• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2015

Mitigation of Passive Wormhole Attack in Wireless Sensor Network by Modirkhazeni Ali
Wireless Sensor Networks: Distributed Consensus Estimation by Chen, Cailian, Zhu, Shanying, Guan, Xinping
Healthcare Information Security and Privacy by Murphy, Sean P.
Verification, Model Checking, and Abstract Interpretation: 16th International Conference, Vmcai 2015, Mumbai, India, January 12-14, 2015, Proceedings by
Privacy Preserving Data Mining by Bhattacharyya Amit, Bhattacharyya Shampa
Choosing Neural Equalizers Using Genetic Algorithm by Leal Jorgean, Lima Antônio Cezar, Mota Tiago
Economics of Grids, Clouds, Systems, and Services: 11th International Conference, Gecon 2014, Cardiff, Uk, September 16-18, 2014. Revised Selected Pap by
Computación en la Nube: Segunda Edición by Arias, Angel
On the Design of High Performance Data Center Networks by Guo Zhiyang
An Open Service Architecture For Next Generation Mobile Devices by Amaravadi Chandra
Fundamentos de Redes Informáticas by Rivera Darin, Jonathan
Automation Using Data Aggregation in Wireless Sensor Networks by Oza Parita, Sharma Priyanka
Algorithms for Sensor Systems: 10th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robot by
Analysis and Design of Networked Control Systems by Xie, Lihua, You, Keyou, Xiao, Nan
Time Stamped Proxy Blind Signature Scheme with Proxy Revocation by Panda Suryakanta
Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks by Chaubey Nirbhay
Cyber Defense and Situational Awareness by
Cabling Part 2 Fiber-Optic by Woodward
Enterprise Client Management: Using System Center 2012 R2 and Windows Server 2012 R2 by Nilimaa-Svärd, Tim, Stenhall, Andreas
Transferring data by network by Hasson Issam Hammodi
Cabling Part 1 LAN Networks by Oliviero
Transmission Control Protocol over 4G LTE-Advanced Networks by Abed Ghassan
Effect of Network topology on Routing Protocol's Efficiency by Bag Banibrata, Das Akinchan, Satpathy Pinaki
SLM based PAPR reduction in Wireless Communication System by Mishra Madhusmita, Mishra Himanshu Bhusan, Patra Sarat Kumar
Next Generation Wireless LAN by
High Income, Zero Debt Strategies for Network Marketers: Easy, Effective, and Free Ways on How to Boost Your Network Marketing Business by Higgins, Leanne Toinette
Cooperative Wireless Communications and Networking by Rashid Syed Zahidur
Радиомодемы by Маргарян &#1
Mathematical and Engineering Methods in Computer Science: 9th International Doctoral Workshop, Memics 2014, Telč, Czech Republic, October 17--19, by
Deploying and Managing a Cloud Infrastructure: Real-World Skills for the Comptia Cloud+ Certification and Beyond: Exam Cv0-001 by Ul Haq, Salman, Salam, Abdul, Gilani, Zafar
Social Cognitive Radio Networks by Huang, Jianwei, Chen, Xu
Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers by
Learning Apex Programming by Kaufman, Matt
Network-Based Parallel Communications by Rashid Syed Zahidur
Cryptography and Chaos a New Approach in Network Security by Kumar Aditya
Computational Intelligence for Traffic and Mobility by
Active Directory with PowerShell by Pamarthi, Sitaram
Computer Network Security Monitoring by Rashid Syed Zahidur
Research and Applications in Global Supercomputing by
Wimax: Service Standards and Resource Allocation by
Penetration Testing with Raspberry Pi by Lakhani, Aamir, Muniz, Joseph
Lync Server 2013 Cookbook by Giombini, Alessio, Vargas, Antonio, Volpe, Fabrizio
Learning Saltstack by Myers, Colton
Python Penetration Testing Essentials by Mohit
ElasticSearch Cookbook Second Edition by Paro, Alberto
Sicherheit in vernetzten Systemen: 22. DFN-Konferenz by
Mastering Gephi Network Visualization: Produce advanced network graphs in Gephi and gain valuable insights into your network datasets by Cherven, Ken
TCP Fundamentals and Implementation using Network Simulator 2 by Abed Ghassan
Microsoft Hyper-V PowerShell Automation by Menon, Vinith
Study of Cluster Based Algorithm in MANET using Network Simulator by Paul Suman
Web Service Network Analysis by Gade Avani
SMS Encryption Using RC4 with Dynamic Key Based on Android by Taha Ahmed Saja, E. George Loay
A Data Mining Approach to Network Intrusion Detection by Panda Mrutyunjaya, Patra Manas Ranjan
Determination of Optimal Power for Wireless Sensor Networks (WSNs) by Yusuf Ali Okhamila
Nature of Computation and Communication: International Conference, Ictcc 2014, Ho CHI Minh City, Vietnam, November 24-25, 2014, Revised Selected Paper by
Qos Management of Web Services by Zheng, Zibin, Lyu, Michael R.
Guide to Voice and Video Over IP: For Fixed and Mobile Networks by Jammeh, Emmanuel, Sun, Lingfen, Mkwawa, Is-Haka
Sistema para el procesamiento de trazas de servicios telemáticos by Rivero Pérez Jorge Luis, Gómez Alexis
Wireless Sensor Networks: 12th European Conference, Ewsn 2015, Porto, Portugal, February 9-11, 2015, Proceedings by
Preemptive Dynamic Source Routing for Mobile Ad-Hoc Networks by Ramesh V., Subbaiah P.
Engineering Secure Software and Systems: 7th International Symposium, Essos 2015, Milan, Italy, March 4-6, 2015, Proceedings by
Quis custodiet custodes?: Wer bewacht die Wächter? Eine einfache, praxisorientierte Anleitung, wie Sie Emails und Dateien mit PGP oder S/MIME sc by Schäffer, Florian
"Consumerization of IT: Buzzword 2011 - Analyse von Chancen und Gefahren by Franke, Christopher
Proceedings of the 4th International Conference on Computer Engineering and Networks: Cenet2014 by
Data Communications and Networking: Volume II by
Data Communications and Networking: Volume I by
Pesba: A real time billing smart meter architecture by Dhar Rishab
A Digital Phase Locked Loop Based Signal and Symbol Recovery System for Wireless Channel by Purkayastha, Basab Bijoy, Sarma, Kandarpa Kumar
Important Concepts in Wimax by
Neironu tīklu modeļu lietosana interneta datplūsmas prognozēsanā by Rutka Gundega
An improved multi-SOM algorithm by Khanchouch Imen
Resource reconfiguration in heterogeneous wireless environments by Atanasovski Vladimir
Mastering the Nmap Scripting Engine by Calderón Pale, Paulino
A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm: A Model To Enhance The Performance Of Cloud by Manisekaran, Pradheep
Correlação de alarmes by Proença Jr Mario L, Amaral Alexandre a., Mendes Leonardo S.
Computational Intelligence Applications in Smart Grids: Enabling Methodologies for Proactive and Self-Organizing Power Systems by
VMware vRealize Orchestrator Cookbook by Langenhan, Daniel
A Journey starts from basic understanding of NS2 To NS3 by Kharga Pooja, Jha Rakesh Kumar
Intel Galileo Essentials by Grimmett, Richard
Zabbix Network Monitoring Essentials by Kewan Lee, Stefano, Dalle Vacche, Andrea
VMware vSphere 5.5 Cookbook by G. B., Abhilash
Cloud Data Centers and Cost Modeling: A Complete Guide to Planning, Designing and Building a Cloud Data Center by Buyya, Rajkumar, Wu, Caesar
A Study of Internet Services Performance of Higher Institutions by Adaramola Michael
Green Information Technology: A Sustainable Approach by Akhgar, Babak, Dastbaz, Mohammad, Pattinson, Colin
Energy Efficient Networking Systems and Communication Technologies by
Design, Implementation and test of Wireless Sensor Networks by Al Abboodi Adil, Sikora Axel
Cloud Computing and Cyber Security by Rashid Syed Zahidur
Dynamic Spectrum Auction in Wireless Communication by Chen, Yanjiao, Zhang, Qian
Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide by Crawley, Don R.
Advanced Windows Deployments Using 1E Software by Kawula, Dave, Cabot, Emile
Mobile Networks and Management: 6th International Conference, Monami 2014, Würzburg, Germany, September 22-26, 2014, Revised Selected Papers by
Handbook of Computer Networks and Communications: Volume I by
Handbook of Computer Networks and Communications: Volume II by
Guide to High Performance Distributed Computing: Case Studies with Hadoop, Scalding and Spark by Muppalla, Anil Kumar, Srinivasa, K. G.
Troubleshooting und Monitoring von Exchange und Office 365: Best Practices, Anleitungen, Tools und SCOM 2012 R2 by Joos, Thomas
Traffic Management and Performance Evaluation of Information Systems by Sharma Vidushi
Softswitch: Charging, Accounting and Billing by Chakraborty Partha Sarathi
Getting Started with OpenBTS: Build Open Source Mobile Networks by Iedema, Michael
Configurando o Hadoop 1.x by Sampaio Lívia, Lopes Raquel, Sarmento Neto Geraldo Abrantes
Ad-Hoc Networks and Wireless: Adhoc-Now 2014 International Workshops, Etsd, Marss, Mwaon, Secan, Sspa, and Wisarn, Benidorm, Spain, June 22--27, 201 by
Social Informatics: Socinfo 2014 International Workshops, Barcelona, Spain, November 11, 2014, Revised Selected Papers by
Die Eignung Neuronaler Netze für die Mining-Funktionen Clustern und Vorhersage by Zabel, Thomas
Solving Software Challenges for Exascale: International Conference on Exascale Applications and Software, Easc 2014, Stockholm, Sweden, April 2-3, 201 by
Wireless Device-To-Device Communications and Networks by Han, Zhu, Song, Lingyang, Niyato, Dusit
Li-FI Technology for Indoor Access by Gado Mohamed, Abd El-Moghith Doaa
Computational Intelligence for Security in Named Data Networking by Karami Amin
Pragmatic Analysis of An Anonymous Network by Islam Nazmul, Pervin Jahanara
Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Cache, Johnny, Wright, Joshua
Energy Efficient Data Centers: Third International Workshop, E2dc 2014, Cambridge, Uk, June 10, 2014, Revised Selected Papers by
Codificação de vídeo adaptativa para transmissão em redes sem fio by Leite Moraes de Sousa Rafael
Wireless Sensor and Mobile Ad-Hoc Networks: Vehicular and Space Applications by
Cmdb Systems: Making Change Work in the Age of Cloud and Agile by Sturm, Rick, Twing, Dan, Drogseth, Dennis
An Efficient Location-Aided ACO based routing Algorithm for MANETs by Jadhav Ashish, Bandgar Ajit, Wadekar Renuka
Zabbix Cookbook by Uytterhoeven, Patrik
Spectrum Sharing for Wireless Communications by Xin, Chunsheng, Song, Min
Social Sensing: Building Reliable Systems on Unreliable Data by Kaplan, Lance, Wang, Dong, Abdelzaher, Tarek
Networking the Complete Reference, Third Edition by Sandberg, Bobbi
Sae J1939 ECU Programming & Vehicle Bus Simulation with Arduino by Voss, Wilfried
Human Centered Computing: First International Conference, Hcc 2014, Phnom Penh, Cambodia, November 27-29, 2014, Revised Selected Papers by
Dynamic Spectrum Access for Wireless Networks by Song, Min, Rawat, Danda B., Shetty, Sachin
Structural Processing for Wireless Communications by Tao, Xiaoming, Ge, Ning, Lu, Jianhua
Development of Wireless IP Camera for Internet using Mobile Robot by Shukran Mohd Afizi, Maskat Kamaruzaman
Cloud Computing: 5th International Conference, Cloudcomp 2014, Guilin, China, October 19-21, 2014, Revised Selected Papers by
Enterprise Governance of Information Technology: Achieving Alignment and Value, Featuring Cobit 5 by de Haes, Steven, Van Grembergen, Wim
Passive and Active Measurement: 16th International Conference, Pam 2015, New York, Ny, Usa, March 19-20, 2015, Proceedings by
Architecture of Computing Systems - Arcs 2015: 28th International Conference, Porto, Portugal, March 24-27, 2015, Proceedings by
Interoperability and Open-Source Solutions for the Internet of Things: International Workshop, Fp7 Openiot Project, Held in Conjunction with Softcom 2 by
Topics in Cryptology -- Ct-Rsa 2015: The Cryptographer's Track at the Rsa Conference 2015, San Francisco, Ca, Usa, April 20-24, 2015. Proceedings by
Cloud Computing ALS Neue Herausforderung Für Management Und It by Reti, Martin, Münzl, Gerald, Pauly, Michael
Advanced Quality of Service (QoS) by Rashid Syed Zahidur
Hybrid PON Networks - features, architectures and configuration by Róka Rastislav
Traffic Monitoring and Analysis: 7th International Workshop, Tma 2015, Barcelona, Spain, April 21-24, 2015. Proceedings by
Lightweight Cryptography for Security and Privacy: Third International Workshop, Lightsec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selecte by
Energy Efficient Servers: Blueprints for Data Center Optimization by Saunders, Winston, Gough, Corey, Steiner, Ian
Cloud Portability and Interoperability: Issues and Current Trends by Cretella, Giuseppina, Esposito, Antonio, Di Martino, Beniamino
Applications of Evolutionary Computation: 18th European Conference, Evoapplications 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings by
Opportunistic Spectrum Sharing in Cognitive Radio Networks by Zhang, Wei, Wang, Zhe
Delivery and Adoption of Cloud Computing Services in Contemporary Organizations by
Resource Management of Mobile Cloud Computing Networks and Environments by
Emerging Research in Cloud Distributed Computing Systems by
Home Automation with Intel Galileo by Dundar, Onur
Embedded Linux Projects Using Yocto Project Cookbook: Over 70 hands-on recipes for professional embedded Linux developers to optimize and boost their by González, Alex
Dynamic Routing and Resource Allocation in Elastic Optical Networks by Sayyad Khodashenas Pouria
Functional Behaviour & Vulnerabilities Of Address Resolution Protocol by Sadasivam Vidya
Effective Ant Based Routing Algorithm for Data Replication in MANETS by Nandhini N. J. Nithya, Ramesh S.
Ecological Design of Smart Home Networks: Technologies, Social Impact and Sustainability by
Social Media and Library Services by Mon, Lorri
Managing Microsoft Hybrid Clouds by Van Den Berg, Marcel
Look Smarter Than You are with Essbase 11.1.2: An Administrator's Guide by McMullen, Tracy, Gideon, Robert, Roske, Edward
Cross-Layer Design in Optical Networks by
Estudio y diseño de una Red GPON de última milla by Cevallos, Ramiro, Montalvo, Richard
Communication Technologies for Vehicles: 8th International Workshop, Nets4cars/Nets4trains/Nets4aircraft 2015, Sousse, Tunisia, May 6-8, 2015. Proceed by
Development of Communication System WiMAX by Ahmed Ameen, Siddiqui Adnan Ahmed, Sandhu Muhammad Abdullah
Principles of Security and Trust: 4th International Conference, Post 2015, Held as Part of the European Joint Conferences on Theory and Practice of So by
Progress in Cryptology - Latincrypt 2014: Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil by
Technological Innovation for Cloud-Based Engineering Systems: 6th Ifip Wg 5.5/Socolnet Doctoral Conference on Computing, Electrical and Industrial Sys by
Accountability and Security in the Cloud: First Summer School, Cloud Accountability Project, A4cloud, Malaga, Spain, June 2-6, 2014, Revised Selected by
The Paradigm Shift to Multimodality in Contemporary Computer Interfaces by Cohen, Philip R., Oviatt, Sharon
Wep: A New Protocol for Heterogeneous Wireless Sensor Networks by Kabir MD Hasnat, Rashed MD Golam
Ubiquitous Computing Application and Wireless Sensor: Ucawsn-14 by
Analysis of Computer Networks by Gebali, Fayez
Understanding the Social in Social Media: How to Grow Your Business by Being Successfully Social by Ellwood, Taylor
Data Analysis on Multinode Cluster using Hadoop by Singh Kamalpreet
System Center 2012 R2 Operations Manager Deployment and Administration Cookbook by Beaumont, Steve, Ryan, Robert, Odika, Chiyo
Expanding data exchange capabilities for RTDS by Berger Andreas
Foundations and Practice of Security: 7th International Symposium, Fps 2014, Montreal, Qc, Canada, November 3-5, 2014. Revised Selected Papers by
Routing Protocols For Mobile Wireless Sensor Networks by Aseri Trilok C., Kaur Ravinder
A Proposal Of Automation Methodology Based On Algorithmic Approach by Mahalakshmi Donepudi, Venumadhavarao S. P., S.
Investigation on Novel Based Bio-Inspired Algorithms in MANET Routing by Chinnusamy Rajan, Kandhasamy Geetha, Chinnusamy Rasi Priya
Stochastic Petri Nets for Wireless Networks by Lin, Chuang, Zhong, Zhangdui, Lei, Lei
Information Security Practice and Experience: 11th International Conference, Ispec 2015, Beijing, China, May 5-8, 2015, Proceedings by
Computational Linguistics and Intelligent Text Processing: 16th International Conference, Cicling 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, by
Computational Linguistics and Intelligent Text Processing: 16th International Conference, Cicling 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, by
Sounding and Communication Techniques for Long Haul HF Links by Bergadà Pau
Mobility Management in IP Based Network by Saha Sajal, Mukhopadhyay Asish K., Bbhattacharjee Anup Kumar
Cyber Warfare: Building the Scientific Foundation by
Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field by O'Gara, Adrian
Untersuchungen zum Einsatz von Peer-to-Peer-Techniken im Gridcomputing by Lehmann Christian
Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications by
openFrameworks Essentials by Tatarnikov, Igor, Perevalov, Denis
Structured Object-Oriented Formal Language and Method: 4th International Workshop, Sofl+msvl 2014, Luxembourg, Luxembourg, November 6, 2014, Revised S by
Methodology to Assess the User's Perception of Quality of Service by Babulak Eduard
Learning Force.com Application Development by Madusanka, Chamil
Raspberry Pi Essentials by Creasey, Jack
CentOS High Availability by Resman, Mitja
OpenFlow Cookbook by Smiler, Kingston
Wireless Rechargeable Sensor Networks by Wang, Cong, Yang, Yuanyuan
E-Infrastructure and E-Services for Developing Countries: 6th International Conference, Africomm 2014, Kampala, Uganda, November 24-25, 2014, Revised by
Frontiers in Internet Technologies: Third Ccf Internet Conference of China, Icoc 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers by
Efficient Routing Algorithms for Wireless Mesh Networks by Zhao Liang
High Performance Computing for Computational Science -- Vecpar 2014: 11th International Conference, Eugene, Or, Usa, June 30 -- July 3, 2014, Revised by
Kunsthandel im Informationszeitalter: Welche Rolle spielen Informationssysteme in Galerien? by Wiegand, Daniel
Avaliação do consumo de energia em redes DTN by Santana Batista Thiago, Aurélio Spohn Marco
Intelligent Mobile Ad-Hoc Network Routing Protocols by Sayed Ali Ahmed
QoS-Aware Data Query and Transmission in Mobile Opportunistic Networks by Liu Yang
A Guide to Enterprise Networking Technology: Volume 1 by Devaraj, Manju
Analytical and Stochastic Modelling Techniques and Applications: 22nd International Conference, Asmta 2015, Albena, Bulgaria, May 26-29, 2015. Proceed by
Risks and Security of Internet and Systems: 9th International Conference, Crisis 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers by
Internet Science: Second International Conference, Insci 2015, Brussels, Belgium, May 27-29, 2015, Proceedings by
Distributed Applications and Interoperable Systems: 15th Ifip Wg 6.1 International Conference, Dais 2015, Held as Part of the 10th International Feder by
See More