• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2013

An Introduction to Photonic Switching Fabrics by Hinton, H. Scott
Security and Privacy in Vehicular Ad hoc Networks by Biswas, Subir
Data Intensive Storage Services for Cloud Environments by
Twisted Network Programming Essentials: Event-Driven Network Programming with Python by McKellar, Jessica, Fettig, Abe
Modeling Trust Context in Networks by Adali, Sibel
Software Engineering Frameworks for the Cloud Computing Paradigm by
Next Generation Networks by Sandholz, Markus
Green Communication and Networking: Second International Conference, Greenets 2012, Gaudia, Spain, October 25-26, 2012, Revised Selected Papers by
Color in Electronic Displays by
Routing in Opportunistic Networks by
Computer Networks, Architecture and Applications: Proceedings of the Ifip Tc6 Conference 1994 by
Load Balancing in Parallel Computers: Theory and Practice by Lau, Francis C. M., Chenzhong Xu
Anpassung Von Open-Source-Software In Anwenderunternehmen by Keßler, Steffen
Parallel Algorithms for Prefix and Prefix Based Mathematical Equations by Gupta, Ashish
Enabling Rural Population using ICT by Kitindi, Rajabu
Ethernet Switches: An Introduction to Network Design with Switches by Zimmerman, Joann, Spurgeon, Charles
Mobile Networks and Management: 4th International Conference, Monami 2012, Hamburg, Germany, September 24-26, 2012, Revised Selected Papers by
Distributed Applications and Interoperable Systems: 13th Ifip Wg 6.1 International Conference, Dais 2013, Held as Part of the 8th International Federa by
An Introduction to Broadband Networks: Lans, Mans, Atm, B-Isdn, and Optical Networks for Integrated Multimedia Telecommunications by Acampora, Anthony S.
Wired/Wireless Internet Communication: 11th International Conference, Wwic 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedings by
Network and System Security: 7th International Conference, Nss 2013, Madrid, Spain, June 3-4, 2013, Proceedings by
Getting Started with Microsoft Lync Server 2013 by Volpe, Fabrizio
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic by Shimonski, Robert
Aspect-Oriented Programming evaluated: A Study on the Impact that Aspect-Oriented Programming can have on Software Development Productivity by Kleinschmager, Sebastian
High Performance Networking: Ifip Sixth International Conference on High Performance Networking, 1995 by
Protocol Specification, Testing and Verification XIV by
PathF3 - Improved Accuracy in Bandwidth Estimation by Amil, Mazni
Foundations of Windows Networking: A Mirthful (Yet Surprisingly Informative) Introduction by Schumacher, John August
Introduction to Communication Science and Systems by Posner, Edward C., Pierce, John R.
Sensor web: hacia una red de sensores en la web by Gomez Gomez, Jorge Eliecer, Hernandez R., Velssy
Energy Efficient Management MAC by Debnath, Amit, Debbarma, Swapan, Debbarma, Madhumita
Backtrack - Testing Wireless Network Security by Cardwell, Kevin
Oracle Soa Suite 11g Performance Cookbook by Brasier, Matthew, Addy, Mark, Wright, Nicholas
Error-Correction Coding for Digital Communications by Cain, J. Bibb, Clark Jr, George C.
Web-Age Information Management: 14th International Conference, Waim 2013, Beidaihe, China, June 14-16, 2013. Proceedings by
Look-Ahead Based Sigma-Delta Modulation by Janssen, Erwin, Van Roermund, Arthur
Sensor Networks with IEEE 802.15.4 Systems: Distributed Processing, Mac, and Connectivity by Buratti, Chiara, Martalo', Marco, Verdone, Roberto
Cooperative Management of Enterprise Networks by Ray, Pradeep Kumar
Optical Channels: Fibers, Clouds, Water, and the Atmosphere by
Information Systems and Technology for Organizations in a Networked Society by
Protocols for High-Speed Networks V: Tc6 Wg6.1/6.4 Fifth International Workshop on Protocols for High-Speed Networks (Pfhsn '96) 28-30 October 1996, S by
Knowledge-Based System Diagnosis, Supervision, and Control by
Coded Cooperation in Wireless Communications Using Rscc Channel Coder by Al-Moliki Yahya
Distribution Agnostic Video Server by Daar, Waqas
Cache Configuration for High Performance Embedded Systems by Chepure, Srilatha, Guru Rao, C. V., Ramesh Babu, N.
Multilayered Security and Privacy Protection in Car-To-X Networks: Solutions from Application Down to Physical Layer by Stübing, Hagen
Future Information Communication Technology and Applications: Icfice 2013 by
Computer Networks from Scratch by Wahab Sait Abdul Rahaman, Dutta Ashit Kumar
Cloud Computing: Methods and Practical Approaches by
Wireless Networking by Everett, Jared S., Burbank, Jack L., Andrusenko, Julia
Distributed Graph Algorithms for Computer Networks by Erciyes, Kayhan
Telecommunications Switching by Pearce, J. Gordon
Next-Generation Wireless Technologies: 4g and Beyond by
Reversible Data Hiding Techniques for VQ-Compressed Domain by Chang, Chin-Chen, Nguyen, Thai-Son
Trust and Trustworthy Computing: 6th International Conference, Trust 2013, London, Uk, June 17-19, 2013, Proceedings by
Emerging Management Mechanisms for the Future Internet: 7th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and Securit by
Modelling Foundations and Applications: 9th European Conference, Ecmfa 2013, Montpellier, France, July 1-5, 2013, Proceedings by
Sdl 2013: Model Driven Dependability Engineering: 16th International Sdl Forum, Montreal, Canada, June 26-28, 2013, Proceedings by
Applied Cryptography and Network Security: 11th International Conference, Acns 2013, Banff, Ab, Canada, June 25-28, 2013. Proceedings by
Software Architecture: 7th European Conference, Ecsa 2013, Montpellier, France, July 1-5, 2013, Proceedings by
Ecoop 2013 -- Object-Oriented Programming: 27th European Conference, Montpellier, France, July 1-5, 2013, Proceedings by
Application and Theory of Petri Nets and Concurrency: 34th International Conference, Petri Nets 2013, Milan, Italy, June 24-28, 2013, Proceedings by
Learning Without Boundaries: Technology to Support Distance/Distributed Learning by
High performance IP networks by Guesmi, Hattab
High Performance Computing for Computational Science - Vecpar 2012: 10th International Conference, Kope, Japan, July 17-20, 2012, Revised Selected Pap by
IPv6: connectar-se a l'Internet del futur by Ward, Alan
SharePoint 2013 Enterprise Search Walkthrough Guide: Hands-On Lab Edition by Mann, Steven
VLSI for Neural Networks and Artificial Intelligence by
Flexible Assembly Systems: Assembly by Robots and Computerized Integrated Systems by Owen, A. E.
Trust Management VII: 7th Ifip Wg 11.11 International Conference, Ifiptm 2013, Malaga, Spain, June 3-7, 2013, Proceedings by
Potential for Data Loss from Security Protected Smartphones: Investigate how to use protective security measures from the PC world to secure Smartphon by Rajole, Vikas
Using Security Patterns in Web-Application by Alam, Shahnawaz
Computer Network Intrusion Detection by Jazzar, Mahmoud
Modified AODV Routing Protocol For Ad hoc Network by Gulhane, Sanket
Packets with Deadlines: A Framework for Real-Time Wireless Networks by Kumar, P. R., Hou, I-Hong
Dynamic Ad Hoc Networks by
SLA based architectures in priority aware shared mesh optical networks by Nafarieh, Alireza
Introduction to Software Defined Networking - OpenFlow & VxLAN by Shukla, Vishal
Broadband Communications: Convergence of Network Technologies by
Digital Phase Modulation by Anderson, John B., Aulin, Tor, Sundberg, Carl-Erik
Human Factors in Computing and Informatics: First International Conference, Southchi 2013, Maribor, Slovenia, July 1-3, 2013, Proceedings by
Sistemas difusos en la ecualización de canales de comunicaciones by Albarracin Sanchez, Luis Felipe
Optimization of MANETs Efficiency Through Rational Energy Consumption by Ondulo, Jasper, Omollo, Richard
Getting Started with Oracle Weblogic Server 12c: Developer's Guide by Mazanatti Nunes, Fabio
Adaptive FLS for Bandwidth Analysis & Allocation for Cognitive Radios by Sherwani, Nazia, Khan, M. Saleem
Robocup 2012: Robot Soccer World Cup XVI by
Studies on Urban Vehicular Ad-Hoc Networks by Zhu, Hongzi, Li, Minglu
Towards the E-Society: E-Commerce, E-Business, and E-Government by
Foundations of Information Technology in the Era of Network and Mobile Computing: Ifip 17th World Computer Congress -- Tc1 Stream / 2nd Ifip Internati by
Network Management and Control: Volume 2 by
Efficient Quantum Based Space Communications by Bacsardi Laszlo
Indoor Location Based Services using WiFi by Saraswat, Taru, Qadeer, Mohammed Abdul, Kausar, Tanwee
Benchmarking Peer-To-Peer Systems: Understanding Quality of Service in Large-Scale Distributed Systems by
Routing Policies in Wireless Sensor Networks by Sharma, Meenakshi, Sharma, Kalpana, Singh, Vikash
Network Intrusion Detection System using Machine Learning Techniques by Geetha, S., Selvakumar, S., Sindhu, Siva S. Sivatha
Clans of Petri Nets by Zaitsev Dmitry
Framework for Monitoring Hardware Firewall Functionality Using Nids by Kemei Peter
Evolution of Cognitive Networks and Self-Adaptive Communication Systems by
Service-Driven Approaches to Architecture and Enterprise Integration by
Towards a Reliable Architecture for Crowdsourcing by Hara Tenshi
Optimization of Partially Observable Systems in Wireless Networks by Habachi Oussama, Hayel Yezekael, El-Azouzi Rachid
Architectures and Algorithms for IP Optical Burst Switching Networks by Garcia, Nuno M.
Developing Search-Driven Applications with Sharepoint 2013 by Tordgeman, Johnny
Synthesis of Communication Protocols: A Supervisory Control Approach by Mannani, Amin
Secure Group Communication in Wireless Sensor Networks by Cheikhrouhou Omar
Advanced Technologies for Digital Radio Broadcasting by Hu, Zixia
Intelligent Networks: Recent Approaches and Applications in Medical Systems by Ahamed, Syed V.
Network Systems and Security (Principles and Practices): Computer Networks, Architecture and Practices by Owusu, Theophilus, Adebiaye, Richmond
Wireless Algorithms, Systems, and Applications: 8th International Conference, Wasa 2013, Zhangjiajie, China, August 7-10,2013, Proceedings by
Agreement Technologies: Second International Conference, at 2013, Beijing, China, August 1-2, 2013. Proceedings by
Sicherheit in SIP-basierten VoIP-Netzen by Sauer, Michael
Long Term Evolution: Die Entwicklung einer Mobilfunkgeneration als Folge steigender Datenmengen by Gerlach, Attila
Universal Access in Human-Computer Interaction: Applications and Services for Quality of Life: 7th International Conference, Uahci 2013, Held as Part by
Fundamental Concept of Cryptography by Som Subhranil
Building the Internet of Things with Ipv6 and Mipv6: The Evolving World of M2m Communications by Minoli, Daniel
Universal Access in Human-Computer Interaction: Design Methods, Tools, and Interaction Techniques for Einclusion: 7th International Conference, Uahci by
Universal Access in Human-Computer Interaction: User and Context Diversity: 7th International Conference, Uahci 2013, Held as Part of Hci Internationa by
Enhancing the Search Experience in SharePoint 2013 by Mann, Steven
Cellular Automata Based on Block Cipher and Road Traffic Model by Das Debasis, Misra Rajiv
Ivrs Using Freeswitch Pbx by Ansari Abdullah Mohammad, Nehal MD Faisal, Qadeer Mohammed Abdul
Development of Web-Base System by Ogala Emmanuel
Wireless Access Flexibility: First International Workshop, Wiflex 2013, Kaliningrad, Russia, September 4-6, 2013, Proceedings by
Intelligence and Security Informatics: Pacific Asia Workshop, Paisi 2013, Beijing, China, August 3, 2013. Proceedings by
Wireless Network Pricing by Gao, Lin, Huang, Jianwei
Information Assurance and Security Education and Training: 8th Ifip Wg 11.8 World Conference on Information Security Education, Wise 8, Auckland, New by
Vmware Vsphere 5.1 Cookbook by Abhilash, Gb
Networks for Pervasive Services: Six Ways to Upgrade the Internet by Liotta, Antonio, Exarchakos, George
Future Challenges in Security and Privacy for Academia and Industry: 26th Ifip Tc 11 International Information Security Conference, SEC 2011, Lucerne, by
Automata, Languages, and Programming: 40th International Colloquium, Icalp 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part I by
Automata, Languages, and Programming: 40th International Colloquium, Icalp 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II by
Computational Science and Its Applications -- Iccsa 2013: 13th International Conference, Ho CHI Minh City, Vietnam, July 24-27, 2013, Proceedings, Par by
Computational Science and Its Applications -- Iccsa 2013: 13th International Conference, Iccsa 2013, Ho CHI Minh City, Vietnam, June 24-27, 2013, Proc by
Computational Science and Its Applications -- Iccsa 2013: 13th International Conference, Ho CHI Minh City, Vietnam, July 24-27, 2013, Proceedings, Par by
Computational Science and Its Applications -- Iccsa 2013: 13th International Conference, Iccsa 2013, Ho CHI Minh City, Vietnam, June 24-27, 2013, Proc by
Active Directory Cookbook: Solutions for Administrators & Developers by Allen, Robbie, Svidergol, Brian
Security and Privacy Protection in Information Processing Systems: 28th Ifip Tc 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-1 by
Quality of Service in Heterogeneous Mobile and Wireless Networks by Jakimoski Kire, Janevski Toni
Sicherheit in Kommunikationsnetzen by Gruschka, Nils, Sorge, Christoph, Lo Iacono, Luigi
Smart Metering: Das Datenmanagement der digitalen Verbrauchserfassung by Trinker, Martin
Resource Management for Device-To-Device Underlay Communication by Xu, Chen, Song, Lingyang, Han, Zhu
E-Voting and Identity: 4th International Conference, Vote-Id 2013, Guildford, Uk, July 17-19, 2013, Proceedings by
Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, Dimva 2013, Berlin, Germany, July 18-19, 2013. Proce by
Computational Science and Its Applications -- Iccsa 2013: 13th International Conference, Iccsa 2013, Ho CHI Minh City, Vietnam, June 24-27, 2013, Proc by
Privacy Enhancing Technologies: 13th International Symposium, Pets 2013, Bloomington, In, Usa, July 10-12, 2013, Proceedings by
Symbolic and Quantiative Approaches to Resoning with Uncertainty: 12th European Conference, Ecsqaru 2013, Utrecht, the Netherlands, July 8-10, 2013, P by
Ad-Hoc, Mobile, and Wireless Networks: 12th International Conference, Adhoc-Now 2013, Wroclaw, Poland, July 8-10, 2013proceedings by
Data and Applications Security and Privacy XXVII: 27th Annual Ifip Wg 11.3 Conference, Dbsec 2013, Newark, Nj, Usa, July 15-17, 2013, Proceedings by
Analytical and Stochastic Modeling Techniques and Applications: 20th International Conference, Asmta 2013, Ghent, Belgium, July 8-10, 2013, Proceeding by
Cloud Computing und Wissensmanagement: Bewertung von Wissensmanagementsystemen in der Cloud by Szer, Benjamin
Juniper Srx Series: A Comprehensive Guide to Security Services on the Srx Series by Woodberg, Brad, Cameron, Rob
Mobile Web Browsing Using the Cloud by Cao, Guohong, Zhao, Bo, Tak, Byung Chul
Constructive Side-Channel Analysis and Secure Design: 4th International Workshop, Cosade 2013, Paris, France, March 6-8, 2013, Revised Selected Papers by
Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th International Confernce, Qshine 2013, Greader Noida, India, January 11-12 by
Instant Citrix XenApp 6.5 by Mallett, Andrew
Game-theoretic and Bio-inspired Techniques for Autonomous Mobile Nodes by Kusyk Janusz
Information Retrieval Models: Foundations & Relationships by Roelleke, Thomas
Cloud Database Development and Management by Chao, Lee
Advanced Network Programming - Principles and Techniques: Network Application Programming with Java by Muntean, Gabriel-Miro, Ciubotaru, Bogdan
Scheduling and Congestion Control for Wireless Internet by Wang, Xin
Técnicas de calidad de servicio(QoS) para ambientes Backbones by Hernández, Helman E., Hernández, Velssy L., Gómez, Jorge E.
Implementation of Authentication and Transaction Security by Verma Garima
Embedding QoS in Wireless Mesh routing by Chakraborty Dibakar
Pro SharePoint 2013 Business Intelligence Solutions by Anandan, Sha, Malik, Sahil, Singh, Manpreet
Secure Stack for Clocks by Hirschler, Bernd
Trust Management V: 5th Ifip Wg 11.11 International Conference, Ifiptm 2011, Copenhagen, Denmark, June 29 - July 1, 2011, Proceedings by
Grid Computing: Towards a Global Interconnected Infrastructure by
Cognitive Networked Sensing and Big Data by Qiu, Robert, Wicks, Michael
Applied Cyber-Physical Systems by
Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications by Li, Yingshu, He, Jing (Selina), Ji, Shouling
Data Management in Cloud, Grid and P2P Systems: 6th International Conference, Globe 2013, Prague, Czech Republic, August 28-29, 2013, Proceedings by
Dynamic Secrets in Communication Security by Towsley, Don, Xiao, Sheng, Gong, Weibo
Networked Systems: First International Conference, Netys 2013, Marrakech, Marocco, May 2-4, 2013, Revised Selected Papers by
Internet Resource Pricing Models by Xu, Ke, Zhong, Yifeng, He, Huan
Multicasting Over Satellite Networks by Khan Faraz
Collaborative Caching in Content-Oriented Networks: New Steps by Dai Jie
Steganography for Jpeg2000 Baseline System by Nichal Arjun
Electronic Government: 12th Ifip Wg 8.5 International Conference, Egov 2013, Koblenz, Germany, September 16-19, 2013, Proceedings by
Trustworthy Execution on Mobile Devices by McCune, Jonathan M., Vasudevan, Amit, Newsome, James
System Center 2012 Configuration Manager Sp1: Mastering the Fundamentals, 2nd Edition by Agerlund, Kent
Enhanced Packet Dissembling Schemes For Jamming Attacks Prevention by Chaturvedi Pushphas, Gupta Kunal
Internet of Things, Smart Spaces, and Next Generation Networking: 13th International Conference, New2an 2013, and 6th Conference, Rusmart 2013, St. Pe by
Lightweight Cryptography for Security and Privacy: 2nd International Workshop, Lightsec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers by
Algorithms - ESA 2013: 21st Annual European Symposium, Sophia Antipolis, France, September 2-4, 2013. Proceedings by
Public Key Infrastructures, Services and Applications: 9th European Workshop, Europki 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Paper by
Advances in Security of Information and Communication Networks: First International Conference, Secnet 2013, Cairo, Egypt, September 3-5, 2013. Procee by
Gradient Topologies by Sacha Jan
Structured Object-Oriented Formal Language and Method: Second International Workshop, Sofl 2012, Kyoto, Japan, November 13, 2012. Revised Selected Pap by
Measuring Sip Proxy Server Performance by Subramanian, Sureshkumar V., Dutta, Rudra
Cryptography Infosec Pro Guide by Oriyano, Sean-Philip
Preserving Privacy in Social Network Sites Using Anonymity Algorithm by Ismail Zuraini, Kavianpour Sanaz
Effective Monitoring Solutions for Heterogeneous Wireless Networks by Iannario Luca
An Introduction to Network Programming with Java: Java 7 Compatible by Graba, Jan
Integration von Geschäftsprozessen in Microsoft SharePoint 2010 by Heizmann, Martina
On-Demand Routing and Security in Mobile Ad-Hoc Networks by Onyemelukwe Soke
Einsatzmöglichkeiten des Cloud Computings: Potentiale, Softwareplattformen für Private Clouds und Kollaborationslösungen in der Public Cloud by Hencke, Kai
Wireless Sensor Networks by Marjani Esmaeel, Pesaranghader Ali
Leveraging Symbiotic Relationships for Emulation of Computer Networks by Erazo, Miguel A.
Computer Performance Engineering: 10th European Workshop, Epew 2013, Venice, Italy, September 16-17, 2013, Proceedings by
Advances in Communication Networking: 19th Eunice/Ifip Eg Wg 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013, Proceedings by
Game-Theoretic Analysis of Network Attack-Defense Interactions by Ibidunmoye E. O., Alese B. K.
See More