• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

System Administration in 2014

Detecting and Combating Malicious Email by Ryan, Julie Jch, Kamachi, Cade
Discovery and Selection of Semantic Web Services by Wang, Xia, Halang, Wolfgang a.
PostgreSQL Administration Essentials by Schönig, Hans-Jürgen
Canadian Semantic Web: Technologies and Applications by
Similarity Search and Applications: 7th International Conference, Sisap 2014, Los Cabos, Mexico, October 29-31, 2104, Proceedings by
Computing Attitude and Affect in Text: Theory and Applications by
The Emergence of Digital Libraries -- Research and Practices: 16th International Conference on Asia-Pacific Digital Libraries, Icadl 2014, Chiang Mai, by
Web-Age Information Management: Waim 2014 International Workshops: Bigem, Hardbd, Danos, Hrsune, Bidasys, Macau, China, June 16-18, 2014, Revised Sele by
VMWare Horizon View 6.0 Desktop Virtualization Cookbook by Ventresco, Jason
Semantic Web Evaluation Challenge: Semwebeval 2014 at Eswc 2014, Anissaras, Crete, Greece, May 25-29, 2014, Revised Selected Papers by
Multidisciplinary Information Retrieval: 7th Information Retrieval Facility Conference, Irfc 2014, Copenhagen, Denmark, November 10-12, 2014, Proceedi by
Advancing Big Data Benchmarks: Proceedings of the 2013 Workshop Series on Big Data Benchmarking, Wbdb.Cn, Xi'an, China, July16-17, 2013 and Wbdb.Us, S by
Using Flume: Flexible, Scalable, and Reliable Data Streaming by Shreedharan, Hari
Methods and Supporting Technologies for Data Analysis by
Oracle Enterprise Manager 12c Command-Line Interface by Pot'vin, Kellyn, Miller, Seth, Smith, Ray
VMware Horizon View Essentials by Von Oven, Peter
Information Security and Cryptology -- Icisc 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers by
The Social Semantic Web by Passant, Alexandre, Decker, Stefan, Breslin, John G.
Grid and Cloud Computing: A Business Perspective on Technology and Applications by
Peer-To-Peer Computing: Principles and Applications by Vu, Quang Hieu, Ooi, Beng Chin, Lupu, Mihai
Learning OpenShift by Shipley, Grant
The Semantic Web: Eswc 2014 Satellite Events: Eswc 2014 Satellite Events, Anissaras, Crete, Greece, May 25-29, 2014, Revised Selected Papers by
Weaving Services and People on the World Wide Web by
Social Media Processing: Third National Conference, SMP 2014, Beijing, China, November 1-2, 2014, Proceedings by
Proxmox High Availability by Cheng, Simon
Multimedia Database Retrieval: Technology and Applications by Guan, Ling, Muneesawang, Paisarn, Zhang, Ning
Professional Search in the Modern World: Cost Action Ic1002 on Multilingual and Multifaceted Interactive Information Access by
User-Centric Social Multimedia Computing by Sang, Jitao
How to Make Sense of Any Mess: Information Architecture for Everybody by Covert, Abby
Oracle RMAN for Absolute Beginners by Kuhn, Darl
Knowledge Mining: Proceedings of the Nemis 2004 Final Conference by
Semantic Domains in Computational Linguistics by Strapparava, Carlo, Gliozzo, Alfio
The Taxobook: Principles and Practices of Building Taxonomies, Part 2 of a 3-Part Series by Hlava, Marjorie
Information Retrieval Technology: 10th Asia Information Retrieval Societies Conference, Airs 2014, Kuching, Malaysia, December 3-5, 2014. Proceedings by
Advanced Machine Learning Technologies and Applications: Second International Conference, Amlta 2014, Cairo, Egypt, November 28-30, 2014. Proceedings by
The Xtravirt Guide to Living with VMware Horizon Mirage by Brown, Curtis
Pricai 2014: Trends in Artificial Intelligence: 13th Pacific Rim International Conference on Artificial Intelligence, Pricai 2014, Gold Coast, Qld, Au by
Data Management and Query Processing in Semantic Web Databases by Groppe, Sven
Pro Git by Straub, Ben, Chacon, Scott
Adaptive Multimedia Retrieval: Semantics, Context, and Adaptation: 10th International Workshop, Amr 2012, Copenhagen, Denmark, October 24-25, 2012, Re by
Building a Data Warehouse: With Examples in SQL Server by Rainardi, Vincent
Computational Red Teaming: Risk Analytics of Big-Data-To-Decisions Intelligent Systems by Abbass, Hussein A.
Enterprise Architecture, Integration and Interoperability: Ifip Tc 5 International Conference, Eai2n 2010, Held as Part of Wcc 2010, Brisbane, Austral by
Artificial Intelligence Applications and Innovations: 6th Ifip Wg 12.5 International Conference, Aiai 2010, Larnaca, Cyprus, October 6-7, 2010, Procee by
The Structure of Style: Algorithmic Approaches to Understanding Manner and Meaning by
Advances in Digital Forensics VI: Sixth Ifip Wg 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec by
Artificial Evolution: 11th International Conference, Evolution Artificielle, EA 2013, Bordeaux, France, October 21-23, 2013. Revised Selected Papers by
Pro Python System Administration by Sileika, Rytis
Measuring User Engagement by Yom-Tov, Elad, Lalmas, Mounia, O'Brien, Heather
OpenVZ Essentials by Furman, Mark
New Frontiers in Artificial Intelligence: Jsai-Isai 2013 Workshops, Lenls, Jurisin, Mimi, Aaa, and Dds, Kanagawa, Japan, October 27-28, 2013, Revised by
Measuring Scholarly Impact: Methods and Practice by
Einführung in Die Wirtschaftsinformatik: Band 1: Verstehen Des Digitalen Zeitalters by Lemke, Claudia, Brenner, Walter
Metadata and Semantics Research: 8th Research Conference, Mtsr 2014, Karlsruhe, Germany, November 27-29, 2014, Proceedings by
Communications: Wireless in Developing Countries and Networks of the Future: 3rd Ifip Tc 6 International Conference, Wcitd 2010 and Ifip Tc 6 Internat by
Software Services for E-World: 10th Ifip Wg 6.11 Conference on E-Business, E-Services, and E-Society, I3e 2010, Buenos Aires, Argentina, November 3-5, by
Digital Heritage: Progress in Cultural Heritage. Documentation, Preservation, and Protection5th International Conference, Euromed 2014, Limassol, Cypr by
Knowledge Engineering and Knowledge Management: 19th International Conference, Ekaw 2014, Linköping, Sweden, November 24-28, 2014, Proceedings by
Artificial Intelligence and Symbolic Computation: 12th International Conference, Aisc 2014, Seville, Spain, December 11-13, 2014. Proceedings by
Mining Intelligence and Knowledge Exploration: Second International Conference, Mike 2014, Cork, Ireland, December 10-12, 2014. Proceedings by
Information Systems Security: 10th International Conference, Iciss 2014, Hyderabad, India, December 16-20, 2014. Proceedings by
Pro Open Source Mail: Building an Enterprise Mail Solution by Smith, Curtis
Advanced Digital Preservation by Giaretta, David
Charting a New Course: Natural Language Processing and Information Retrieval.: Essays in Honour of Karen Spärck Jones by
FreeBSD Mastery: Storage Essentials by Lucas, Michael W.
Kryptologie: Eine Einführung in Die Wissenschaft Vom Verschlüsseln, Verbergen Und Verheimlichen by Beutelspacher, Albrecht
Computational Methods for Counterterrorism by
Multimedia Data Mining and Knowledge Discovery by
Problem Management: An Implementation Guide for the Real World by Hall, Michael G.
Big Data Benchmarks, Performance Optimization, and Emerging Hardware: 4th and 5th Workshops, Bpoe 2014, Salt Lake City, Usa, March 1, 2014 and Hangzho by
Language, Culture, Computation: Computational Linguistics and Linguistics: Essays Dedicated to Yaacov Choueka on the Occasion of His 75 Birthday, Part by
vSphere Security Cookbook by Greer, Michael
Language, Culture, Computation: Computing - Theory and Technology: Essays Dedicated to Yaacov Choueka on the Occasion of His 75 Birthday, Part I by
Datenbanken im Einsatz by Pernul, Günther, Unland, Rainer
Language, Culture, Computation: Computing for the Humanities, Law, and Narratives: Essays Dedicated to Yaacov Choueka on the Occasion of His 75 Birthd by
CentOS System Administration Essentials by Mallett, Andrew
Technologies and Applications of Artificial Intelligence: 19th International Conference, Taai 2014, Taipei, Taiwan, November 21-23, 2014, Proceedings by
WildFly Configuration, Deployment, and Administration(2nd Edition) by Ritchie, Christopher
Hyper-V Network Virtualization Cookbook by Boud, Ryan
Big Data Analytics: Third International Conference, Bda 2014, New Delhi, India, December 20-23, 2014. Proceedings by
Symbol Spotting in Digital Libraries: Focused Retrieval Over Graphic-Rich Document Collections by Rusiñol, Marçal, Lladós, Josep
Frontiers of Higher Order Fuzzy Sets by
IT Strategic Management by Fujii, Tomohisa
IT management approach essential by Fujii, Tomohisa
Practical Hadoop Security by Lakhe, Bhushan
System Center 2012 R2 Configuration Manager: Installation, Einrichtung, Betrieb, Praxis by Joos, Thomas
Investing in Information: The Information Management Body of Knowledge by Bytheway, Andy
White Space Communication: Advances, Developments and Engineering Challenges by
A Developer's Guide to the Semantic Web by Yu, Liyang
Issues in Open Research Data by
Recommender Systems by
Knowledge Representation for Health Care: 6th International Workshop, Kr4hc 2014, Held as Part of the Vienna Summer of Logic, Vsl 2014, Vienna, Austri by
Sound, Music, and Motion: 10th International Symposium, Cmmr 2013, Marseille, France, October 15-18, 2013. Revised Selected Papers by
Symbiotic Interaction: Third International Workshop, Symbiotic 2014, Helsinki, Finland, October 30-31, 2014, Proceedings by
High Availability for the LAMP Stack: Eliminate Single Points of Failure and Increase Uptime for Your Linux, Apache, MySQL, and PHP Based Web Applicat by Cannon, Jason
Learning Chef: A Guide to Configuration Management and Automation by Taylor, Mischa, Vargo, Seth
Swing for Jython: Graphical Jython Ui and Scripts Development Using Java Swing and Websphere Application Server by Gibson, Robert
Mobile Devices: A Practical Guide for Librarians by Rawlins, Ben
Learning R for Geospatial Analysis: Leverage the power of R to elegantly manage crucial geospatial analysis tasks by Dorman, Michael
Hyper-V Security by Syrewicze, Andy, Siron, Eric
Managing Virtual Infrastructure with Veeam One by Sapp, Kevin L.
Timing Channels in Cryptography: A Micro-Architectural Perspective by Mukhopadhyay, Debdeep, Bhattacharya, Sarani, Rebeiro, Chester
Computer Security: Quickstudy Laminated Reference Guide by Cyborski, Shannon
VMware vRealize Operations Performance and Capacity Management by Rahabok, Iwan