• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2014

Computer & IT Policies and Procedures Manual by
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything by Dacosta, Francis, Henderson, Byron
Soziologie Der Online-Kommunikation by Beck, Klaus
Sensor Systems and Software: 4th International Icst Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers by
Security and Privacy in Communication Networks: 9th International Icst Conference, Securecomm 2013, Revised Selected Papers by
A Monogram On Design And Development Of FPGA Based Firewall by Shelake V. G., Kamat R. K.
Bystryy poisk vektorov pri szhatii rechevykh signalov by Tkachenko Aleksandr, Griyo Tukalo Oksana
Critical Information Infrastructures Security: 8th International Workshop, Critis 2013, Amsterdam, the Netherlands, September 16-18, 2013, Revised Sel by
Smarthome Computing System Using Mobile Devices by Maskat Kamaruzaman, Ismail Mohd Nazri, Shukran Mohd Afizi
SharePoint 2013 Solution Series Volumes 1-5 by Mann, Steven
SharePoint 2013 Survey Ramp-Up Guide by Mann, Steven
Modifying Your Site Navigation in SharePoint 2013 by Mann, Steven
Information Computing and Applications: 4th International Conference, Icica 2013, Singapore, August 16-18, 2013. Revised Selected Papers, Part II by
Information Computing and Applications: 4th International Conference, Icica 2013, Singapore, August 16-18, 2013. Revised Selected Papers, Part I by
Frontiers in Internet Technologies: Second Ccf Internet Conference of China, Icoc 2013, Zhangjiajie, China. Revised Selected Papers by
Algorithms for Sensor Systems: 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Roboti by
How To Integrate BCS with Search in SharePoint 2013 by Mann, Steven
Wireless Sensors in Industrial Time-Critical Environments by Cecílio, José, Furtado, Pedro
Real-World Wireless Sensor Networks: Proceedings of the 5th International Workshop, Realwsn 2013, Como (Italy), September 19-20, 2013 by
Mobile Networks and Management: 5th International Conference, Monami 2013, Cork, Ireland, September 23-25, 2013, Revised Selected Papers by
SharePoint 2013 Solution Series Volumes 6-10 by Mann, Steven
SharePoint 2013 Solution Series Volumes 1-20 by Mann, Steven
SharePoint 2013 Solution Series Volumes 1-10 by Mann, Steven
SharePoint 2013 Solution Series Volumes 11-15 by Mann, Steven
SharePoint 2013 Solution Series Volumes 16-20 by Mann, Steven
Sicherheit in vernetzten Systemen: 21. DFN-Workshop by
AD Hoc Networks: 5th International Icst Conference, Adhocnets 2013, Barcelona, Spain, October 2013, Revised Selected Papers by
Collaborative Web Hosting: Challenges and Research Directions by Ahmed, Reaz, Boutaba, Raouf
Deep Space Telecommunications Systems Engineering by Administration, National Aeronautics and
Troubleshooting with Wireshark: Locate the Source of Performance Problems by Chappell, Laura
Packet Tracer Network Simulator by A, Jesin
Public Key Infrastructures, Services and Applications: 10th European Workshop, Europki 2013, Egham, Uk, September 12-13, 2013, Revised Selected Papers by
Designing New Routing Algorithms Optimized for Wireless Sensor Network by Kiani Farzad
Cooperative Malicious Nodes Detection and Removal Scheme in Manets by Sharma Saurabh, Gambhir Sapna
Verification, Model Checking, and Abstract Interpretation: 15th International Conference, Vmcai 2014, San Diego, Ca, Usa, January 19-21, 2014, Proceed by
Deployment of a Secure Voip System by Chowdhury Amel
Secure Cloud Computing by
IOS and OS X Network Programming Cookbook by Hoffman, Jon
Mobile Intention Recognition by Kiefer, Peter
Service Level Agreements for Cloud Computing by
Cross-Layer Treatment of Mobility for Manets and Dsrc/Wave Systems by Rahman Kazi Atiqur
Teoreticheskie Osnovy Sinteza Diskretnykh Signalov Dlya Dkm Radiokanalov by Gaychuk Dmitriy
Authentication Scheme for Dynamic Group Using Threshold Cryptography by Prabakar M. Amutha
Satellite Data Compression by
Resource Discovery: Using Network Traffic to Infer CPU and Memory Load by Watkins Lanier
Administering Arcgis for Server by Nasser, Hussein
Vmware Vsphere 5.X Datacenter Design Cookbook by Cartwright, Hersey
Getting Started with Citrix Provisioning Services 7.0 by Udayakumar, Puthiyavan
Location Privacy Preservation in Cognitive Radio Networks by Zhang, Qian, Wang, Wei
Feature Selection for Intrusion Detection Systems by Kumar Krishan, Kumar Gulshan, Kumar Yogesh
The State of the Art in Intrusion Prevention and Detection by
Wireless Sensor Networks: 11th European Conference, Ewsn 2014, Oxford, Uk, February 17-19, 2014, Proceedings by
How to Do Everything: Icloud, Second Edition by Rich, Jason R.
Effective Utilization of Buffers in 802.11 Based Wlan by Devana Rajeshwari
Security-Aware Cooperation in Cognitive Radio Networks by Zhang, Ning, Mark, Jon W.
Seamless and Secure Communications Over Heterogeneous Wireless Networks by Zhang, Chisheng, Cao, Jiannong
Route Optimization in Mobile IP by Kamel, Sherif
Proceedings of International Conference on Computer Science and Information Technology: Csait 2013, September 21-23, 2013, Kunming, China by
Self-Organizing Systems: 7th Ifip Tc6 International Workshop, Iwsos 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers by
Architecture of Computing Systems -- Arcs 2014: 27th International Conference, Lübeck, Germany, February 25-28, 2014, Proceedings by
Passive and Active Measurement: 15th International Conference, Pam 2014, Los Angeles, Ca, Usa, March 10-11, 2014, Proceedings by
Frontiers in Gaming Simulation: 44th International Simulation and Gaming Association Conference, Isaga 2013 and 17th Ifip Wg 5.7 Workshop on Experimen by
XML in der NC-Verfahrenskette: Die Optimierung des Informationsflusses im Kontext eines XML-basierten Dateiformates by Wagner, Christian
Secure and Anonymous Routing for Mobile Adhoc Networks by Jambulingam Vinothkumar
Remote Network Monitoring System by Samin, Pakeeza, Riaz, Rabia, Javied, Madiha
Raspberry Pi Server Essentials by Kula, Piotr
Recent Advances in Cognitive Radio Networks by Kontorovich, Valeri, Primak, Serguei, Filio Rodriguez, Oscar
Encryption System Appling The Dynamic Location Of Mobile Phone by Hamad, Hatem, El Kourd, Kaouther, El Kourd, Souhir
Networking Services: QoS, Signaling, Processes by Perros, Harry
Energy Detection for Spectrum Sensing in Cognitive Radio by Jiang, Hai, Atapattu, Saman, Tellambura, Chintha
Game Theoretic Approaches for Spectrum Redistribution by Wu, Fan
Enhanced Congestion Control for Internet Media Traffic by Adly, Mohammad
Energy Efficient Schemes for Wireless Sensor Networks by Murugan, Ananda
Intrusion Detection Using Artificial Intelligence Based Ensembles by Kumar Krishan, Kumar Gulshan, Singh Jabarweer
Wi-Fi Enabled Healthcare by Linton, Jon, McDonald, Douglas, II, Youssef, Ali
Communication and Networking by Kadhim, Laith
Mobile Video Communications by Chen Zhifeng, Wu Dapeng
Cross-Layer Approach for Seamless Vertical Handover in Networks by Jambulingam Vinothkumar
Communication Networks for Smart Grids: Making Smart Grid Real by Budka, Kenneth C., Deshpande, Jayant G., Thottan, Marina
Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware by
Penetration Testing with Backbox by Umit Uygur, Stefan
From the Web to the Grid and Beyond: Computing Paradigms Driven by High-Energy Physics by
Mosh (Mobile Shell): A New Era of Remote Access by Raj, Aditya
Understanding and Using the Controller Area Network Communication Protocol: Theory and Practice by Zeng, Haibo, Giusto, Paolo, Di Natale, Marco
Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises by Reed, Andy
Design of a Real-Time Tracking System using packet transfer delay by Moronkeji Taiwo
Metrics for Intrusion Detection in Wireless Sensor Networks by Thies, Daniel
Networked Audiovisual Systems by Grimes, Brad, Avixa Inc Na
Handbook of Research on Cloud Infrastructures for Big Data Analytics by
Quality of Experience: The Case of Voice Over IP by Jafarkarimi Hosein, Foroutani Saman, Dalvi Esfahani Mohammad
Design, Implementation and Evaluation of an Energy Rpl Routing Metric by Ferrari Gianluigi, Gonizzi Pietro, Demicheli Fabio
Can Delay Based Protocols Survive in Real World? by Kotla Kiran
Radio Resource Management Using Geometric Water-Filling by He, Peter, Zhao, Lian, Zhou, Sheng
Traffic Engineering Algorithms for IP and MPLS Networks by Nakibly, Gabi
Implementation and Evaluation of a Zigbee Network by Takpor Temitope
Cloud Computing for Enterprise Architectures by
Computación en la Nube by Arias, Angel
Modern Security Methods in Applied Computer Science by Ch, Rupa, P. S., Avadhani
Highly Consistent and Secured Data Delivery for Mobile Ad-Hoc Networks by Jambulingam Vinothkumar
Handbook of Optimization in Complex Networks: Theory and Applications by
Handbook of Optimization in Complex Networks: Communication and Social Networks by
Support Vector Machines Applications by
Measurement, Modeling and Evaluation of Computing Systems and Dependability and Fault Tolerance: 17th International Gi/ITG Conference, Mmb & DFT 2014, by
Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, Snds 2014, Trivandrum, India, March 13-14, 2014. by
Openshmem and Related Technologies. Experiences, Implementations, and Tools: First Workshop, Openshmem 2014, Annapolis, MD, Usa, March 4-6, 2014, Proc by
Engineering Secure Software and Systems: 6th International Symposium, Essos 2014, Munich, Germany, February 26-28, 2014. Proceedings by
PSTN-IP Telephony Gateway for Ensuring QoS in Heterogeneous Networks by Chakraborty, Chinmay
Web Information Systems Engineering - Wise 2013 Workshops: Wise 2013 International Workshops Bigwebdata, Mbc, Pcs, Steh, Quat, Sceh, and Stsc 2013, Na by
Analysis of VFSO System Integrated With BPLC by Sadegh Amiri, Iraj, M. Supa'at, Abu Sahmah, Alavi, Sayed Ehsan
ELSTER - Die elektronische Steuererklärung by Dieter, Susanne
Emerging Trends in Computing and Communication: Etcc 2014, March 22-23, 2014 by
Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks by Chen, Jiming, Li, Junkun, He, Shibo
Dynamic Provisioning for Community Services by Qi, Li, Jin, Hai
Security for Multi-Hop Wireless Networks by Shen, Mahmoud, Mohamed M. E. a.
Advances in Wireless Sensor Networks: 7th China Conference, Cwsn 2013, Qingdao, China, October 17-19, 2013. Revised Selected Papers by
Structured Object-Oriented Formal Language and Method: Third International Workshop, Sofl+msvl 2013, Queenstown, New Zealand, October 29, 2013, Revise by
Principles of Security and Trust: Third International Conference, Post 2014, Held as Part of the European Joint Conferences on Theory and Practice of by
Stable Throughput Regions in Wireless Networks by Ephremides, Anthony, Kompella, Sastry
An intelligent vertical handoff decision algorithm by V, Sureshkumar, Velusamy, Kaushik, D, Bhuvana
Efficient and Effective Algorithm for Wireless Networks by Misra, Rajiv, Das, Debasis, Chaturvedi, Swati
BGP for Cisco Networks: A CCIE v5 guide to the Border Gateway Protocol by Fordham, Stuart D.
Learning Nagios 4 by Kocjan, Wojciech
Running Mainframe Z on Distributed Platforms: How to Create Robust Cost-Efficient Multiplatform Z Environments by Barrett, Kenneth, Norris, Stephen
Implementing Samba 4 by Leal, Marcelo
Architectures of Small-Cell Networks and Interference Management by Le-Ngoc, Tho, Ngo, Duy Trong
Network Hardening: An Automated Approach to Improving Network Security by Albanese, Massimiliano, Jajodia, Sushil, Wang, Lingyu
Guide to OSI and TCP/IP Models by Alani, Mohammed M.
Building Information Modeling (BIM) in der Planung von Bauleistungen by Albrecht, Matthias
Resource Management for Heterogeneous Networks in Lte Systems by Qian, Yi, Hu, Rose Qingyang
Linear Network Error Correction Coding by Guang, Xuan, Zhang, Zhen
Vmware Horizon Workspace Essentials by Bjork, Peter, Lindberg, Joel, Von Oven, Peter
Cloud Computing: Eine kritische Analyse des Cloud Computings im gewerblichen Bereich by Burkert, Matthias
Intelligence for Embedded Systems: A Methodological Approach by Alippi, Cesare
Attachment Transmission in Wireless Networks by Hamdi, Mounir, Wang, Lu, Wu, Kaishun
Cloud Data Management by Zhao, Liang, Sakr, Sherif, Liu, Anna
Libro Cientifico: Investigaciones En Tecnologias de Informacion Informatica y Computacion by Vasquez, Jorge
Libro Cientifico: Investigaciones En Tecnologias de Informacion Informatica y Computacion by Vasquez, Jorge
Recent Advances in Information Technology: Rait-2014 Proceedings by
Distributed Computer and Communication Networks: 17th International Conference, Dccn 2013, Moscow, Russia, October 7-10, 2013. Revised Selected Papers by
Pro Angularjs by Freeman, Adam
Digital Libraries Applications by Fox, Edward a., Leidig, Jonathan P.
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps: Sicherheitsanalyse von Microsoft Komponenten by Szameitat, Daniel
Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments by
Computational Linguistics and Intelligent Text Processing: 15th International Conference, Cicling 2014, Kathmandu, Nepal, April 6-12, 2014, Proceeding by
Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education by
Computational Linguistics and Intelligent Text Processing: 15th International Conference, Cicling 2014, Kathmandu, Nepal, April 6-12, 2014, Proceeding by
Controller Area Network Prototyping with Arduino by Voss, Wilfried
Modeling and Analysis of Voice and Data in Cognitive Radio Networks by Gunawardena, Subodha, Zhuang, Weihua
Secure Data Communication in Wireless Sensor Networks by Shaila K., Venugopal K. R.
Der DDS Standard im praktischen Einsatz by Mayer Viktor
Energy Efficient Data Communication for Resource Constrained Systems by Ahsan Rajon S. a.
Digital Library Technologies by Da Silva Torres, Ricardo, Fox, Edward a.
Elimination of Security Threats Using Trusted Proactive Routing by Jaiswal Shilpa
Traffic Monitoring and Analysis: 6th International Workshop, Tma 2014, London, Uk, April 14, 2014, Proceedings by
Cloud Computing: A Hands-On Approach by Bahga, Arshdeep, Madisetti, Vijay
Lets VDIfy Our Systems: What is the Virtual Desktop ? by Alshafee, Khalid
Information Security Practice and Experience: 10th International Conference, Ispec 2014, Fuzhou, China, May 5-8, 2014, Proceedings by
Mitigating congestion and collision in adhoc networks by Natarajan Premalatha
A Computational Model for Adaptive Communication Channel Estimation by Solomon Akinboro
The Book on Networks: Everything you need to know about the Internet, Online Security and Cloud Computing. by Fisher, Robin
Enabling Content Distribution in Vehicular AD Hoc Networks by Luan, Tom H., Bai, Fan, Shen
Enabling Secure and Privacy Preserving Communications in Smart Grids by Li, Hongwei
Applied Optimization Methods for Wireless Networks by Hou, Y. Thomas, Shi, Yi, Sherali, Hanif D.
Algoritmy Verifikatsii I Proizvoditel'nosti Setevykh Protokolov by Saidakhmedov Shavkat
Autonomic Computing Enabled Cooperative Networked Design by Wódczak, Michal
Mining Text Data by
Technological Innovation for Value Creation: Third Ifip Wg 5.5/Socolnet Doctoral Conference on Computing, Electrical and Industrial Systems, Doceis 20 by
Future Wireless and Optical Networks: Networking Modes and Cross-Layer Design by Jiang, Shengming
Logic and Algebra of Specification by
Elasticsearch Server Second Edition by Ku, Rafa, Rogozi Ski, Marek
Localization in GSM Mobile Radio Networks by Zahoransky, Richard M.
Advances in Real-Time Systems by
Collaboration with Cloud Computing: Security, Social Media, and Unified Communications by Messier, Ric
Learning Veeam(r) Backup and Replication for Vmware Vsphere by Mohn, Christian
Exchange Online Fast Start: A Quick Start Guide for Exchange Online, Office 365 and Windows Azure by Training Solutions, Smart Brain
Using Security Patterns in Web -Application by Alam, Shahnawaz
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense by Mason, Andrew, Ackroyd, Richard, Watson, Gavin
Designing a Digital Future: Report to the President and Congress by Executive Office of the President
Secure Routing in Wireless Mobile Ad Hoc Network by Sharma Govind, Pathak Ram, Mishra Manuj
Evolutionary Algorithms for Mobile AD Hoc Networks by Dorronsoro, Bernabé, Ruiz, Patricia, Danoy, Grégoire
XML Fast Start: A Quick Start Guide for XML by Training Solutions, Smart Brain
Ethernet: The Definitive Guide: Designing and Managing Local Area Networks by Zimmerman, Joann, Spurgeon, Charles
Advancing Embedded Systems and Real-Time Communications with Emerging Technologies by
Heroku Cloud Application Development by Hanjura, Anubhav
Fundamentals of Diffusion-Based Molecular Communication in Nanonetworks by Pierobon, Massimiliano, Akyildiz, Ian F.
Routing Protocols for Mobile Ad-Hoc Network by Srivastava Supriya
Windows 7 Fast Start: A Quick Start Guide for Windows 7 by Training Solutions, Smart Brain
Body Sensor Networks by
Frontier and Innovation in Future Computing and Communications by
Distributed Context-Aware Systems by Ferreira, Paulo, Alves, Pedro
Economics & Material Platform of Bidirectional Transceiver for POF by Gusho, Genta
Ranking for Web Data Search Using On-The-Fly Data Integration by Herzig, Daniel Markus
Secure and Efficient IP Mobility Support for Aeronautical Communications by Bauer, Christian
Cloud Computing: 4th International Conference, Cloudcomp 2013, Wuhan, China, October 17-19, 2013, Revised Selected Papers by
Security Advancement in ZRP based Wireless Networks by Shree, Raj, Pandey, Ravi Prakash
Smart Meter Networks: Intrusion Detection System by Design by Beigi-Mohammadi, Nasim
Satellite Network Robust Qos-Aware Routing by Long, Fei
Use of JXTA Technology For Network Based Parallel Processing by Hirave, Tejas, Surve, Sakshi, Malgaonkar, Saurabh
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach: Security in Cloud Computing by Dhivakar, Ashwin
Cloud Computing Basics by Srinivasan, S.
See More