• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2016

Theory and Applications of Applied Electromagnetics: Appeic 2015 by
Hcna Networking Study Guide by
Data Science and Big Data Computing: Frameworks and Methodologies by
Algorithms and Models for Network Data and Link Analysis by Saerens, Marco, Shimbo, Masashi, Fouss, François
Computational Science and Its Applications - Iccsa 2016: 16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part II by
Internationaler IT-Sicherheitsmarkt. Zahlen, Fakten, Trends by Steinicke, Tobias
Computational Science and Its Applications - Iccsa 2016: 16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part V by
Advances in Mobile Computing and Communications: Perspectives and Emerging Trends in 5G Networks by
Coordination, Organizations, Institutions, and Norms in Agent Systems XI: Coin 2015 International Workshops, Coin@aamas, Istanbul, Turkey, May 4, 2015 by
Kryptographie von Cäsar bis RSA. Klassische und moderne Verfahren im Vergleich by Steinicke, Tobias
Introduction to Wireless Sensor Networks by Forster, Anna
Big Data Computing and Communications: Second International Conference, Bigcom 2016, Shenyang, China, July 29-31, 2016. Proceedings by
Computational Science and Its Applications - Iccsa 2016: 16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part III by
High Performance Computing and Applications: Third International Conference, Hpca 2015, Shanghai, China, July 26-30, 2015, Revised Selected Papers by
Computational Science and Its Applications - Iccsa 2016: 16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part I by
Cyber Deception: Building the Scientific Foundation by
Elements of Cloud Computing Security: A Survey of Key Practicalities by Alani, Mohammed M.
Mastering Ubuntu Server by LaCroix, Jay
Projeto de Rede Com Switch HP by Ricci, B. T.
Network Project with HP Switch by Ricci, B. T.
Hacking Android by Rao Kotipalli, Srinivasa, A. Imran, Mohammed
Mastering FreeSWITCH by Minessale, Anthony, II, Maruzzelli, Giovanni
Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures by
Connectivity Frameworks for Smart Devices: The Internet of Things from a Distributed Computing Perspective by
Handbook of Research on Wireless Sensor Network Trends, Technologies, and Applications by
Cryptographic Hardware and Embedded Systems - Ches 2016: 18th International Conference, Santa Barbara, Ca, Usa, August 17-19, 2016, Proceedings by
Wireless Algorithms, Systems, and Applications: 11th International Conference, Wasa 2016, Bozeman, Mt, Usa, August 8-10, 2016. Proceedings by
Analytical and Stochastic Modelling Techniques and Applications: 23rd International Conference, Asmta 2016, Cardiff, Uk, August 24-26, 2016, Proceedin by
Wireless Sensor Networks by
Network Science by Barabási, Albert-László
Trust, Privacy and Security in Digital Business: 13th International Conference, Trustbus 2016, Porto, Portugal, September 7-8, 2016, Proceedings by
Radio Frequency Modulation Made Easy by Faruque, Saleh
Qoe Management in Wireless Networks by Zhang, Ping, Wang, Ying, Zhou, Wen'an
Zabbix Network Monitoring Second Edition by Olups, Rihards
Security and Cryptography for Networks: 10th International Conference, Scn 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings by
Communication Networks for Smart Grids: Making Smart Grid Real by Budka, Kenneth C., Deshpande, Jayant G., Thottan, Marina
Massive Mimo Meets Small Cell: Backhaul and Cooperation by Quek, Tony Q. S., Yang, Howard H.
Industrial Iot Technologies and Applications: International Conference, Industrial Iot 2016, Guangzhou, China, March 25-26, 2016, Revised Selected Pap by
Mobile Device Management: Mobility Evaluation in Small and Medium-Sized Enterprises by Pierer, Markus
Autonomic Network Management Principles: From Concepts to Applications by
Economics of Database-Assisted Spectrum Sharing by Huang, Jianwei, Luo, Yuan, Gao, Lin
How To Do Virtualization: Your Step-By-Step Guide To Virtualization by Howexpert Press
Network and Data Security for Non-Engineers by Groom, Kevin, Groom, Frank M., Jones, Stephan S.
Pro EDI in BizTalk Server 2006 R2: Electronic Document Interchange Solutions by Beckner, Mark
Pro Nagios 2.0 by Turnbull, James
Advances in Information Systems Development 2-Volume Set: Bridging the Gap Between Academia and Industry by
High-Performance Big-Data Analytics: Computing Systems and Approaches by Nagaraj, Dhivya, Raj, Pethuru, Raman, Anupama
Advances in Neural Network Research and Applications by
Proceedings of the European Computing Conference: Volume 1 by
Proceedings of the European Computing Conference: Volume 2 by
It Convergence and Security 2012 by
Green Communications and Networks: Proceedings of the International Conference on Green Communications and Networks (Gcn 2011) by
Theoretical Aspects of Distributed Computing in Sensor Networks by
New Developments and Applications in Sensing Technology by
Resilient Routing in Communication Networks by Rak, Jacek
Advances in Wireless Sensors and Sensor Networks by
Information Sciences and Systems 2015: 30th International Symposium on Computer and Information Sciences (Iscis 2015) by
Long Term Evolution: 4g and Beyond by
Information Sciences and Systems 2013: Proceedings of the 28th International Symposium on Computer and Information Sciences by
Performance Analysis of Computer Networks by Sadiku, Matthew N. O., Musa, Sarhan M.
Mobile Social Networking: An Innovative Approach by
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation by Küsters, Sebastian
Principles of Distributed Database Systems by Valduriez, Patrick, Özsu, M. Tamer
Modeling and Tools for Network Simulation by
Vlsi-Soc: Internet of Things Foundations: 22nd Ifip Wg 10.5/IEEE International Conference on Very Large Scale Integration, Vlsi-Soc 2014, Playa del Ca by
Dual Phase Evolution by Green, David G., Liu, Jing, Abbass, Hussein A.
Measuring Sip Proxy Server Performance by Subramanian, Sureshkumar V., Dutta, Rudra
Security and Privacy for Mobile Healthcare Networks by Shen, Zhang, Kuan
Agent-Oriented Software Engineering: Reflections on Architectures, Methodologies, Languages, and Frameworks by
Ontologies: A Handbook of Principles, Concepts and Applications in Information Systems by
Wireless Sensor Networks: Principles, Design and Applications by Yang, Shuang-Hua
Fundamentos de Redes Informáticas: 2a Edición by Rivera Darin, Jonathan
Data Management in Pervasive Systems by
Ultra-Wideband Radio Frequency Identification Systems by Nekoogar, Faranak, Dowla, Farid
Wimax Operator's Manual: Building 802.16 Wireless Networks by Sweeney, Daniel
Handbook of Mobile AD Hoc Networks for Mobility Models by Roy, Radhika Ranjan
Secure Wireless Sensor Networks: Threats and Solutions by Conti, Mauro
Automated Security Management by
Security and the Networked Society by Gregory, Mark A., Glance, David
Guide to Flow-Aware Networking: Quality-Of-Service Architectures and Techniques for Traffic Management by Jajszczyk, Andrzej, Domżal, Jerzy, Wójcik, Robert
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised by
Wireless Mems Networks and Applications by
Handbook of Research on Advanced Trends in Microwave and Communication Engineering by
Proyecto de Red Con Switch HP by Ricci, B. T.
Spatio-Temporal Data Streams by Galic, Zdravko
Enhancing the Internet with the Convergence System: An Information-Centric Network Coupled with a Standard Middleware by
Secure Cloud Computing by
Environmental Software Systems. Fostering Information Sharing: 10th Ifip Wg 5.11 International Symposium, Isess 2013, Neusiedl Am See, Austria, Octobe by
Information Technologies and Mathematical Modelling: Queueing Theory and Applications: 15th International Scientific Conference, Itmm 2016, Named Afte by
Swarm Intelligence: 10th International Conference, Ants 2016, Brussels, Belgium, September 7-9, 2016, Proceedings by
Cross-Cultural Multimedia Computing: Semantic and Aesthetic Modeling by Dubnov, Shlomo, Burns, Kevin, Kiyoki, Yasushi
BeagleBone By Example by Prabakar, Jayakarthigeyan
Microsoft Office 365 - Exchange Online Implementation and Migration by Strant, Loryan, Waters, Ian, Greve, David
Cellular Automata: 12th International Conference on Cellular Automata for Research and Industry, Acri 2016, Fez, Morocco, September 5-8, by
Building Virtual Pentesting Labs for Advanced Penetration Testing, Second Edition by Cardwell, Kevin
Learning Nagios, Third Edition by Kocjan, Wojciech, Beltowski, Piotr
Cyber-Security of Scada and Other Industrial Control Systems by
Fundamentals of Multimedia by Li, Ze-Nian, Drew, Mark S., Liu, Jiangchuan
Body Sensor Networks by
Continued Rise of the Cloud: Advances and Trends in Cloud Computing by
Dynamic Provisioning for Community Services by Qi, Li, Jin, Hai
Intelligence for Embedded Systems: A Methodological Approach by Alippi, Cesare
Real-World Wireless Sensor Networks: Proceedings of the 5th International Workshop, Realwsn 2013, Como (Italy), September 19-20, 2013 by
Resource Management in Mobile Computing Environments by
Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns by
Satellite Network Robust Qos-Aware Routing by Long, Fei
Cloud Data Management by Sakr, Sherif, Liu, Anna, Zhao, Liang
Emerging Trends in Computing and Communication: Etcc 2014, March 22-23, 2014 by
Support Vector Machines Applications by
Wireless Sensors in Industrial Time-Critical Environments by Furtado, Pedro, Cecílio, José
Distributed Computing: 30th International Symposium, Disc 2016, Paris, France, September 27-29, 2016. Proceedings by
How to Speak Emoji by Benenson, Fred
Juniper QFX10000 Series: A Comprehensive Guide to Building Next-Generation Data Centers by Hanks, Douglas
The Notion of Relevance in Information Science: Everybody Knows What Relevance Is. But, What Is It Really? by Saracevic, Tefko
The Geni Book by
I connect: Netzwerk Erfolg by Mantl, Josef
Research in Attacks, Intrusions, and Defenses: 19th International Symposium, Raid 2016, Paris, France, September 19-21, 2016, Proceedings by
Scriptbasierte Sicherungslösung für Windows Server 2008 by Schurig, Hannes
Graphical Models for Security: Third International Workshop, Gramsec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers by
Computer Information Systems and Industrial Management: 15th Ifip Tc8 International Conference, Cisim 2016, Vilnius, Lithuania, September 14-16, 2016, by
Developing Security Tools of Wsn and Wban Networks Applications by A. M. El-Bendary, Mohsen
Information Sciences and Systems 2014: Proceedings of the 29th International Symposium on Computer and Information Sciences by
Cloud Computing: Challenges, Limitations and R&d Solutions by
Arm Assembly Language with Hardware Experiments by Elahi, Ata, Arjeski, Trevor
Advanced Free Space Optics (Fso): A Systems Approach by Majumdar, Arun K.
Cloud Computing for Data-Intensive Applications by
Automated Firewall Analytics: Design, Configuration and Optimization by Al-Shaer, Ehab
Recent Development in Wireless Sensor and Ad-Hoc Networks by
Trustworthy Policies for Distributed Repositories by Conway, Mike, Moore, Reagan W., Xu, Hao
Cyber-Physical Systems: Foundations, Principles and Applications by
Vlsi-Soc: Design for Reliability, Security, and Low Power: 23rd Ifip Wg 10.5/IEEE International Conference on Very Large Scale Integration, Vlsi-Soc 2 by
System Analysis and Modeling. Technology-Specific Aspects of Models: 9th International Conference, Sam 2016, Saint-Melo, France, October 3-4, 2016. Pr by
Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions by Shbeeb, Aaron, Bodungen, Clint, Singer, Bryan
Advanced Multimedia and Ubiquitous Engineering: Futuretech & Mue by
Dynamic Sharing of Wireless Spectrum by Yu, Quan, Zhou, Haibo, Shen
Implementierung einer Unternehmens-Public-Key-Infrastruktur unter Verwendung der Microsoft Active Directory Zertifikatsdienste by Stoppel, Uwe
Crowdsourcing in the Public Sector by Brabham, Daren C.
Human Re-Identification by Wu, Ziyan
Networked Systems: 4th International Conference, Netys 2016, Marrakech, Morocco, May 18-20, 2016, Revised Selected Papers by
Mobile Device Management Ansätze im Vergleich. Potenzial und Risiken von Corporate Owned, Personally Enabled und Bring your own Device by Kamps, Daniel
Sentiment Analysis in Social Networks by Fersini, Elisabetta, Messina, Enza, Pozzi, Federico Alberto
Frontier and Innovation in Future Computing and Communications by
Virtualization Techniques for Mobile Systems by Furht, Borko, Jaramillo, David, Agarwal, Ankur
Fundamentos de Redes de Voz IP: 2a Edición by Gil Dominguez, Oscar
Security in Computing and Communications: 4th International Symposium, Sscc 2016, Jaipur, India, September 21-24, 2016, Proceedings by
Cyberterrorism: Understanding, Assessment, and Response by
Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 16th International Conference, New2an 2016, and 9th Conference, Rusmart 20 by
ICT Systems Security and Privacy Protection: 29th Ifip Tc 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings by
Internet and Distributed Computing Systems: 9th International Conference, Idcs 2016, Wuhan, China, September 28-30, 2016, Proceedings by
Network and System Security: 10th International Conference, Nss 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings by
Wireless Sensors in Heterogeneous Networked Systems: Configuration and Operation Middleware by Furtado, Pedro, Cecílio, José
Overlapping Coalition Formation Games in Wireless Communication Networks by Saad, Walid, Wang, Tianyu, Song, Lingyang
Trust Management in Cloud Services by Sheng, Quan Z., Bouguettaya, Athman, Noor, Talal H.
Indoor Location-Based Services: Prerequisites and Foundations by Werner, Martin
Ultrasonic Nondestructive Evaluation Systems: Industrial Application Issues by
Multidimensional Queueing Models in Telecommunication Networks by Melikov, Agassi, Ponomarenko, Leonid
Red Hat Enterprise Linux (RHEL) 7 Server Installation and Administration 2nd Edi: Training Manual: Covering CentOS-7 Server, Fedora 23 Server, Mandriv by Rabah, Kefa
Computer and Information Sciences: 31st International Symposium, Iscis 2016, Kraków, Poland, October 27-28, 2016, Proceedings by
Analysis and Design of Networked Control Systems by You, Keyou, Xiao, Nan, Xie, Lihua
Human Behavior Understanding in Networked Sensing: Theory and Applications of Networks of Sensors by
Cyber Defense and Situational Awareness by
Big Data Technologies and Applications by Villanustre, Flavio, Furht, Borko
Ubiquitous Information Technologies and Applications: Cute 2013 by
Electrical Design of Through Silicon Via by
Conversational Informatics: A Data-Intensive Approach with Emphasis on Nonverbal Communication by Nakazawa, Atsushi, Ohmoto, Yoshimasa, Nishida, Toyoaki
Designing Networks for Innovation and Improvisation: Proceedings of the 6th International Coins Conference by
Foundational and Practical Aspects of Resource Analysis: 4th International Workshop, Fopara 2015, London, Uk, April 11, 2015. Revised Selected Papers by
Trusted Cloud Computing by
VMware NSX Network Essentials by Sreejith C.
Learning VMware vSphere by Fitzhugh, Rebecca, Gb, Abhilash
Practical XMPP by Watkin, Lloyd, Koelle, David
Network and Parallel Computing: 13th IFIP WG 10.3 International Conference, NPC 2016, Xi'an, China, October 28-29, 2016, Proceedings by
Routing and Wavelength Assignment for Wdm-Based Optical Networks: Quality-Of-Service and Fault Resilience by Sahu, Partha Pratim, Chatterjee, Bijoy Chand, Sarma, Nityananda
Mastering Microsoft Exchange Server 2016 by Leonard, Clifton, Svidergol, Brian, Wright, Byron
Communication Networks Economy by Battu, Daniel
Multilayer Control of Networked Cyber-Physical Systems: Application to Monitoring, Autonomous and Robot Systems by Manfredi, Sabato
Architectural Design: Conception and Specification of Interactive Systems by Vissers, Chris A., Quartel, Dick A. C., Pires, Luís Ferreira
Introduction to Cyberdeception by Rowe, Neil C., Rrushi, Julian
Wireless Sensor and Mobile Ad-Hoc Networks: Vehicular and Space Applications by
Analysis of Computer Networks by Gebali, Fayez
Guide to High Performance Distributed Computing: Case Studies with Hadoop, Scalding and Spark by Muppalla, Anil Kumar, Srinivasa, K. G.
Understanding Network Hacks: Attack and Defense with Python by Ballmann, Bastian
Enterprise Governance of Information Technology: Achieving Alignment and Value, Featuring Cobit 5 by de Haes, Steven, Van Grembergen, Wim
Web Indicators for Research Evaluation: A Practical Guide by Thelwall, Michael
Cyber Warfare: Building the Scientific Foundation by
The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War by Grobman, Steve, Cerra, Allison
Technological Innovation for Cloud-Based Engineering Systems: 6th Ifip Wg 5.5/Socolnet Doctoral Conference on Computing, Electrical and Industrial Sys by
Ubiquitous Computing Application and Wireless Sensor: Ucawsn-14 by
Principles of Spread-Spectrum Communication Systems by Torrieri, Don
A Digital Phase Locked Loop Based Signal and Symbol Recovery System for Wireless Channel by Sarma, Kandarpa Kumar, Purkayastha, Basab Bijoy
Smart Collaborative Identifier Network: A Promising Design for Future Internet by Zhang, Hongke, Su, Wei, Quan, Wei
Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices by Galibus, Tatiana, De Oliveira Albuquerque, Robson, Krasnoproshin, Viktor V.
Immersed in Media: Telepresence Theory, Measurement & Technology by
Network Storage: Tools and Technologies for Storing Your Company's Data by O'Reilly, James
Physical Layer Security in Random Cellular Networks by Wang, Hui-Ming, Zheng, Tong-Xing
Information Security Education Across the Curriculum: 9th Ifip Wg 11.8 World Conference, Wise 9, Hamburg, Germany, May 26-28, 2015, Proceedings by
Vehicular AD Hoc Networks: Standards, Solutions, and Research by
Networks and New Services: A Complete Story by Minerva, Roberto, Crespi, Noel
Future Network Systems and Security: Second International Conference, Fnss 2016, Paris, France, November 23-25, 2016, Proceedings by
Proceedings of the International Conference on Signal, Networks, Computing, and Systems: Icsncs 2016, Volume 1 by
See More