Alpern, Naomi
QoS Frameworks for Ad-Hoc and Heterogeneous Netwoks by Morgan, Yasser
Cloud Computing: A Practical Approach by Velte, Toby, Elsenpeter, Robert C., Velte, Anthony
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions by Philipp, Aaron, Davis, Chris, Cowen, David
Designing New Crawling and Indexing Techniques for Web Search Engines by Tan, Qingzhao
Advances in Information and Computer Security: 4th International Workshop on Security, Iwsec 2009 Toyama, Japan, October 28-30, 2009 Proceedings by
The Daternet for Women and The Daternet for Men: The Sexy, Unbridled, Definitive Guide to Internet Dating by Kanner, Courtney Lauren, Howard, Jeremy Stephen
Adaptive Security in Dynamic Group Communications by Challal, Yacine
The Semantic Web - Iswc 2009: 8th International Semantic Web Conference, Iswc 2009, Chantilly, Va, Usa, October 25-29, 2009, Proceedings by
OSS Design Patterns: A Pattern Approach to the Design of Telecommunications Management Systems by Gauthier, Pierre, Ashford, Colin
Large Scale Cognitive Wireless Networks by Song, Liang
Exchange 2010 - A Practical Approach by Wesselius, Jaap
Pervasive Computing: Innovations in Intelligent Multimedia and Applications by
Redes Inalambricas Malladas by Costa Montenegro, Enrique
Linux System Administration Recipes: A Problem-Solution Approach by Kemp, Juliet
Safety and Security in Multiagent Systems: Research Results from 2004-2006 by
IP Operations and Management by
Integrated Management of Systems, Services, Processes and People in IT by
Wired-Wireless Multimedia Networks and Services Management: 12th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks an by
Modelling Autonomic Communications Environments by
Advanced Topics in System and Signal Theory: A Mathematical Approach by Boche, Holger, Pohl, Volker
Optimised Sink Trajectories for Sensor Networks by Mendis, Champake
Traffic Analysis Attacks and Countermeasures by Fu, Xinwen
Algorithmic Aspects of Wireless Sensor Networks by
iNetSec 2009-Open Research Problems in Network Security by
Stabilization, Safety, and Security of Distributed Systems by
Provable Security: Third International Conference, Provsec 2009, Guangzhou, China, November 11-13, 2009. Proceedings by
Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Sel by
e-Business and Telecommunications by
Enterprise Mac Administrators Guide by Hunter, Beau, Edge, Charles, Smith, Zack
Hands-On Networking by Casoni, Maurizio, Cerroni, Walter, Merani, Maria Luisa
Market-Oriented Grid and Utility Computing by
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations by
Introduction to Scheduling by
Advances in Computational Science and Engineering by
Advances in Communication and Networking: Second International Conference on Future Generation Communication and Networking, FGCN 2008, Sanya, Hainan by
Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. by
Information Theoretic Security by
Simula Research Laboratory: By Thinking Constantly about It by
Ubuntu Netbooks: The Path to Low-Cost Computing by Van Vugt, Sander
Software Technologies for Embedded and Ubiquitous Systems: 7th Ifip Wg 10.2 International Workshop, Seus 2009 Newport Beach, Ca, Usa, November 16-18, by
Network Control and Optimization: Third Euro-Nf Conference, Net-COOP 2009 Eindhoven, the Netherlands, November 23-25, 2009 Proceedings by
A Mobile Agent Application by Wong, Anthony
Participant Access Control in IP Multicasting by Islam, Salekul
Quality of Service in Heterogeneous Networks: 6th International Icst Conference on Heterogeneous Networking for Quality, Reliability, Security and Rob by
Intrusion Detection with Artificial Neural Networks by Hossain, Moazzam
Optimal Erasure Protection Assignment for Scalable Data by Thie, Johnson
Network Tomography and the Autonomic Network Architecture Networks by Paintsil, Ebenezer
Exemplar High-Speed Scalable Network Architectures by Tayan, Omar, Tayan Omar
Service-Oriented Computing: 7th International Joint Conference, Icsoc-Servicewave 2009, Stockholm, Sweden, November 24-27, 2009, Proceedings by
Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise: A Selection of Common Capabilities Validated in Real-Life Business Tr by
Web 2.0 & Semantic Web by
Communication and Networking: International Conference, Fgcn/Acn 2009, Held as Part of the Future Generation Information Technology Conference, Fgit by
U- And E-Service, Science and Technology by
Future Generation Information Technology by
Advances in Multimedia Information Processing - Pcm 2009: 10th Pacific Rim Conference on Multimedia, Bangkok, Thailand, December 15-18, 2009. Proceedi by
Handbook of Peer-To-Peer Networking by
Grid and Distributed Computing: International Conference, Gdc 2009, Held as Part of the Future Generation Information Technology Conferences, Fgit 200 by
Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin by
Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings by
Cloud Computing: First International Conference, Cloudcom 2009, Beijing, China, December 1-4, 2009, Proceedings by
Information Systems Security: 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings by
Resilient Virtual Private Networks by Rosenbaum, Gustav Filip
Self-Organizing Systems: 4th Ifip Tc 6 International Workshop, Iwsos 2009, Zurich, Switzerland, December 9-11, 2009, Proceedings by
Adolescent Online Social Communication and Behavior: Relationship Formation on the Internet by
Handbook of Research on Mobile Marketing Managent by
Web and Wireless Geographical Information Systems: 9th International Symposium, W2gis 2009, Maynooth, Ireland, December 7-8, 2009. Proceedings by
Information and Communications Security: 11th International Conference, Icics 2009 by
Designing and Implementing Ip/Mpls-Based Ethernet Layer 2 VPN Services: An Advanced Guide for Vpls and VLL by Xu, Zhuo
Internet Networks: Wired, Wireless, and Optical Technologies by
Networking Systems Design and Development by Chao, Lee
Energy Conservation Protocols for Wireless Data Networks by Stine, John
Pattern Recognition and Machine Intelligence: Third International Conference, PReMI 2009, New Delhi, India, December 16-20, 2009, Proceedings by
MAIDS for VoIP by Chita, Christian
A Unified Security Framework for IP Based Wireless Sensor Networks by Riaz, Rabia
Fibre Channel Arbitrated Loop by Truestedt, Horst L., Kembel, Robert W.
Fibre Channel A Comprehensive Introduction by Kembel, Robert W.
Economic Models and Algorithms for Distributed Systems by
Speech Processing in Embedded Systems by Sinha, Priyabrata
Principles of Practice in Multi-Agent Systems: 12th International Conference, PRIMA 2009, Nagoya, Japan, December 14-16, 2009, Proceedings by
Mobility Support Wireless Resource Management by Islam, Mohammad Mahfuzul
Service-Oriented Computing: Agents, Semantics, and Engineering: AAMAS 2009 International Workshop, SOCASE 2009, Budapest, Hungary, May 11, 2009, Proce by
Online Multiplayer Games by Bainbridge, William Sims
Future Application and Middleware Technology on e-Science by
An Analytical Approach to Optical Burst Switched Networks by Murthy, C. Siva Ram, Venkatesh, T.
Dynamic Replica Placement and Request Redirection in CDNs by Vicari, Claudio
Fibre Channel Switched Fabric by Kembel, Robert W.
Distributed Computing and Networking: 11th International Conference, Icdcn 2010, Kolkata, India, January 3-6, 2010, Proceedings by
Keyword Search in Databases by Xu Yu, Jeffrey, Chang, Lijun, Qin, Lu
Communications Infrastructure, Systems and Applications: First International Icst Conference, Europecomm 2009, London, Uk, August 11-13, 2009, Revised by
My Personal Adaptive Global Net (Magnet) by
IP Communications and Services for NGN by Agbinya, Johnson I.
Brien Posey's Guide to Practical Telecommuting by Posey, Brien M.
Technical Support Essentials: Advice You Can Use to Succeed in Technical Support by Sanchez, Andrew, Sleeth, Karen
Strategic Advancements in Utilizing Data Mining and Warehousing Technologies: New Concepts and Developments by