• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2021

Réseaux de communication sans fil reconfigurables by Kumar, Ch Niranjan, Devi, V. Sowmya
Reti di comunicazione wireless riconfigurabili by Kumar, Ch Niranjan, Devi, V. Sowmya
Rekonfigurowalne sieci komunikacji bezprzewodowej by Devi, V. Sowmya, Kumar, Ch Niranjan
Redes de comunicação sem fio reconfiguráveis by Kumar, Ch Niranjan, Devi, V. Sowmya
Реконфигурируемые бесп&# by Кумар, &#1063. Ни&, Деви, &#1042. Сов&
Cloud Computing: Concepts and Technologies by Manvi, Sunilkumar, Shyam, Gopal
Cloud Computing: Concepts and Technologies by Manvi, Sunilkumar, Shyam, Gopal
Digital Coherent Optical Systems: Architecture and Algorithms by de Arruda Mello, Darli Augusto, Barbosa, Fabio Aparecido
Cwna Certified Wireless Network Administrator Study Guide: Exam Cwna-108 by Westcott, David A., Coleman, David D.
Internet of Things. a Confluence of Many Disciplines: Second Ifip International Cross-Domain Conference, Ifipiot 2019, Tampa, Fl, Usa, October 31 - No by
Tactile Internet: With Human-In-The-Loop by
Towards Green IoT: Key Challenges and Energy Solutions by Farhan, Laith
Mise en oeuvre d'algorithmes pour assurer la sécurité et la protection de la vie privée by Kiran, S., Kumar, A. Ashok, Krishna, B. Hari
Implementazione di algoritmi per fornire sicurezza e privacy by Kiran, S., Kumar, A. Ashok, Krishna, B. Hari
Implementacja algorytmów zapewniających bezpieczeństwo i prywatnośc by Kiran, S., Kumar, A. Ashok, Krishna, B. Hari
Implementação de Algoritmos para Fornecer Segurança e Privacidade by Kiran, S., Kumar, A. Ashok, Krishna, B. Hari
Внедрение алгоритмов об& by Киран, &#1057., Кумар, &#1040. Аш&, Кришна, &#1041. Х&
Implementierung von Algorithmen zur Gewährleistung von Sicherheit und Datenschutz by Kiran, S., Kumar, A. Ashok, Krishna, B. Hari
Netzwerkarchitektur mit rekursiver Adressierung by Young Kim, Dae, Hee Kim, Young
Architecture de réseau avec adressage récursif by Hee Kim, Young, Young Kim, Dae
Architettura di rete con indirizzamento ricorsivo by Hee Kim, Young, Young Kim, Dae
Architektura sieci z adresowaniem rekursywnym by Young Kim, Dae, Hee Kim, Young
Arquitetura de Rede com Endereçamento Recursivo by Young Kim, Dae, Hee Kim, Young
Архитектура сети с рекур by Хее Ким, Ёу&, Ёунг Ким, Д&
Industrial Iot Technologies and Applications: 4th Eai International Conference, Industrial Iot 2020, Virtual Event, December 11, 2020, Proceedings by
Human Centered Computing: 6th International Conference, Hcc 2020, Virtual Event, December 14-15, 2020, Revised Selected Papers by
Advances in Service-Oriented and Cloud Computing: International Workshops of Esocc 2020, Heraklion, Crete, Greece, September 28-30, 2020, Revised Sele by
Euro-Par 2020: Parallel Processing Workshops: Euro-Par 2020 International Workshops, Warsaw, Poland, August 24-25, 2020, Revised Selected Papers by
Redes de ordenadores y ciberseguridad: Una guía sobre los sistemas de comunicación, las conexiones a Internet, la seguridad de las redes, protección c by Kiser, Quinn
Weighted Dominating Set Algorithms for Wireless Sensor Networks by Akusta Dagdeviren, Zuleyha, Korukoglu, M. Serdar
Intelligent Technologies and Applications: Third International Conference, Intap 2020, Gjøvik, Norway, September 28-30, 2020, Revised Selected Papers by
Performance Evaluation Models for Distributed Service Networks by
IT-Risikomanagement. Komponenten, Prozesse und Methoden eines IT-Risikomanagementsystems by Mütschard, Christoph
Resource Management and Performance Analysis of Wireless Communication Networks by Jin, Shunfu, Yue, Wuyi
Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, C by Kiser, Quinn
Graph Structures for Knowledge Representation and Reasoning: 6th International Workshop, Gkr 2020, Virtual Event, September 5, 2020, Revised Selected by
Fluctuation-Induced Network Control and Learning: Applying the Yuragi Principle of Brain and Biological Systems by
Tools and Methods of Program Analysis: 5th International Conference, Tmpa 2019, Tbilisi, Georgia, November 7-9, 2019, Revised Selected Papers by
Vanet: Challenges and Opportunities by Mahalle, Parikshit N., Botkar, Sonali P., Godse, Sachin P.
Computer Science Unleashed: Harness the Power of Computational Systems by Ferreira Filho, Wladston, Pictet, Raimondo
Computer Science Unleashed: Harness the Power of Computational Systems by Pictet, Raimondo, Ferreira Filho, Wladston
Pattern Recognition and Artificial Intelligence: 4th Mediterranean Conference, Medprai 2020, Hammamet, Tunisia, December 20-22, 2020, Proceedings by
Networking and Computation: Technology, Modeling and Performance by Shi, Li, Robertazzi, Thomas G.
Geometry and Vision: First International Symposium, Isgv 2021, Auckland, New Zealand, January 28-29, 2021, Revised Selected Papers by
Integration of Wsn and Iot for Smart Cities by
Handbook of Big Data Privacy by
Automating Cisco Collaboration Solutions CLAUTO (300-835) Exam Practice Questions & Dumps: Exam Practice Questions For Automating Cisco Collaboration by Fortune, Books
Linux Kernel Programming: A comprehensive guide to kernel internals, writing kernel modules, and kernel synchronization by Billimoria, Kaiwan N.
Linux Kernel Programming Part 2 - Char Device Drivers and Kernel Synchronization: Create user-kernel interfaces, work with peripheral I/O, and handle by Billimoria, Kaiwan N.
Tools and Algorithms for the Construction and Analysis of Systems: 27th International Conference, Tacas 2021, Held as Part of the European Joint Confe by
Gestion de la mobilité dans les réseaux IdO basés sur le CoAP by Anwar, Sajid
Gestione della mobilità nelle reti IoT basate su CoAP by Anwar, Sajid
Zarządzanie mobilnością w sieciach IoT opartych na protokole CoAP by Anwar, Sajid
Gerenciamento de Mobilidade em Redes de IdC baseadas em CoAP by Anwar, Sajid
Управление мобильность&# by Анвар, Сай&#
Mobilitätsmanagement in CoAP-basierten IoT-Netzwerken by Anwar, Sajid
Denial of Services in MANET - Part A by Majumder, Sudipta
Security by Design: Security Engineering Informationstechnischer Systeme by Zimmer, Wolf, Lunkeit, Armin
Practical Node-RED Programming: Learn powerful visual programming techniques and best practices for the web and IoT by Hagino, Taiji
Cloud Computing and Services Science: 10th International Conference, Closer 2020, Prague, Czech Republic, May 7-9, 2020, Revised Selected Papers by
Untersuchung der Auswirkungen von Video-Frames, die über drahtlose Netzwerke verloren gehen by Ogunkanmi, Dotun, Thamizharasan, Anbarasan
Étude des effets de la perte de trames vidéo sur les réseaux sans fil by Thamizharasan, Anbarasan, Ogunkanmi, Dotun
Studiare gli effetti dei frame video persi su reti wireless by Thamizharasan, Anbarasan, Ogunkanmi, Dotun
Badanie efektów utraty klatek wideo w sieciach bezprzewodowych by Ogunkanmi, Dotun, Thamizharasan, Anbarasan
Estudo dos Efeitos de Quadros de Vídeo Perdidos em Redes Sem Fios by Thamizharasan, Anbarasan, Ogunkanmi, Dotun
Изучите влияние видеока& by Тамижара&#10, Огунканм&#10
Denial of Services in MANET by Majumder, Sudipta
Negação de serviços na MANET by Majumder, Sudipta
Отказ в обслуживании в М&#1040 by Маюмдер, С&#
Tools and Algorithms for the Construction and Analysis of Systems: 27th International Conference, Tacas 2021, Held as Part of the European Joint Confe by
Déni de services dans les MANET by Majumder, Sudipta
Odmowa świadczenia uslug w sieci MANET by Majumder, Sudipta
CCNA: Una Guía Completa para la Última Certificación CCNA (Cisco Certified Network Associate), que Incluye Consejos y Sugere by Schmidt, Walker
CCNA: Estrategias Simples y Efectivas para Dominar la Certificación CCNA (Cisco Certified Network Associate) Routing Y Switc by Schmidt, Walker
Genetic Programming: 24th European Conference, Eurogp 2021, Held as Part of Evostar 2021, Virtual Event, April 7-9, 2021, Proceedings by
Redes de ordenadores y ciberseguridad: Una guía sobre los sistemas de comunicación, las conexiones a Internet, la seguridad de las redes, protección c by Kiser, Quinn
Network Programming with Go: Code Secure and Reliable Network Services from Scratch by Woodbeck, Adam
5g and Beyond: Fundamentals and Standards by
Information Technologies and Mathematical Modelling. Queueing Theory and Applications: 19th International Conference, Itmm 2020, Named After A.F. Terp by
Simulation Gaming Through Times and Disciplines: 50th International Simulation and Gaming Association Conference, Isaga 2019, Warsaw, Poland, August 2 by
Database Systems for Advanced Applications. Dasfaa 2021 International Workshops: Bdqm, Gdma, Mldldsa, Mobisocial, and Must, Taipei, Taiwan, April 11-1 by
Computer Vision and Image Processing: 5th International Conference, Cvip 2020, Prayagraj, India, December 4-6, 2020, Revised Selected Papers, Part II by
Versteckte Sensoren in drahtlosen Sensornetzwerken vorsehen by Ghonge, Mangesh, Pramanik, Sabyasachi, Veluri, Ravi Kishore
Prévoir les capteurs cachés dans les réseaux de capteurs sans fil by Pramanik, Sabyasachi, Veluri, Ravi Kishore, Ghonge, Mangesh
Immaginazione dei sensori nascosti nelle reti di sensori wireless by Veluri, Ravi Kishore, Ghonge, Mangesh, Pramanik, Sabyasachi
Dostrzeganie ukrytych czujników w bezprzewodowych sieciach sensorycznych by Veluri, Ravi Kishore, Ghonge, Mangesh, Pramanik, Sabyasachi
Envolvimento de sensores ocultos em redes de sensores sem fio by Veluri, Ravi Kishore, Ghonge, Mangesh, Pramanik, Sabyasachi
Представление скрытых д& by Велури, Ра&#, Гонге, Ман&#, Праманик, &#
Social Media Data Analysis by Chaurasia, Sandeep, Soni, Jayesh
Performance Enrichment of Unicast Routing Protocol by Ayyaswamy, Kathirvel
Data Analytics-2 by Raghavendran, Ch V., Lakshmi, L., Satish, G. Naga
Passive and Active Measurement: 22nd International Conference, Pam 2021, Virtual Event, March 29 - April 1, 2021, Proceedings by
Cognitive Vehicular Networks by
Futuristic Trends in Network and Communication Technologies: Third International Conference, Ftnct 2020, Taganrog, Russia, October 14-16, 2020, Revise by
Futuristic Trends in Network and Communication Technologies: Third International Conference, Ftnct 2020, Taganrog, Russia, October 14-16, 2020, Revise by
Teaching Early Years Mathematics, Science and ICT: Core Concepts and Practice for the First Three Years of Schooling by Hilton, Annette
Electronics and Communications Engineering: Applications and Innovations by
Mobile, Wireless and Sensor Networks: A Clustering Algorithm for Energy Efficiency and Safety by Dahane, Amine, Berrached, Nasr-Eddine
Android App-Hook and Plug-In Technology by Bao, Jianqiang
Wireless Network Security: Second Edition by Osterhage, Wolfgang
Understanding Communications Networks - for Emerging Cybernetics Applications by Pahlavan, Kaveh
Emoticons, Kaomoji, and Emoji: The Transformation of Communication in the Digital Age by
Cognitive Radio-Oriented Wireless Networks: 15th Eai International Conference, Crowncom 2020, Rome, Italy, November 25-26, 2020, Proceedings by
Software-Defined Networking and Security: From Theory to Practice by Chowdhary, Ankur, Pisharody, Sandeep, Huang, Dijiang
Interconnections for Computer Communications and Packet Networks by Rojas-Cessa, Roberto
Applied Technologies: Second International Conference, iCat 2020, Quito, Ecuador, December 2-4, 2020, Proceedings by
Internet of Things Use Cases for the Healthcare Industry by
Bio-Inspired Computing: Theories and Applications: 15th International Conference, Bic-Ta 2020, Qingdao, China, October 23-25, 2020, Revised Selected P by
Web and Big Data. Apweb-Waim 2020 International Workshops: Kgma 2020, Semibdma 2020, Deepluda 2020, Tianjin, China, September 18-20, 2020, Revised Sel by
Practical Hardware Pentesting: A guide to attacking embedded systems and protecting them against the most common hardware attacks by Valle, Jean-Georges
Silicon Valley Cybersecurity Conference: First Conference, Svcc 2020, San Jose, Ca, Usa, December 17-19, 2020, Revised Selected Papers by
Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems XIII: International Workshops Coin 2017 and Coine 2 by
Robotic Process Automation Using Uipath Studiox: A Citizen Developer's Guide to Hyperautomation by Malik, Nadia, Javed, Adeel, Sundrani, Anum
Proceedings of International Conference on Communication, Circuits, and Systems: Ic3s 2020 by
CCNA: Guía para principiantes 3 en 1+ Consejos para realizar el examen+ Estrategias sencillas y eficaces para aprender sobre by Schmidt, Walker
Introduction to Digital Communications by Speidel, Joachim
Low Power Wireless Receivers for Iot Applications with Multi-Band Calibration Algorithms by Rawlins, Michael W.
Technological Innovation for Life Improvement: 11th Ifip Wg 5.5/Socolnet Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, by
Cloud Technologies: An Overview of Cloud Computing Technologies for Managers by McHaney, Roger
Unraveling Bluetooth Le Audio: Stretching the Limits of Interoperable Wireless Audio with Bluetooth Next-Generation Low Energy Audio Standards by Bhalla, Himanshu, Haggai, Oren
TLS Mastery by Lucas, Michael W.
TLS Mastery by Lucas, Michael W.
TLS Mastery by Lucas, Michael W.
Redes Privadas Virtuales en Teoría y Práctica by Ashraf, Zeeshan
Smart Grid and Innovative Frontiers in Telecommunications: 5th Eai International Conference, Smartgift 2020, Chicago, Usa, December 12, 2020, Proceedi by
Edge Computing and Iot: Systems, Management and Security: First Eai International Conference, Iceci 2020, Virtual Event, November 6, 2020, Proceedings by
Big Data Technologies and Applications: 10th Eai International Conference, Bdta 2020, and 13th Eai International Conference on Wireless Internet, Wico by
Umgang mit dem Broadcast-Storm-Problem in mobilen Ad-hoc-Netzwerken by Tamrakar, Sitendra
Affrontare il problema del broadcast storm nelle reti ad hoc mobili by Tamrakar, Sitendra
Radzenie sobie z problemem burzy rozgloszeniowej w mobilnych sieciach ad hoc by Tamrakar, Sitendra
Lidando com problemas de tempestade de transmissão em Redes Móveis Ad Hoc by Tamrakar, Sitendra
Integer Programming and Combinatorial Optimization: 22nd International Conference, Ipco 2021, Atlanta, Ga, Usa, May 19-21, 2021, Proceedings by
Interactivity and Game Creation: 9th Eai International Conference, Artsit 2020, Aalborg, Denmark, December 10-11, 2020, Proceedings by
Next-Gen Digital Services. a Retrospective and Roadmap for Service Computing of the Future: Essays Dedicated to Michael Papazoglou on the Occasion of by
Proceedings of the International Conference on Computing and Communication Systems: I3cs 2020, Nehu, Shillong, India by
Advances in Electrical and Computer Technologies: Select Proceedings of Icaect 2020 by
Cloud Reliability Engineering: Technologies and Tools by
Sustainable Energy for Smart Cities: Second Eai International Conference, Sesc 2020, Viana Do Castelo, Portugal, December 4, 2020, Proceedings by
LinkedIn Marketing Business: Manual cómo crear tu estrategia de marketing de contenidos, venta social y generar auténticas relaciones comerciales y by Salerno, Massimiliano
Cloud Reliability Engineering: Technologies and Tools by
Service Level Management in Emerging Environments by
Multicast on MikroTik with LABS: Master Multicast on RouterOS using step-by-step LABS by Haddad, Maher
Network Marketing: La guida completa al marketing online per guadagnare su internet Scopri tutti i segreti del web marketing strategico, by Palmer, Marc A.
NVivo R 1: Handling Qualitative Data II by Park, Chongwon
Transforming Cybersecurity Solutions Using Blockchain by
Internet of Medical Things: Remote Healthcare Systems and Applications by
Intelligence Science III: 4th Ifip Tc 12 International Conference, Icis 2020, Durgapur, India, February 24-27, 2021, Revised Selected Papers by
Cloud Computing for Beginners by Nalini, N., Thariq Hussan, M. I., Atmakuri, Aparnarajesh
Emotional Intelligence: Web-Based Stress Management Intervention by Syerov, Yuriy, Fedushko, Solomiia
Ausreißer-Erkennung mit einem neuen hybriden Ansatz auf gemischten Datensätzen by Kaur, Navneet
Détection de valeurs aberrantes à l'aide d'une nouvelle approche hybride sur un ensemble de données mixte by Kaur, Navneet
Rilevamento di outlier utilizzando un nuovo approccio ibrido su dataset misti by Kaur, Navneet
Wykrywanie wartości odstających z wykorzystaniem nowego podejścia hybrydowego by Kaur, Navneet
Detecção de Antecedentes Utilizando uma Nova Abordagem Híbrida em Dataset Mista by Kaur, Navneet
Обнаружение отклонений & by Каур, Навн&#
A novel BBICR Technique in Vehicular Ad-hoc Networks by Suresh, Kallam
10 CLAVES PARA ADMINISTRAR TU TIEMPO (Productividad): Ideas simples para ser más productivo by Sánchez Isame, Nicolás
Space Information Network: 5th International Conference Sinc 2020, Shenzhen, China, December 19-20, 2020, Revised Selected Papers by
Accelerator Programming Using Directives: 7th International Workshop, Waccpd 2020, Virtual Event, November 20, 2020, Proceedings by
Smart Computing and Communication: 5th International Conference, Smartcom 2020, Paris, France, December 29-31, 2020, Proceedings by
Free Space Laser Communication with Ambient Light Compensation by Faruque, Saleh
Low-Overhead Communications in Iot Networks: Structured Signal Processing Approaches by Zhang, Jun, Shi, Yuanming, Dong, Jialin
Innovations for Community Services: 21st International Conference, I4cs 2021, Bamberg, Germany, May 26-28, 2021, Proceedings by
Security Without Obscurity: Frequently Asked Questions (Faq) by Stapleton, Jeff
​IT-Sicherheit durch Künstliche Intelligenz im Bereich der E-Mobilität. Betrugserkennung und Prävention von unsicheren Ladeinfrastrukturen by Koller, David
Sicherung Des Fsr-Protokolls Gegen Datenpaketverluste Im Manet by Senapati, Sunil Kumar, Khilar, Pabitra Mohan
Sécurisation Du Protocole Fsr Contre La Chute de Paquets de Données Dans Le Manet by Khilar, Pabitra Mohan, Senapati, Sunil Kumar
Protezione del Protocollo Fsr Contro l'Abbandono Dei Pacchetti Di Dati in Manet by Senapati, Sunil Kumar, Khilar, Pabitra Mohan
ЗАЩИТА Fsr-ПРОТОКОЛА ОТ ПАД&#1 by Сенапати, &#, Хилар, Паб&#
Zabezpieczanie Protokolu Fsr Przed UtratĄ Pakietów Danych W Sieci Manet by Khilar, Pabitra Mohan, Senapati, Sunil Kumar
Advances in Computing and Network Communications: Proceedings of Coconet 2020, Volume 1 by
Full-Duplex Communications for Future Wireless Networks by
Proceedings of Integrated Intelligence Enable Networks and Computing: Iienc 2020 by
Koha: Pemasangan Mudah by Eusoff, Ahmed Noor Kader Mustajir
Mobile Information Service for Networks by Jiang, Changjun, Li, Zhong
Campus Network Architectures and Technologies by Shen, Ningguo, Yu, Bin, Huang, Mingxiang
Simulation Tools and Techniques: 12th Eai International Conference, Simutools 2020, Guiyang, China, August 28-29, 2020, Proceedings, Part I by
Procuring Adhoc Networks from Black Hole Attacks by Taranum, Fahmina
Решение проблемы штормо& by Тамракар, &#
Traitement du problème des tempêtes de diffusion dans les réseaux mobiles ad hoc by Tamrakar, Sitendra
Remote Delivery: A Guide to Software Delivery through Collaboration between Distributed Teams by Qu, Zhengping
Intelligent Information Processing X: 11th Ifip Tc 12 International Conference, Iip 2020, Hangzhou, China, July 3-6, 2020, Proceedings by
Data-Driven Mining, Learning and Analytics for Secured Smart Cities: Trends and Advances by
Fieldbus and Networking in Process Automation by Sen, Sunit Kumar
Internet of Things in Smart Technologies for Sustainable Urban Development by
Kreditkartenbetrug. Einbruch in Kreditkarten-Server by Oswald, Gerald
Scale Space and Variational Methods in Computer Vision: 8th International Conference, Ssvm 2021, Virtual Event, May 16-20, 2021, Proceedings by
Public-Key Cryptography - Pkc 2021: 24th Iacr International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 20 by
Public-Key Cryptography - Pkc 2021: 24th Iacr International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 20 by
Enterprise Wireless Local Area Network Architectures and Technologies by Wu, Rihai, Yang, Xun, Zhou, Xia
Mobile Technology and Social Transformations: Access to Knowledge in Global Contexts by
Mobile Technology and Social Transformations: Access to Knowledge in Global Contexts by
Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing by
Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing by
Networking All-In-One for Dummies by Doug Lowe
Wearables in Healthcare: Second Eai International Conference, Healthwear 2020, Virtual Event, December 10-11, 2020, Proceedings by
Cognitive Systems and Signal Processing: 5th International Conference, Iccsip 2020, Zhuhai, China, December 25-27, 2020, Revised Selected Papers by
Computer Science - Cacic 2020: 26th Argentine Congress, Cacic 2020, San Justo, Buenos Aires, Argentina, October 5-9, 2020, Revised Selected Papers by
Cissp: Estrategias Simples y Eficaces para Dominar la Seguridad de los Sistemas Información desde la A Hasta la Z (Libro En E by Schmidt, Walker
Cissp: Consejos y Trucos para Aprender y Estudiar sobre la Seguridad de los Sistemas de Información Desde la A Hasta la Z (Li by Schmidt, Walker
See More