• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2015

Sensor Systems and Software: 5th International Conference, S-Cube 2014, Coventry, Uk, October 6-7, 2014, Revised Selected Papers by
Software Engineering Frameworks for the Cloud Computing Paradigm by
Information Security Education Across the Curriculum: 9th Ifip Wg 11.8 World Conference, Wise 9, Hamburg, Germany, May 26-28, 2015, Proceedings by
Optimal Chunk-Based Network Scheduling by He Tianzhou
ICT Systems Security and Privacy Protection: 30th Ifip Tc 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings by
Extensão de funcionalidade IPsec para suportar serviços sintonizáveis by Oliveira Elias Carneiro de
Sistema de Detecção de Anomalias Utilizando Análise de Fluxos by Fernandes Jr. Gilberto, Proença Jr Mario L
Inclusive Smart Cities and E-Health: 13th International Conference on Smart Homes and Health Telematics, Icost 2015, Geneva, Switzerland, June 10-12, by
Mastering vRealize Operations Manager by Norris, Scott
Theory and Applications of Applied Electromagnetics: Appeic 2014 by
VPNs and NAT for Cisco Networks: A CCIE v5 guide to Tunnels, DMVPN, VPNs and NAT by Fordham, Stuart D.
OpenStack Essentials by Radez, Dan
Enhanced Probabilistic Broadcasting Scheme for Routing in MANETs by Hanashi Abdalla Musbah Omar
Introduction to Networking: How the Internet Works by
Nmap Essentials by Shaw, David
Building Network and Servers Using Beaglebone by Pretty, Bill, Veer, Glenn Vander
Chef Infrastructure Automation Cookbook - Second Edition by Marschall, Matthias
Gephi Cookbook by Khokhar, Devangana
Handbook of Research on Redesigning the Future of Internet Architectures by
Datensicherheit und Datenschutz im Cloud Computing. Fallstudie und kritische Analyse: Dropbox und JiffyBox by Michl, Johannes
Future Network Systems and Security: First International Conference, Fnss 2015, Paris, France, June 11-13, 2015, Proceedings by
Delay Tolerant Networks by Yu, Shui, Luan, Tom H., Gao, Longxiang
Cognitive Wireless Networks by Zhang, Qixun, Zhang, Ping, Feng, Zhiyong
Advances in Wireless Sensor Networks: The 8th China Conference, Cwsn 2014, Xi'an, China, October 31--November 2, 2014. Revised Selected Papers by
Linux Web Server Development: A Step-by-Step Guide for Ubuntu, Fedora and other Linux Distributions (Colored Edition) by Karayiannis, Christos
Masterkurs Parallele Und Verteilte Systeme: Grundlagen Und Programmierung Von Multicore-Prozessoren, Multiprozessoren, Cluster, Grid Und Cloud by Kunze, Marcel, Bengel, Günther, Baun, Christian
The Theory and Reality of Wireless LAN Security: Final Year project by Halapacz, Tomasz
Linux Web Server Development: A Step-by-Step Guide for Ubuntu, Fedora, and other Linux Distributions by Karayiannis, Christos
Distributed Graph Algorithms for Computer Networks by Erciyes, Kayhan
Amplify-And-Forward Relaying in Wireless Communications by Tran, Nghi, Le-Ngoc, Tho, Rodríguez, Leonardo Jiménez
Advanced Multimedia and Ubiquitous Engineering: Future Information Technology by
Computer Networks: 22nd International Conference, Cn 2015, Brunów, Poland, June 16-19, 2015. Proceedings by
Next-Generation High-Speed and High-Capacity Optical Interconnect by Ismail, Tawfik
Wireless Internet: 8th International Conference, Wicon 2014, Lisbon, Portugal, November 13-14, 2014, Revised Selected Papers by
Compressed Sensing for Distributed Systems by Coluccia, Giulio, Ravazzi, Chiara, Magli, Enrico
Intelligent Mechanisms for Network Configuration and Security: 9th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and by
Ad-Hoc, Mobile, and Wireless Networks: 14th International Conference, Adhoc-Now 2015, Athens, Greece, June 29 -- July 1, 2015, Proceedings by
SAP BI Analysis Office - a Practical Guide by Boeke, Joerg
Radio Access Technology Selection in Heterogeneous Wireless Networks by El Helou, Melhem
QoS and Performance Optimization in Cloud Computing by Bheda Hitesh
Vehicular AD Hoc Networks: Standards, Solutions, and Research by
Next-Generation Wireless Technologies: 4g and Beyond by
Routing in Opportunistic Networks by
LAN-uppgradering by Israelsson Dennis
Intelligent Cities: Enabling Tools and Technology by Raman, Anupama C., Raj, Pethuru
Broadcast Algorithm for Wireless Networks by Das Debasis, Goel Ashima, Misra Rajiv
Learning Python Network Programming: Utilize Python 3 to get network applications up and running quickly and easily by Sarker, M. Omar Faruque, Washington, Sam
Trust Management VII: 7th Ifip Wg 11.11 International Conference, Ifiptm 2013, Malaga, Spain, June 3-7, 2013, Proceedings by
Deploying Node.js by Pasquali, Sandro
VMware vSphere Design Essentials by Udayakumar, Puthiyavan
Learning RHEL Networking by Mallett, Andrew
Apache Oozie: The Workflow Scheduler for Hadoop by Islam, Mohammad, Srinivasan, Aravind
Routing and Wavelength Assignment in Optical Burst Switching Networks by Kozák Milos
The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems by
Intelligent Cloud Computing: First International Conference, ICC 2014, Muscat, Oman, February 24-26, 2014, Revised Selected Papers by
Sistema informático para la gestión de salvas de correo electrónico by Rivero Pérez, Jorge Luis
Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution by Teti, Antonio
Mac Protocols for Cyber-Physical Systems by Rahim, Azizur, Xia, Feng
Finite Difference Methods, Theory and Applications: 6th International Conference, Fdm 2014, Lozenetz, Bulgaria, June 18-23, 2014, Revised Selected Pap by
Google Adwords For Beginners: Learn How to Advertise, Market Products and Services Effectively Using Google Adwords Ads by Blake, Dale
Immersed in Media: Telepresence Theory, Measurement & Technology by
Vehicular AD Hoc Network Security and Privacy by Lin, Xiaodong, Lu, Rongxing
High Performance Computing: 30th International Conference, Isc High Performance 2015, Frankfurt, Germany, July 12-16, 2015, Proceedings by
SOA Patterns with BizTalk Server 2013 - Second Edition by Cooper, Johann, Seroter, Richard, Brimble, Mark
Generation and Simulation of Clutter for RADAR Testing Using FPGA by Thottempudi Pardhu
PolicyFlow by Albuquerque de França Joseilson
Automata, Languages, and Programming: 42nd International Colloquium, Icalp 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part II by
Investigation of QoS in VoIP over WiFi Coexisting with WiMAX Networks by Karuppanan Sakthisudhan
Enterprise 2.0: Challenges of Leadership by Landlinger Monika
Network Science and Cybersecurity by
Design and Development of Rate Control Protocol (RCP) to RCP++ by Gonsai Atulgiri Mayagiri
A Teleconferencing-enabled Network Using Session Initiation Protocol by Eze Peter
Automata, Languages, and Programming: 42nd International Colloquium, Icalp 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I by
Cloud Computing: Methods and Practical Approaches by
Energy Efficient Routing in Mobile Ad-hoc Networks For Healthcare Env by Abid Sohail
Cognitive Interference Management in Heterogeneous Networks by Fantacci, Romano, Marabissi, Dania
Universal Access in Human-Computer Interaction. Access to Interaction: 9th International Conference, Uahci 2015, Held as Part of Hci International 201 by
Tuple Spaces on the Cell Processor by Wallnöfer Matthias Dieter
Designing Multicast Wireless Sensor Network by Pradhan Pradhnya, Jaini Prachi, Sen Dr a. K.
Internet of Things. Iot Infrastructures: First International Summit, Iot360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers, Part II by
Internet of Things. User-Centric Iot: First International Summit, Iot360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers, Part I by
Parallel Programming: For Multicore and Cluster Systems by Rauber, Thomas, Rünger, Gudula
3D Research Challenges in Cultural Heritage: A Roadmap in Digital Heritage Preservation by
Analyse von Krankheitsnetzwerken auf Basis einer Krankheitsontologie by Borgsmüller Nico
Radio Frequency Source Coding Made Easy by Faruque, Saleh
Computational Science and Its Applications -- Iccsa 2015: 15th International Conference, Banff, Ab, Canada, June 22-25, 2015, Proceedings, Part IV by
Warwalking by Abdul Halim Syafnidar
Consumo de energia e qualidade do serviço em redes IEEE802.11 by Moreira Mota Lia Toledo, Biazotto Luiz Henrique, de Assis Mota Alexandre
Computing and Combinatorics: 21st International Conference, Cocoon 2015, Beijing, China, August 4-6, 2015, Proceedings by
Computational Science and Its Applications -- Iccsa 2015: 15th International Conference, Banff, Ab, Canada, June 22-25, 2015, Proceedings, Part I by
Computational Science and Its Applications -- Iccsa 2015: 15th International Conference, Banff, Ab, Canada, June 22-25, 2015, Proceedings, Part II by
Computational Science and Its Applications -- Iccsa 2015: 15th International Conference, Banff, Ab, Canada, June 22-25, 2015, Proceedings, Part V by
Computational Science and Its Applications -- Iccsa 2015: 15th International Conference, Banff, Ab, Canada, June 22-25, 2015, Proceedings, Part III by
Experimentalanalyse diverser Brute-Force-Mechanismen in Linux Kali. Passwortsicherheit und Passwortkomplexität by Dinhof, Lucas
Information Communication by Feicheng, Ma
Big Data Computing and Communications: First International Conference, Bigcom 2015, Taiyuan, China, August 1-3, 2015, Proceedings by
Utilizando a rede no controle de congestionamento do TCP by C. G. Wille Emilio, Talau Marcos
Improving Performance of Routing Protocols Using MRP Framework by Abid Sohail, Khan Shahab
Nginx High Performance by Sharma, Rahul
Dissecting the Hack: The V3rb0t3n Network by Street, Jayson E.
Stabilization, Safety, and Security of Distributed Systems: 17th International Symposium, SSS 2015, Edmonton, Ab, Canada, August 18-21, 2015, Proceedi by
Alta disponibilidade e balanceamento de carga para melhoria de sistema by Amaral Costa Hebert Luiz
Efficient Back-off Mechanism for IEEE802.15.4 Wireless Sensor Networks by B. Mohd Ali Borhanuddin, Dahham Zahraa, Sali Aduwati
PowerShell Profitipps und Anleitungen: Windows, Exchange, SharePoint, Azure, Office 365, VMware und Co. effizienter verwalten by Joos, Thomas
Click Models for Web Search by de Rijke, Maarten, Chuklin, Aleksandr, Markov, Ilya
Constructive Side-Channel Analysis and Secure Design: 6th International Workshop, Cosade 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Pa by
Nginx Essentials by Kholodkov, Valery
A Study of Efficent Search Algorithms in Unstructured P2P Networks by Barjini Hassan
WildFly Cookbook by Fugaro, Luigi
E-Voting and Identity: 5th International Conference, Voteid 2015, Bern, Switzerland, September 2-4, 2015, Proceedings by
FreeSWITCH 1.6 Cookbook by Minessale, Anthony, II, Maruzzelli, Giovanni, S. Collins, Michael
Energy-efficient Routing in Ad hoc networks with Balanced Load by Banerjee Anuradha
Salt Cookbook by Saha, Anirban
Cooperative Vehicular Communications in the Drive-Thru Internet by Yu, Quan, Zhou, Haibo, Gui, Lin
Advanced Multimedia and Ubiquitous Engineering: Future Information Technology Volume 2 by
Ansible Playbook Essentials by Shah, Gourav
Wireless Algorithms, Systems, and Applications: 10th International Conference, Wasa 2015, Qufu, China, August 10-12, 2015, Proceedings by
Progress in Cryptology -- Latincrypt 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, by
Kali Linux Wireless Penetration Testing Essentials by Alamanni, Marco
Wireshark Network Security by Verma, Piyush
Learning VMware vCloud Air by Rohington Wadia, Yohan
PostgreSQL Replication - Second Edition by Schönig, Hans-Jürgen
Hop count based Power Efficient Gathering HOPE in WSN by Ghosh Mrinmoy
Networking for Big Data by
Thinking in Promises: Designing Systems for Cooperation by Burgess, Mark
Wireless Device-To-Device Communications and Networks by Song, Lingyang, Niyato, Dusit, Han, Zhu
Evaluation And Performance Of Reactive Protocols Using Mobility Model by Anjum Naveed, Abid Sohail
Ecommerce - Introduction, Technology, Cryptography by Pittalia Prashant P.
Security and Privacy Protection in Information Processing Systems: 28th Ifip Tc 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-1 by
Information Assurance and Security Education and Training: 8th Ifip Wg 11.8 World Conference on Information Security Education, Wise 8, Auckland, New by
Frequency And Packet Size Trade - Off In IEEE 802.15.4 For WSNs by Bamber Sukhvinder
Advanced Network Programming - Principles and Techniques: Network Application Programming with Java by Ciubotaru, Bogdan, Muntean, Gabriel-Miro
Information and Communications Security: 16th International Conference, Icics 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers by
Opportunistic Spectrum Utilization in Vehicular Communication Networks by Cheng, Nan, Shen
Intelligent Robotics and Applications: 8th International Conference, Icira 2015, Portsmouth, Uk, August 24-27, 2015, Proceedings, Part III by
Intelligent Robotics and Applications: 8th International Conference, Icira 2015, Portsmouth, Uk, August 24-27, 2015, Proceedings, Part II by
Intelligent Robotics and Applications: 8th International Conference, Icira 2015, Portsmouth, Uk, August 24-27, 2015, Proceedings, Part I by
Ecommerce Security Methods, Protocols & Solutions by Pittalia Prashant
Security in Computing and Communications: Third International Symposium, Sscc 2015, Kochi, India, August 10-13, 2015. Proceedings by
Multiple Access Communications: 8th International Workshop, Macom 2015, Helsinki, Finland, September 3-4, 2015, Proceedings by
Movement-Assisted & Application-Aware Connectivity Restoration in WSAN by Abbasi Ameer Ahmed
Software Defined Mobile Networks (Sdmn): Beyond Lte Network Architecture by
Encrypted Email: The History and Technology of Message Privacy by Orman, Hilarie
Rechtliche Rahmenbedingungen für vertrauliche und verbindliche Internetkommunikation und deren Umsetzung mit informationstechnologischen Verfahren by Becker, Christoph
Internet Congestion Control by Varma, Subir
Applied Cyber-Physical Systems by
Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 15th International Conference, New2an 2015, and 8th Conference, Rusmart 20 by
mSCTP and CHORD Based Seamless Mobility Over Wireless IP Networks by Imtiaz Waqas Ahmed, Udin Jashim
Software Engineering for Resilient Systems: 7th International Workshop, Serene 2015, Paris, France, September 7-8, 2015. Proceedings by
Sublinear Algorithms for Big Data Applications by Han, Zhu, Wang, Dan
Ecommerce Security Issues, Policies and Model by Pittalia Prashant
A Clean Slate Approach to Secure Wireless Networking by Hu, Yih-Chun, Kumar, P. R., Ponniah, Jonathan
Simulación de un enlace de fibra óptica en una red de video vigilancia by Villao Jonathan Paul, Quishpi Lucero Juan Diego
Internet and Distributed Computing Systems: 8th International Conference, Idcs 2015, Windsor, Uk, September 2-4, 2015. Proceedings by
Building a Better World with Our Information: The Future of Personal Information Management, Part 3 by Jones, William
Cognitive Networked Sensing and Big Data by Qiu, Robert, Wicks, Michael
Mastering SaltStack by Hall, Joseph
Multiple Valued Logic (MVL) Approach: Network Congestion Management by Chowdhury Adib Kabir, Ibrahim Muhammed, Singh Ashutosh Kumar
Advanced Parallel Processing Technologies: 11th International Symposium, Appt 2015, Jinan, China, August 20-21, 2015, Proceedings by
Game Theory Framework Applied to Wireless Communication Networks by
Software Architecture: 9th European Conference, Ecsa 2015, Dubrovnik/Cavtat, Croatia, September 7-11, 2015. Proceedings by
Liferay 6.2 Intranet Portal Development Guide by Agarwal, Navin
Analysis of Handover based on the use of Femtocells in LTE Networks by Francês Carlos, Silva Ketyllen
Cryptographic Hardware and Embedded Systems -- Ches 2015: 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings by
ArcGIS By Example by Nasser, Hussein
Intel Galileo Networking Cookbook by Schwartz, Marco
Learning Puppet by Heinonen, Jussi
Mastering OpenVPN by Keijser, Jan Just, Crist, Eric
Citrix XenDesktop Cookbook Third Edition by Silvestri, Gaspare A.
Optimum Space And Security In 3D Password Scheme by Paikrao Rahul, Wakchaure Manoj, Sonkar Shrinivas
Sequências perfeitas para sistemas de comunicação by Pereira João
Media selection for the announcement of child birth by Rafaeli Sheizaf, Weisman Dan, Malberger Oren
Group Policy: Fundamentals, Security, and the Managed Desktop by Moskowitz, Jeremy
Getting Started with PowerShell by Shephard, Mike
Cisco Networking Essentials by McMillan, Troy
Intelligent Systems Technologies and Applications: Volume 2 by
Delay Aware Topology Generation for Network on Chip by Mahyan Fariza, Mahyan Termimi Hidayat, Lit Asrani
Wired/Wireless Internet Communications: 13th International Conference, Wwic 2015, Malaga, Spain, May 25-27, 2015, Revised Selected Papers by
Ecommerce Security Real Life Cases And Practical Solutions by Pittalia Prashant
Information Sciences and Systems 2015: 30th International Symposium on Computer and Information Sciences (Iscis 2015) by
First Steps in SAP: second, extended edition by McConnell, Sydnie, Munzel, Martin
SAP HANA Advanced Modeling by Alfermann, Dominique, Hartmann, Stefan, Engel, Benedikt
System Center 2012 R2 Configuration Manager: A Practical Handbook for Reporting by Thompson, Steve
On the Efficient Determination of Most Near Neighbors: Horseshoes, Hand Grenades, Web Search and Other Situations When Close Is Close Enough, Second E by Manasse, Mark S.
Fair Mac Protocol for Achieving Proportional Fairness in Multirate WSN by Al-Ratta Nusaibah
Computer Information Systems and Industrial Management: 14th Ifip Tc 8 International Conference, Cisim 2015, Warsaw, Poland, September 24-26, 2015, Pr by
Real Options Valuation for MNO's Investment in 4G LTE Mobile Network by Pattabavichai Santi
Boost.Asio C++ Network Programming - Second Edition by Anggoro, Wisnu, Torjo, John
Cloud Computing in der Versicherungsbranche: Sichere Infrastrukturen und Standardisierung mittels der Trusted German Insurance Cloud by Eicker, Lisa
Troubleshooting Ubuntu Server by Bhargav, Skanda
Vmware vRealize Orchestrator Essentials by Langenhan, Daniel
The Future of Wireless Networks: Architectures, Protocols, and Services by
Cisco IOS Software Reference Guide: Install, Upgrade and Configure IOS Software by Hummel, Shaun L.
Connectivity Prediction in Mobile Ad Hoc Networks for Real-Time Control by Thelen, Sebastian
Long-Term Archival of Encrypted Records by Rivera, Angel
Nonlinear distortion in mobile communication systems by Drotar Peter
Troubleshooting Xcode by Urbano, Magno
Creating an Information Sharing and Analysis Center by Stone Kelley
Asynchronous Control for Networked Systems by
Mobile Agent for Data Gathering in Wireless Sensor Networks by Ramesh S., Uma Maheswari P.
See More