• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2017

Model-Driven Development and Operation of Multi-Cloud Applications: The Modaclouds Approach by
Future Intelligent Vehicular Technologies: First International Conference, Future 5v 2016, Porto, Portugal, September 15, 2016, Revised Selected Paper by
Index Modulation for 5g Wireless Communications by Yang, Liuqing, Wen, Miaowen, Cheng, Xiang
Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities by Kim, Sungwook
Radio Resource Management for Mobile Traffic Offloading in Heterogeneous Cellular Networks by Huang, Jianwei, Wu, Yuan, Qian, Li Ping
Security-Aware Design for Cyber-Physical Systems: A Platform-Based Approach by Sangiovanni-Vincentelli, Alberto, Lin, Chung-Wei
Topics in Cryptology - Ct-Rsa 2017: The Cryptographers' Track at the Rsa Conference 2017, San Francisco, Ca, Usa, February 14-17, 2017, Proceedings by
Agent Based Modelling of Urban Systems: First International Workshop, Abmus 2016, Held in Conjunction with Aamas, Singapore, Singapore, May 10, 2016, by
Sequential Learning and Decision-Making in Wireless Resource Management by Zheng, Rong, Hua, Cunqing
Verification, Model Checking, and Abstract Interpretation: 18th International Conference, Vmcai 2017, Paris, France, January 15-17, 2017, Proceedings by
Principal Component Analysis Networks and Algorithms by Hu, Changhua, Duan, Zhansheng, Kong, Xiangyu
Cyber Physical Systems. Design, Modeling, and Evaluation: 6th International Workshop, Cyphy 2016, Pittsburgh, Pa, Usa, October 6, 2016, Revised Select by
Smart Computing and Communication: First International Conference, Smartcom 2016, Shenzhen, China, December 17-19, 2016, Proceedings by
The Role of Sdn in Broadband Networks by Habibi Gharakheili, Hassan
Securing the Internet of Things by Li, Shancang, Xu, Li Da
Automatische Identifikation Für Industrie 4.0 by Moosmann, Thomas, Hippenmeyer, Heinrich
Network Security Assessment: Know Your Network by McNab, Chris
Industrial Networks and Intelligent Systems: Second International Conference, Iniscom 2016, Leicester, Uk, October 31 - November 1, 2016, Proceedings by
Mobile Networks and Management: 8th International Conference, Monami 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedings by
Implementing Oracle Integration Cloud Service by Wilkins, Phil, Mölken, Robert Van
Algorithms for Sensor Systems: 12th International Symposium on Algorithms and Experiments for Wireless Sensor Networks, Algosensors 2016, Aarhus, Den by
Mastering System Center Configuration Manager by Daalmans, Peter, Bennett, Brett, Martinez, Santos
Fiber-Wireless Convergence in Next-Generation Communication Networks: Systems, Architectures, and Management by
Sicherheit in vernetzten Systemen: 24. DFN-Konferenz by
Hacking for Beginners: Learn basics of computer hacking in no time! by Brown, Nicholas
Kubernetes Management Design Patterns: With Docker, Coreos Linux, and Other Platforms by Vohra, Deepak
Self-Aware Computing Systems by
Software Networking: Journal Volume 1 - 2016 by
Learning DevOps: Continuously Deliver Better Software by Swartout, Paul, Verona, Joakim, Duffy, Michael
Die Wirkungsweise kryptologischer Verfahren am Beispiel der EC-Karte by Wilken, Nicolas
Machine Learning and Intelligent Communications: First International Conference, Mlicom 2016, Shanghai, China, August 27-28, 2016, Revised Selected Pa by
Elasticsearch 5.x Cookbook - Third Edition by Paro, Alberto
Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken by Steinicke, Tobias
Enabling the Internet of Things: From Integrated Circuits to Integrated Systems by
Achieving Collaboration in Distr. Systems Deployed over Selfish Peers by Mayer, Tobias Rene
Green Symbiotic Cloud Communications by Merchant, Shabbir N., Desai, Uday B., Mustafa, H. D.
IoT Automation: Arrowhead Framework by
Distributed Computer and Communication Networks: 19th International Conference, Dccn 2016, Moscow, Russia, November 21-25, 2016, Revised Selected Pape by
Side Channel Attacks auf den Advanced Encryption Standard (AES) by Hillmann, Peter
The Internet of Things: Breakthroughs in Research and Practice by
Exploring Enterprise Service Bus in the Service-Oriented Architecture Paradigm by
Interoperability, Safety and Security in Iot: Second International Conference, Interiot 2016 and Third International Conference, Saseiot 2016, Paris, by
Passive and Active Measurement: 18th International Conference, Pam 2017, Sydney, Nsw, Australia, March 30-31, 2017, Proceedings by
OpenVPN Cookbook, Second Edition by Keijser, Jan Just
Numerical Software Verification: 9th International Workshop, Nsv 2016, Toronto, On, Canada, July 17-18, 2016, Revised Selected Papers by
Application Performance Management (Apm) in the Digital Enterprise: Managing Applications for Cloud, Mobile, Iot and Ebusiness by Craig, Julie, Sturm, Rick, Pollard, Carol
High-Performance Scientific Computing: First Jara-HPC Symposium, Jhpcs 2016, Aachen, Germany, October 4-5, 2016, Revised Selected Papers by
Kotlin in Action by Jemerov, Dmitry, Isakova, Svetlana
Information Security of Highly Critical Wireless Networks by Abaimov, Stanislav, Gaycken, Sandro, Martellini, Maurizio
The Complete PowerShell Training For Beginners: Start from absolute zero, and learn to use the Windows Powershell as it was meant to be used. by Benammi, Abdelfattah
Building Information Modeling (BIM). Verbesserung der Datendurchgängigkeit im Planungsprozess by Albrecht, Matthias
Optical Fiber Sensors for Lot and Smart Devices by Domingues, Maria de Fátima F., Radwan, Ayman
Contract Theory for Wireless Networks by Han, Zhu, Zhang, Yanru
Kish Cypher, The: The Story of Kljn for Unconditional Security by Kish, Laszlo B.
Mobile Sensors and Context-Aware Computing by Gajjar, Manish J.
Public-Key Cryptography - Pkc 2017: 20th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, the Netherlands, by
Public-Key Cryptography - Pkc 2017: 20th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, the Netherlands, by
Information Architecture: The Design and Integration of Information Spaces, Second Edition by Ding, Wei, Lin, Xia, Zarro, Michael
The Internet of Things: Enabling Technologies, Platforms, and Use Cases by Raj, Pethuru, Raman, Anupama C.
The Sharepoint Shepherd's Guide for End Users: 2016 by Bogue, Robert L.
Architecture of Computing Systems - Arcs 2017: 30th International Conference, Vienna, Austria, April 3-6, 2017, Proceedings by
Crowd-Powered Mobile Computing and Smart Things by Loke, Seng W.
Connectivity of Communication Networks by Mao, Guoqiang
Apunte Rapido CCENT v6.1 by Gerometta, Oscar a.
Apunte Rapido CCNA R&S: version 6.1 by Gerometta, Oscar a.
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework by Kohnke, Anne, Sigler, Ken, Shoemaker, Dan
Apunte Rápido ICND2 v6.2: icnd2 200-105. by Gerometta, Oscar a.
Introduction to Computer Networking by Robertazzi, Thomas G.
Spinning Up Servicenow: It Service Managers' Guide to Successful User Adoption by Kahlout, Gabriele
Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications: 5th International Symposium, Compimage 2016, Niagara F by
Digital TV and Wireless Multimedia Communication: 13th International Forum, Iftc 2016, Shanghai, China, November 9-10, 2016, Revised Selected Papers by
Robust Resource Allocation in Future Wireless Networks by Parsaeefard, Saeedeh, Sharafat, Ahmad Reza, Mokari, Nader
Wireless Networking: Introduction to Bluetooth and WiFi by Colbach, Gordon
Wireshark 101: Essential Skills for Network Analysis by Chappell, Laura
Emerging Trends and Applications of the Internet of Things by
Resource Management for Energy and Spectrum Harvesting Sensor Networks by Zhou, Haibo, Zhang, Deyu, Chen, Zhigang
Enterprise Security: Second International Workshop, Es 2015, Vancouver, Bc, Canada, November 30 - December 3, 2015, Revised Selected Papers by
Transactions on Computational Science XXIX by
Learning Powershell by Hassell, Jonathan
Troubleshooting OpenVPN by Crist, Eric F.
Energy Management in Wireless Sensor Networks by Touati, Youcef, Daachi, Boubaker, Cherif Arab, Ali
Modeling, Methodologies and Tools for Molecular and Nano-Scale Communications: Modeling, Methodologies and Tools by
Potential-Based Analysis of Social, Communication, and Distributed Networks by Etesami, Seyed Rasoul
Wireless and Satellite Systems: 8th International Conference, Wisats 2016, Cardiff, Uk, September 19-20, 2016, Proceedings by
Wireless Public Safety Networks 3: Applications and Uses by
Distributed Data Fusion for Network-Centric Operations by
Industrial Wireless Sensor Networks: Applications, Protocols, and Standards by
Mathematical Foundations for Signal Processing, Communications, and Networking by
Advanced Video Communications over Wireless Networks by
Cooperative Control of Multi-Agent Systems: A Consensus Region Approach by Duan, Zhisheng, Li, Zhongkui
Architectural Transformations in Network Services and Distributed Systems by Luntovskyy, Andriy, Spillner, Josef
Mastering Ansible - Second Edition: Master the ins and outs of advanced operations with Ansible by Keating, Jesse
Information Security Applications: 17th International Workshop, Wisa 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers by
Technological Innovation for Smart Systems: 8th Ifip Wg 5.5/Socolnet Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, Doc by
DevOps Puppet, Docker, and Kubernetes: Practical recipes to make the most of DevOps with powerful tools by Arundel, John, Uphill, Thomas, Khare, Neependra
Spatial Cloud Computing: A Practical Approach by Yang, Chaowei, Huang, Qunying
Hacking + Android Crash Course by Pg Wizard Books
Cloud Service Benchmarking: Measuring Quality of Cloud Services from a Client Perspective by Wittern, Erik, Tai, Stefan, Bermbach, David
Multi-Technology Positioning by
Hacking + Android Crash Course + XML Crash Course by Pg Wizard Books
Interoperability and Open-Source Solutions for the Internet of Things: Second International Workshop, Inteross-Iot 2016, Held in Conjunction with Iot by
Communication Technologies for Vehicles: 12th International Workshop, Nets4cars/Nets4trains/Nets4aircraft 2017, Toulouse, France, May 4-5, 2017, Proce by
Ambient Intelligence: 13th European Conference, Ami 2017, Malaga, Spain, April 26-28, 2017, Proceedings by
Space Information Networks: First International Conference, Sinc 2016, Kunming, China, August 24-25, 2016. Revised Selected Papers by
Software Project Management for Distributed Computing: Life-Cycle Methods for Developing Scalable and Reliable Tools by
Betriebssysteme: Grundlagen Und Konzepte by Brause, Rüdiger
Context-Aware Systems and Applications: 5th International Conference, Iccasa 2016, Thu Dau Mot, Vietnam, November 24-25, 2016, Proceedings by
An Improved Lightweight Privacy Preserving Authentication Scheme for SIP-Based-VoIP Using Smart Card by Jan, Saeed Ullah
MQTT Essentials - A Lightweight IoT Protocol: Send and receive messages with the MQTT protocol for your IoT solutions. by Hillar, Gastón C.
Adaptive Code: Agile Coding with Design Patterns and Solid Principles by McLean Hall, Gary, Hall, Gary
Green, Pervasive, and Cloud Computing: 12th International Conference, Gpc 2017, Cetara, Italy, May 11-14, 2017, Proceedings by
Virtualisation and Thin Client - a Survey of Virtual Desktop (VDI) by Wall, Tom
Intelligence and Security Informatics: 12th Pacific Asia Workshop, Paisi 2017, Jeju Island, South Korea, May 23, 2017, Proceedings by
Routing Protocols and Architectural Solutions for Optimal Wireless Networks and Security by
Fundamentals of Mimo Wireless Communications by Kshetrimayum, Rakhesh Singh
Love and Sex with Robots: Second International Conference, Lsr 2016, London, Uk, December 19-20, 2016, Revised Selected Papers by
Z-Wave: Die Funktechnologie für das Smart Home by Pätz, Christian
Requirements Engineering for Service and Cloud Computing by
Conflict Resolution in Decision Making: Second International Workshop, Coredema 2016, the Hague, the Netherlands, August 29-30, 2016, Revised Selected by
Building Bluetooth Low Energy Systems by Aftab, Muhammad Usama Bin
Applied Network Security by Salmon, Arthur, Levesque, Warun, McLafferty, Michael
Audio Watermark: A Comprehensive Foundation Using MATLAB by Abdulla, Waleed H., Lin, Yiqing
Optical Wdm Networks by Mukherjee, Biswanath
Wireless Networking and Mobile Data Management by Ghosh, R. K.
Cloud Mobile Networks: From Ran to Epc by Vaezi, Mojtaba, Zhang, Ying
Matching Theory for Wireless Networks by Han, Zhu, Gu, Yunan, Saad, Walid
Future Information Communication Technology and Applications: Icfice 2013 by
Protocolo de Internet version 6 (IPV6): version 3.1 by Gerometta, Oscar a.
Website Hosting and Migration with Amazon Web Services: A Practical Guide to Moving Your Website to AWS by Nadon, Jason
Routing Optimization of Mobile Charger for Data Aggregation from Cluster Heads in Wireless Sensor Networks by Sadeghi, Mohammadamin, Eslaminejad, Mohammadreza
Ad Hoc Networks by
Data Analytics in Digital Humanities by
Ist es möglich künstliche Intelligenz auf menschliches Niveau zu bringen? by Dibon, Vincent
High Performance Computing: 32nd International Conference, Isc High Performance 2017, Frankfurt, Germany, June 18-22, 2017, Proceedings by
Advanced Multimedia and Ubiquitous Engineering: Mue/Futuretech 2017 by
Networked Systems: 5th International Conference, Netys 2017, Marrakech, Morocco, May 17-19, 2017, Proceedings by
Digital Human Modeling. Applications in Health, Safety, Ergonomics, and Risk Management: Health and Safety: 8th International Conference, Dhm 2017, He by
Guide to Cisco Routers Configuration: Becoming a Router Geek by Alani, Mohammed M.
Networks and Communications Engineering by
Computer Information Systems and Industrial Management: 16th Ifip Tc8 International Conference, Cisim 2017, Bialystok, Poland, June 16-18, 2017, Proce by
The Emerging Wdm Epon by Radivojevic, Mirjana, Matavulj, Petar
Telecommunications Engineering: Networks and Architecture by
Computer Organisation and Architecture: An Introduction by Hind, Robert, Chalk, B. S., Carter, Antony
Practical Guide to SAP FI-RA - Revenue Accounting and Reporting by McKinney, M. Larry, Mueller, Reinhard, Rothhaas, Frank
Radio Resource Allocation Over Fading Channels Under Statistical Delay Constraints by Le-Ngoc, Tho, Phan, Khoa Tran
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations by
Implementing Azure Solutions by Michalski, Oliver, Klaffenbach, Florian, Damaschke, Jan-Henrik
Mobile and Wireless: Communications and Technology by
Linux for Makers: Understanding the Operating System That Runs Raspberry Pi and Other Maker Sbcs by Newcomb, Aaron
Integer Programming and Combinatorial Optimization: 19th International Conference, Ipco 2017, Waterloo, On, Canada, June 26-28, 2017, Proceedings by
Distributed Applications and Interoperable Systems: 17th Ifip Wg 6.1 International Conference, Dais 2017, Held as Part of the 12th International Feder by
Cisco ACI Cookbook: A Practical Guide to Maximize Automated Solutions and Policy-Drive Application Profiles by Fordham, Stuart
Kali Linux Network Scanning Cookbook by Hixon, Michael, Hutchens, Justin
Smart Cards, Tokens, Security and Applications by
Coordination Models and Languages: 19th Ifip Wg 6.1 International Conference, Coordination 2017, Held as Part of the 12th International Federated Conf by
Wireless Algorithms, Systems, and Applications: 12th International Conference, Wasa 2017, Guilin, China, June 19-21, 2017, Proceedings by
Learning OpenDayLight by Toghraee, Reza
Computer Networks: 24th International Conference, Cn 2017, Lądek Zdrój, Poland, June 20-23, 2017, Proceedings by
Collaborative Computing: Networking and Applications by
Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips by Pale, Paulino Calderon
Mastering Active Directory: Understand the Core Functionalities of Active Directory Services Using Microsoft Server 2016 and PowerShell by Francis, Dishan
Grid Computing: Techniques and Applications by Wilkinson, Barry
Automated Workflow Scheduling in Self-Adaptive Clouds: Concepts, Algorithms and Methods by Pethuru Raj, C., Kousalya, G., Balakrishnan, P.
Innovations for Community Services: 17th International Conference, I4cs 2017, Darmstadt, Germany, June 26-28, 2017, Proceedings by
Advances in Practical Applications of Cyber-Physical Multi-Agent Systems: The Paams Collection: 15th International Conference, Paams 2017, Porto, Port by
Cyber Security Cryptography and Machine Learning: First International Conference, Cscml 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings by
Advances in Artificial Intelligence: From Theory to Practice: 30th International Conference on Industrial Engineering and Other Applications of Applie by
Look Smarter Than You Are with Oracle Analytics Cloud Standard Edition by Schwartzberg, Glenn, Roske, Edward, McMullen, Tracy
Advances in Artificial Intelligence: From Theory to Practice: 30th International Conference on Industrial Engineering and Other Applications of Applie by
Mobile Computing and Wireless Communications by
Smart Cities: The Internet of Things, People and Systems by Scekic, Ognjen, Dustdar, Schahram, Nastic, Stefan
Wireless Mobile Communication and Healthcare: 6th International Conference, Mobihealth 2016, Milan, Italy, November 14-16, 2016, Proceedings by
Business in Real-Time Using Azure IoT and Cortana Intelligence Suite: Driving Your Digital Transformation by Familiar, Bob, Barnes, Jeff
Engineering Scalable, Elastic, and Cost-Efficient Cloud Computing Applications: The Cloudscale Method by
Photonic Interconnects for Computing Systems: Understanding and Pushing Design Challenges by
v6: Everything You Need to Know about IPv6 to Save Your Job, Save Your Sanity, and Make More Money by Kullmann, Richard
Network Fighter by Clane, Ervin
Upgrading and Migrating to BizTalk Server 2016 by Beckner, Mark, Jones, Dylan
Systems for Big Graph Analytics by Cheng, James, Yan, Da, Tian, Yuanyuan
Datenschutzaufsicht Nach Der Eu-Datenschutz-Grundverordnung: Neue Aufgaben Und Befugnisse Der Aufsichtsbehörden by Roßnagel, Alexander
Security and Privacy in Communication Networks: 12th International Conference, Securecomm 2016, Guangzhou, China, October 10-12, 2016, Proceedings by
Introduction to Scheduling by
Vehicular Networks: From Theory to Practice by
An Improved and Robust Anonymous Authentication Scheme for Roaming in Global Mobility Networks by Baig, Ahmed Fraz
OpenStack: Creating Clouds From Novice to Pro! by Blake, Gregory
CRC Handbook of Modern Telecommunications by
Security of Networks and Services in an All-Connected World: 11th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and S by
Digital Media and Communication by
Implementation of Deployment and Tracking Techniques of a WSN by Bouabdallah, Hamza
VMware vSphere 6.5 Host Resources Deep Dive by Denneman, Frank, Hagoort, Niels
Industrial Communications and Networks by
Data and Applications Security and Privacy XXXI: 31st Annual Ifip Wg 11.3 Conference, Dbsec 2017, Philadelphia, Pa, Usa, July 19-21, 2017, Proceedings by
Mobility Management in Lte Heterogeneous Networks by Akhtar, Nadeem, Mehta, Mahima, Karandikar, Abhay
Building the Network of the Future: Getting Smarter, Faster, and More Flexible with a Software Centric Approach by
Fraud Prevention in Online Digital Advertising by Wu, Zhiang, Zhu, Xingquan, Tao, Haicheng
Computer Networking by
Oracle Iaas: Quick Reference Guide to Cloud Solutions by Saygili, Okcan Yasin
Applied Cryptography and Network Security: 15th International Conference, Acns 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings by
Engineering Secure Software and Systems: 9th International Symposium, Essos 2017, Bonn, Germany, July 3-5, 2017, Proceedings by
Proceedings of the 4th International Conference on Computer Engineering and Networks: Cenet2014 by
See More