• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2016

Bind DNS Administration Reference by
Deployment Fundamentals, Vol. 6: Deploying Windows 10 Using Microsoft Deployment Toolkit by Nyström, Mikael, Arwidmark, Johan
Online-Services von Krankversicherungen by Straßmair Dietmar
Detecting Community Patterns Based On Ad Hoc Social Networks by Niaz Humera
netDetective by Hartmann Fabian, Ems Patrick
Cloud Computing and Services Sciences: International Conference in Cloud Computing and Services Sciences, Closer 2014 Barcelona Spain, April 3-5, 2014 by
Redes inalámbricas para la transmisión de datos en Cuba by Garcia de la Cruz Cesilio
Cloud Computing and Security: First International Conference, Icccs 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers by
All-Optical Multicast Routing under Optical Constraints by Le Dinh Danh
Beacon Frame Manipulation to Mitigate Smartphone Rogue Access Points by Ndlovu Siqabukile, Nyathi Thambo
Energy Informatics: 4th D-A-Ch Conference, Ei 2015, Karlsruhe, Germany, November 12-13, 2015, Proceedings by
LSPSO Channel Estimation in OFDM MC-Communication System Based on FPGA by Bin Ghazali Kamarul H., Nahar Ali
Green Cloud Computing by Verma J. K.
Mobile Networks and Management: 7th International Conference, Monami 2015, Santander, Spain, September 16-18, 2015, Revised Selected Papers by
Efficient and Reliable Cloud Architecture for Big Data Handling by Tarannum Narzu, Ahmed Nova
Plateforrme Mobile D'informations Agricoles Par USSD by Ouya Samuel, Sawadogo Pawendtaoré Jacob
Big Data Over Networks by
Network Security Attacks and Countermeasures by
Relational Methodologies and Epistemology in Economics and Management Sciences by Biggiero, Lucio, Angelini, Pier Paolo, Basevi, Mario
Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications by
Cable and Wireless Networks: Theory and Practice by Da Silva, Mário Marques
Principles of Digital Communication: A Top-Down Approach by Rimoldi, Bixio
Lightweight Cryptography for Security and Privacy: 4th International Workshop, Lightsec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected by
Advances in Parallel and Distributed Computing and Ubiquitous Services: Ucawsn & Pdcat 2015 by
Mobile Computing, Applications, and Services: 7th International Conference, Mobicase 2015, Berlin, Germany, November 12-13, 2015, Revised Selected Pap by
Boost.Asio C++ Network Programming Cookbook: Over 25 hands-on recipes to create robust and highly-efficient cross-platform distributed applications wi by Radchuk, Dmytro
Energy Efficiency in Data Centers and Clouds: Volume 100 by
A Polynomial Translation of Mobile Ambients Into Safe Petri Nets: Understanding a Calculus of Hierarchical Protection Domains by Göbel, Susanne
Mastering CentOS 7 Linux Server: Get to grips with configuring, managing, and securing the latest CentOS Linux server by Alibi, Mohamed, Roy, Bhaskarjyoti
Building Telephony Systems with OpenSIPS - Second Edition by E. Goncalves, Flavio, Iancu, Bogdan-Andrei
Link Prediction in Social Networks: Role of Power Law Distribution by Virinchi, Srinivas, Mitra, Pabitra
The Accidental Sysadmin Handbook: A Primer for Early Level It Professionals by Kralicek, Eric
CentOS High Performance by A. Canepa, Gabriel
Collaborative Computing: Networking, Applications, and Worksharing: 11th International Conference, Collaboratecom 2015, Wuhan, November 10-11, 2015, C by
Microsoft Team Foundation Server 2015 Cookbook: Over 80 DevOps and ALM-focused recipes to enable continuous delivery of high-quality software by Arora, Tarun
Security and Privacy in Communication Networks: 11th International Conference, Securecomm 2015, Dallas, Tx, Usa, October 26-29, 2015, Revised Selected by
Trusted Systems: 6th International Conference, Intrust 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers by
Bring Your Own Device by Herb Christian
Malware Diffusion Models for Modern Complex Networks: Theory and Applications by Karyotis, Vasileios, Khouzani, M. H. R.
Comptia A+: All-In-One Certification Exam Guide for Beginners! by Tech, Solis
Mobile Payment - Bezahlen 4.0 by Mosig, Stefan, Hierl, Ludwig
Cloud Computing and Big Data: Second International Conference, Cloudcom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers by
Advances in Ubiquitous Networking: Proceedings of the Unet'15 by
Applied Cryptography and Network Security: 13th International Conference, Acns 2015, New York, Ny, Usa, June 2-5, 2015, Revised Selected Papers by
Topics in Cryptology - Ct-Rsa 2016: The Cryptographers' Track at the Rsa Conference 2016, San Francisco, Ca, Usa, February 29 - March 4, 2016, Proceed by
Advances in Network Science: 12th International Conference and School, Netsci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedings by
Algorithms for Sensor Systems: 11th International Symposium on Algorithms and Experiments for Wireless Sensor Networks, Algosensors 2015, Patras, Gre by
Scholarly Collaboration on the Academic Social Web by Jeng, Wei, He, Daqing
Mathematical and Engineering Methods in Computer Science: 10th International Doctoral Workshop, Memics 2015, Telč, Czech Republic, October 23-25, by
Cloud Computing and Services Science: 5th International Conference, Closer 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers by
Wireless Sensor Networks for Structural Health Monitoring by Cao, Jiannong, Liu, Xuefeng
Management of Cyber Physical Objects in the Future Internet of Things: Methods, Architectures and Applications by
Qos-Enabled Networks: Tools and Foundations by Barreiros, Miguel, Lundqvist, Peter
Mobile Payment - Bezahlen 4.0 by Hierl, Ludwig, Mosig, Stefan
MPLS in the Sdn Era: Interoperable Scenarios to Make Networks Scale to New Services by Monge, Antonio, Szarkowicz, Krzysztof
Opportunistic Mobile Networks: Advances and Applications by Misra, Sudip, Saha, Barun Kumar, Pal, Sujata
Algorithms and Discrete Applied Mathematics: Second International Conference, Caldam 2016, Thiruvananthapuram, India, February 18-20, 2016, Proceeding by
Practical DevOps by Verona, Joakim
Optimierung Von Nested Queries Unter Verwendung Der Nf2-Algebra by Hölsch, Jürgen
Graphical Models for Security: Second International Workshop, Gramsec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers by
Wearable Computing. Datenschutz und Datensicherheit by Möller, Mario
Cryptography and Network Security: Principles and Practice by Stallings, William
Microsoft Exchange Server PowerShell Essentials by Banerjee, Biswanath
Mastering Puppet - Second Edition by Narrabilis, Thomas
Radio Frequency Channel Coding Made Easy by Faruque, Saleh
Management von Passwörtern. Tools und Heuristiken by Steinicke, Tobias
Distributed Computer and Communication Networks: 18th International Conference, Dccn 2015, Moscow, Russia, October 19-22, 2015, Revised Selected Paper by
Mobility Modeling for Vehicular Communication Networks by Zhuang, Weihua, Abboud, Khadige
Technology and Practice of Passwords: 9th International Conference, Passwords 2015, Cambridge, Uk, December 7-9, 2015, Proceedings by
Content-Centric Networks: An Overview, Applications and Research Challenges by Kim, Dongkyun, Ahmed, Syed Hassan, Bouk, Safdar Hussain
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools by Chapman, Chris
Networks of Dissipative Systems: Compositional Certification of Stability, Performance, and Safety by Arcak, Murat, Meissen, Chris, Packard, Andrew
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis by Bair, John, Shavers, Brett
Big Data Concepts, Theories, and Applications by
Generating Plans from Proofs by Cate, Balder Ten, Benedikt, Michael, Leblay, Julien
Market-Driven Spectrum Sharing in Cognitive Radio by Yi, Changyan, Cai, Jun
Modeling and Optimization of Cloud-Ready and Content-Oriented Networks by Walkowiak, Krzysztof
Guide to Security Assurance for Cloud Computing by
Cisco UCS Cookbook by Wu, Victor
Multimedia Networks: Protocols, Design and Applications by Barz, Hans W., Bassett, Gregory A.
Technological Innovation for Cyber-Physical Systems: 7th Ifip Wg 5.5/Socolnet Advanced Doctoral Conference on Computing, Electrical and Industrial Sys by
Principles of Security and Trust: 5th International Conference, Post 2016, Held as Part of the European Joint Conferences on Theory and Practice of So by
Trusted Systems: 7th International Conference, Intrust 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers by
Building a Pentesting Lab for Wireless Networks by Fadyushin, Vyacheslav, Popov, Andrey
Passive and Active Measurement: 17th International Conference, Pam 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings by
Information Security Applications: 16th International Workshop, Wisa 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers by
Networked Systems: Third International Conference, Netys 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers by
Architecture of Computing Systems -- Arcs 2016: 29th International Conference, Nuremberg, Germany, April 4-7, 2016, Proceedings by
Critical Information Infrastructures Security: 9th International Conference, Critis 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Pape by
Learning IBM Watson Analytics: Make the most advanced predictive analytical processes easy using Watson Analytics with this easy-to-follow practical by Miller, James
Mastering Wireshark by Mishra, Charit
Contemporary Consumer Health Informatics by
Learning VMware App Volumes by Oven, Peter Von
Learning ArcGIS for Desktop by Cristiana Docan, Daniela
Engineering Secure Software and Systems: 8th International Symposium, Essos 2016, London, Uk, April 6-8, 2016. Proceedings by
Heterogeneous Vehicular Networks by Xiang, Wei, Zheng, Kan, Zhang, Lin
VMware Performance and Capacity Management, Second Edition by Rahabok, Iwan 'E1'
Dynamic Networks and Cyber-Security by
Digital Signage: Software, Networks, Advertising, and Displays: A Primer for Understanding the Business by Schaeffler, Jimmy
Risks and Security of Internet and Systems: 10th International Conference, Crisis 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Sel by
Parallel Processing and Applied Mathematics: 11th International Conference, Ppam 2015, Krakow, Poland, September 6-9, 2015. Revised Selected Papers, P by
Parallel Processing and Applied Mathematics: 11th International Conference, Ppam 2015, Krakow, Poland, September 6-9, 2015. Revised Selected Papers, P by
Signal Integrity: Applied Electromagnetics and Professional Practice by Russ, Samuel H.
Sustainable Wireless Network-On-Chip Architectures by Murray, Jacob, Wettin, Paul, Pande, Partha Pratim
Cyber-Physical System Design with Sensor Networking Technologies by
Advanced Methods for Complex Network Analysis by
High Performance Computer Applications: 6th International Conference, Isum 2015, Mexico City, Mexico, March 9-13, 2015, Revised Selected Papers by
Beginner's Guide to SAP Security and Authorizations by Juran, Tracy
Developing Interoperable and Federated Cloud Architecture by
Lean Computing for the Cloud by Bauer, Eric
OpenStack Networking Essentials by Denton, James
Nginx Troubleshooting by Kapranoff, Alex
Guide to Computing Fundamentals in Cyber-Physical Systems: Concepts, Design Methods, and Applications by Möller, Dietmar P. F.
Advances in Service-Oriented and Cloud Computing: Workshops of Esocc 2015, Taormina, Italy, September 15-17, 2015, Revised Selected Papers by
CCNA and Beyond by Fordham, Stuart D.
Wired/Wireless Internet Communications: 14th Ifip Wg 6.2 International Conference, Wwic 2016, Thessaloniki, Greece, May 25-27, 2016, Proceedings by
Moving Target Defense for Distributed Systems by Song, Min, Yuchi, Xuebiao, Shetty, Sachin
Troubleshooting NetScaler by Tirumalaraju, Raghu Varma
Frontier Computing: Theory, Technologies and Applications by
Instant Recovery with Write-Ahead Logging by Sauer, Caetano, Graefe, Goetz, Guy, Wey
Master Excel: Primary Interactions with the Excel by Clayton, Thomas
Open Problems in Network Security: Ifip Wg 11.4 International Workshop, Inetsec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers by
Master Excel: All About Formulas and Functions by Clayton, Thomas
An Architecture for Fast and General Data Processing on Large Clusters by Zaharia, Matei
An Architecture for Fast and General Data Processing on Large Clusters by Zaharia, Matei
Physical-Layer Security for Cooperative Relay Networks by Zhu, Jia, Zou, Yulong
Optimization of Computer Networks by Pavón Mariño, Pablo
DHCPv6-Präfix-Delegation by Al Bakri, Bilal
Virtualized Cloud Data Center Networks: Issues in Resource Management. by Liao, Wanjiun, Tsai, Linjiun
Cloud Computing: 6th International Conference, Cloudcomp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected Papers by
Microsoft Enterprise Mobility Suite: Planning and Implementation by Agerlund, Kent, Daalmans, Peter
Unsupervised Learning Algorithms by
Device-To-Device Communications in Cellular Networks by Tang, Huan, Wang, Li
Home Server Components - A Quick Overview by Hanley, Ronn
Internet of Things: Principles and Paradigms by
ICT Systems Security and Privacy Protection: 31st Ifip Tc 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings by
Smart Cities and Homes: Key Enabling Technologies by Nicopolitidis, Petros
Communication Technologies for Vehicles: 10th International Workshop, Nets4cars/Nets4trains/Nets4aircraft 2016, San Sebastián, Spain, June 6-7, 2016, by
Linux Server Security: Hack and Defend by Binnie, Chris
Broadband Telecommunications Technologies and Management by Esmailzadeh, Riaz
Practical Mobile Forensics - Second Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms by Bommisetty, Satish, Mahalik, Heather, Tamma, Rohit
Pervasive Social Computing: Socially-Aware Pervasive Systems and Mobile Applications by Han, Jun, Colman, Alan, Kabir, Muhammad Ashad
Buchreihe: Produktivitätssteigerung in der Softwareentwicklung, Teil 2: Managementmodell, Aufwandsermittlung und KPI-basierte Ver by Luckhaus, Stefan
Buchreihe: Produktivitätssteigerung in der Softwareentwicklung, Teil 1: Produktivitäts- und Leistungsmessung - Messbarkeit und Me by Luckhaus, Stefan
Buchreihe: Produktivitätssteigerung in der Softwareentwicklung, Teil 1: Produktivitäts- und Leistungsmessung - Messbarkeit und Me by Luckhaus, Stefan
Buchreihe: Produktivitätssteigerung in der Softwareentwicklung, Teil 2: Managementmodell, Aufwandsermittlung und KPI-basierte Ver by Luckhaus, Stefan
Distributed Applications and Interoperable Systems: 16th Ifip Wg 6.1 International Conference, Dais 2016, Held as Part of the 11th International Feder by
Cooperative Cognitive Radio Networking: System Model, Enabling Techniques, and Performance by Zhang, Qinyu, Mark, Jon W., Cao, Bin
Integer Programming and Combinatorial Optimization: 18th International Conference, Ipco 2016, Liège, Belgium, June 1-3, 2016, Proceedings by
Complex Systems: Relationships Between Control, Communications and Computing by
Cognitive Radio Oriented Wireless Networks: 11th International Conference, Crowncom 2016, Grenoble, France, May 30 - June 1, 2016, Proceedings by
Automating Junos Administration: Doing More with Less by Looney, Jonathan, Smith, Stacy
Network Coding at Different Layers in Wireless Networks by
Computer Networks: 23rd International Conference, Cn 2016, Brunów, Poland, June 14-17, 2016, Proceedings by
Industrielle Dienstleistungen 4.0: Hmd Best Paper Award 2015 by Brenner, Walter, Herterich, Matthias M., Uebernickel, Falk
Management and Security in the Age of Hyperconnectivity: 10th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and Secur by
Contributions to Networked and Event-Triggered Control of Linear Systems by Guinaldo Losada, María
Potential Game Theory: Applications in Radio Resource Allocation by Soong, Boon-Hee, Lã, Quang Duy, Chew, Yong Huat
Security in Network Coding by Lin, Chuang, Zhang, Peng
Privacy-Enhancing Aggregation Techniques for Smart Grid Communications by Lu, Rongxing
Wireless Public Safety Networks 2: A Systematic Approach by
Software Defined Networking Applications in Distributed Datacenters by Qi, Heng, Li, Keqiu
Modeling and Optimization of the Smart Grid Ecosystem by Koutsopoulos, Iordanis, Papaioannou, Thanasis G., Hatzi, Vasiliki
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation and Response Guide by Ayala, Luis
Wireless Traffic Steering for Green Cellular Networks by Zhang, Ning, Zhang, Shan, Zhou, Sheng
Applied Cryptography and Network Security: 14th International Conference, Acns 2016, Guildford, Uk, June 19-22, 2016. Proceedings by
Social Video Content Delivery by Wang, Zhi, Liu, Jiangchuan, Zhu, Wenwu
Cooperative Ofdm Underwater Acoustic Communications by Cheng, Xiang, Cheng, Xilin, Yang, Liuqing
5g Heterogeneous Networks: Self-Organizing and Optimization by Qiu, Xuesong, Kadoch, Michel, Rong, Bo
Communications for Control in Cyber Physical Systems: Theory, Design and Applications in Smart Grids by Li, Husheng
Millimeter Wave Vehicular Communications: A Survey by Va, Vutha, Shimizu, Takayuki, Bansal, Gaurav
DNS Security: Defending the Domain Name System by Stowe, Geoffrey, Liska, Allan
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification: First International Conference, Rssrail 20 by
High Performance Computing: 31st International Conference, Isc High Performance 2016, Frankfurt, Germany, June 19-23, 2016, Proceedings by
Red Hat Enterprise Linux (RHEL) 7 Server Installation and Administration: Training Manual: Covering CentOS-7 Server, Cloud computing, Bind9 DNS Server by Rabah, Kefa
Dynamic Information Retrieval Modeling by Wang, Jun, Yang, Grace Hui, Sloan, Marc
Security-Aware Device-To-Device Communications Underlaying Cellular Networks by Wang, Lei, Zhang, Aiqing, Zhou, Liang
Ad-Hoc, Mobile, and Wireless Networks: 15th International Conference, Adhoc-Now 2016, Lille, France, July 4-6, 2016, Proceedings by
Comptia Server+ Study Guide: Exam Sk0-004 by McMillan, Troy
Elastic Optical Networks: Architectures, Technologies, and Control by
Integration of Renewable Generation and Elastic Loads Into Distribution Grids by Rosenberg, Catherine, Ardakanian, Omid, Keshav, S.
Security and Resiliency Analytics for Smart Grids: Static and Dynamic Approaches by Rahman, Mohammad Ashiqur, Al-Shaer, Ehab
Listen and Talk: Full-Duplex Cognitive Radio Networks by Liao, Yun, Han, Zhu, Song, Lingyang
Digital Human Modeling: Applications in Health, Safety, Ergonomics and Risk Management: 7th International Conference, Dhm 2016, Held as Part of Hci In by
Effective Python Penetration Testing by Rehim, Rejah
SharePoint 2016 de principio a fin by González, Juan Carlos, Imaz, Fabián, Velez, Gustavo
Spatial Network Data: Concepts and Techniques for Summarization by Oliver, Dev
A Novel Ontology and Machine Learning Driven Hybrid Clinical Decision Support Framework for Cardiovascular Preventative Care by Farooq, Kamran
Innovative Web Applications for Analyzing Traffic Operations by Petrovska, Natasha, Stevanovic, Aleksandar, Furht, Borko
Electronics, Communications and Networks V: Proceedings of the 5th International Conference on Electronics, Communications and Networks (Cecnet 2015) by
Mastering Chef Provisioning by Waud, Earl
Linux Networking Cookbook by Boyce, Gregory
Smart City 360°: First Eai International Summit, Smart City 360°, Bratislava, Slovakia and Toronto, Canada, October 13-16, 2015. Revise by
Human Centered Computing: Second International Conference, Hcc 2016, Colombo, Sri Lanka, January 7-9, 2016, Revised Selected Papers by
Learning SaltStack - Second Edition: Build, manage, and secure your infrastructure with the power of SaltStack by Myers, Colton
Getting Started with Microsoft System Center Operations Manager: Using SCOM 2016 TP 5 by Greene, Kevin
Mobility Management: Principle, Technology and Applications by Shi, Yan, Hu, Bo, Chen, Shanzhi
Computational Science and Its Applications - Iccsa 2016: 16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part IV by
Solving Large Scale Learning Tasks. Challenges and Algorithms: Essays Dedicated to Katharina Morik on the Occasion of Her 60th Birthday by
Network Function Virtualization by Gray, Ken, Nadeau, Thomas D.
See More