• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2006

Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions by Mikhailovsky, Andrei, Vladimirov, Andrew, Gavrilenko, Konstantin
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure by Barber, Brian, Cross, Michael, Meyer, Melissa M.
Optical Wdm Networks by Mukherjee, Biswanath
Monad (Aka Powershell): Introducing the Msh Command Shell and Language by Oakley, Andy
Zero Configuration Networking: The Definitive Guide by Cheshire, Stuart, Steinberg, Daniel H.
Journal on Data Semantics V by
Eunice 2005: Networks and Applications Towards a Ubiquitously Connected World: Ifip International Workshop on Networked Applications, Colmenarejo, Mad by
Voip Hacks: Tips & Tools for Internet Telephony by Wallingford, Theodore
Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting by Jones, Brian K., Hagen, William Von
The Business Objects Business Intelligence Method: A Strategy Focused Approach by Wilson, Alan, J.
Computational Linguistics and Intelligent Text Processing: 7th International Conference, Cicling 2006, Mexico City, Mexico, February 19-25, 2006, Proc by
Orthogonal Frequency Division Multiplexing for Wireless Communications by
Understanding Linux Network Internals: Guided Tour to Networking on Linux by Benvenuti, Christian
Intelligence and Security Informatics for International Security: Information Sharing and Data Mining by Chen, Hsinchun
McSa / McSe: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide: Exam 70-291 [With CDROM] by Suehring, Steve, Chellis, James, Sheltz, Matthew
Intelligent Spaces: The Application of Pervasive ICT by
How to Cheat at Managing Windows Server Update Services: Volume 1 by Barber, B.
Protocol: How Control Exists after Decentralization by Galloway, Alexander R.
DNS in Action: A Detailed and Practical Guide to DNS Implementation, Configuration, and Administration by Dostlek, L., Dostalek, L., Kabelova, A.
Software Estimation: Demystifying the Black Art by McConnell, Steve
Understanding TCP/IP: A Clear and Comprehensive Guide by Dostlek, L., Dostalek, L., Kabelova, A.
Video Conferencing Over IP: Configure, Secure, and Troubleshoot by Gough, Michael
Challenges in AD Hoc Networking: Fourth Annual Mediterranean AD Hoc Networking Workshop, June 21-24, 2005, Île de Porquerolles, France by
Measurement, Control, and Communication Using IEEE 1588 by Eidson, John C.
Openvpn: Building and Integrating Virtual Private Networks by Feilner, M.
Environments for Multi-Agent Systems II: Second International Workshop, E4mas 2005, Utrecht, the Netherlands, July 25, 2005, Selected Revised and Invi by
Voice Over Ipv6: Architectures for Next Generation Voip Networks by Minoli, Daniel
Optical Switching by El-Bawab, Tarek S.
Resource Allocation and Cross Layer Control in Wireless Networks by Neely, Mike, Tassiulas, Leandros, Georgiadis, Leonidas
Mobile Information Systems: Infrastructure and Design for Adaptivity and Flexibility by
How to Cheat at Designing Security for a Windows Server 2003 Network by Ruston, Chris, Peiris, Chris
Creating Client Extranets with SharePoint 2003 by Gerow, Mark
Learning and Adaption in Multi-Agent Systems: First International Workshop, Lamas 2005, Utrecht, the Netherlands, July 25, 2005, Revised Selected Pape by
Trends in Enterprise Application Architecture: Vldb Workshop, Teaa 2005, Trondheim, Norway, August 28, 2005, Revised Selected Papers by
Pro Nagios 2.0 by Turnbull, James
Understanding Voice-Over IP Security by Johnston, Alan B., Piscitello, David M.
Advances in Information Systems Development 2-Volume Set: Bridging the Gap Between Academia and Industry by
Securing Converged IP Networks by Macaulay, Tyson
WiMAX Crash Course by Shepard, Steven
How to Cheat at Configuring ISA Server 2004 by Shinder, Debra Littlejohn, Shinder, Thomas W.
Computational Logic in Multi-Agent Systems: 6th International Workshop, Clima VI, London, Uk, June 27-29, 2005, Revised Selected and Invited Papers by
Computational Science and Its Applications - Iccsa 2006: International Conference, Glasgow, Uk, May 8-11, 2006, Proceedings, Part II by
Computational Science and Its Applications - Iccsa 2006: International Conference, Glasgow, Uk, May 8-11, 2006, Proceedings, Part III by
Computational Science and Its Applications - Iccsa 2006: International Conference, Glasgow, Uk, May 8-11, 2006, Proceedings, Part IV by
Computational Science and Its Applications - Iccsa 2006: International Conference, Glasgow, Uk, May 8-11, 2006, Proceedings, Part V by
Manufacturing Systems Control Design: A Matrix-Based Approach by Bogdan, Stjepan, Lewis, Frank L., Kovacic, Zdenko
Advances in Neural Networks - Isnn 2006: Third International Symposium on Neural Networks, Isnn 2006, Chengdu, China, May 28 - June 1, 2006, Proceedin by
Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions by Pennington, Bill, Pollino, David, Bradley, Tony
Parallel Processing and Applied Mathematics: 6th International Conference, Ppam 2005, Poznan, Poland, September 11-14, 2005, Revised Selected Papers by
Vlsi-Soc: From Systems to Chips: Ifip Tc 10/Wg 10.5, Twelfth International Conference on Very Large Scale Ingegration of System on Chip (Vlsi-Soc 2003 by
The Transfer and Diffusion of Information Technology for Organizational Resilience: Ifip Tc8 Wg 8.6 International Working Conference, June 7-10, 2006, by
Junos Cookbook: Time-Saving Techniques for Junos Software Configuration by Garrett, Aviva
High Availability and Disaster Recovery: Concepts, Design, Implementation by Schmidt, Klaus
Practical Voip Security by Porter Cissp Ccnp Ccda Ccs, Thomas
Guide to Wireless Network Security by Vacca, John R.
Computational Science and Its Applications - Iccsa 2006: International Conference, Glasgow, Uk, May 8-11, 2006, Proceedings, Part I by
Advances in Neural Networks - Isnn 2006: Third International Symposium on Neural Networks, Isnn 2006, Chengdu, China, May 28 - June 1, 2006, Proceedin by
Cryptographics: Exploiting Graphics Cards for Security by Keromytis, Angelos D., Cook, Debra
Self-Managed Networks, Systems, and Services: Second IEEE International Workshops, Selfman 2006, Dublin, Ireland, June 16, 2006, Proceedings by
Modeling and Simulation Tools for Emerging Telecommunication Networks: Needs, Trends, Challenges and Solutions by
Petri Nets and Other Models of Concurrency - ICATPN 2006: 27th International Conference on Applications and Theory of Petri Nets and Other Models of C by
Distributed Event-Based Systems by Pietzuch, Peter, Mühl, Gero, Fiege, Ludger
E-Business and Telecommunication Networks by
Detection of Intrusions and Malware & Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceed by
Model-Driven Architecture - Foundations and Applications: Second European Conference, Ecmda-Fa 2006, Bilbao, Spain, July 10-13, 2006, Proceedings by
Advances in Neural Networks - Isnn 2006: Third International Symposium on Neural Networks, Isnn 2006, Chengdu, China, May 28 - June 1, 2006, Proceedin by
Over-The-Road Wireless for Dummies by Haley, E. Phil
DNS and Bind: Help for System Administrators by Albitz, Paul, Liu, Cricket
Embedded and Ubiquitous Computing: International Conference, Euc 2006, Seoul, Korea, August 1-4, 2006, Proceedings by
Agent Computing and Multi-Agent Systems: 9th Pacific Rim International Workshop on Multi-Agents, Prima 2006, Guilin, China, August 7-8, 2006, Proceedi by
Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-Au by
Windows Server 2003 Networking Recipes: A Problem-Solution Approach by Dinerman, Brad, Allen, Robbie, Hunter, Beau
Pro Windows Small Business Server 2003 by Campbell, Tony
Computer Viruses and Malware by Aycock, John
Emerging Directions in Embedded and Ubiquitous Computing: Euc 2006 Workshops: Ncus, Secubiq, Usn, Trust, Eso, and Msa, Seoul, Korea, August 1-4, 2006, by
Mathematical Knowledge Management: 5th International Conference, Mkm 2006, Wokingham, Uk, August 11-12, 2006, Proceedings by
Reconfigurable Computing: Architectures and Applications: Second International Workshop, ARC 2006, Delft, the Netherlands, March 1-3, 2006 Revised Sel by
Ad-Hoc Networking by
Mobile and Wireless Communication Networks: IFIP 19th World Computer Congress, TC-6, 8th IFIP/IEEE Conference on Mobile and Wireless Communications Ne by
Computing and Combinatorics: 12th Annual International Conference, COCOON 2006, Taipei, Taiwan, August 15-18, 2006, Proceedings by
Advances in Cryptology - Crypto 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 20-24, 2006, Proceedings by
CONCUR 2006 - Concurrency Theory: 17th International Conference, CONCUR 2006, Bonn, Germany, August 27-30, 2006 by
Quality of Protection: Security Measurements and Metrics by
Ambient Intelligence in Everyday Life: Foreword by Emile Aarts by
Network Control and Engineering for QoS, Security and Mobility, V by
Advances in Systems, Computing Sciences and Software Engineering: Proceedings of Scss 2005 by
Information Security: 9th International Conference; Isc 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings by
Winternals: Defragmentation, Recovery, and Administration Field Guide by Hunter
Vacation Queueing Models: Theory and Applications by Zhang, Zhe George, Tian, Naishuo
Euro-Par 2006 Parallel Processing: 12th International Euro-Par Conference, Dresden, Germany, August 28-September 1, 2006, Proceedings by
Ubiquitous Intelligence and Computing: Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings by
Reasoning Web: Second International Summer School 2006, Lisbon, Portugal, September 4-8, 2006, Tutorial Lectures by
Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings by
Autonomic and Trusted Computing: Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006 by
Electronic Government: 5th International Conference, EGOV 2006, Krakow, Poland, September 4-8, 2006, Proceedings by
Six Years that Shook the World: The Story of the Internet, Telecom and Optical Market Revolutions by Koss, William R.
The Semantic Web - Aswc 2006: First Asian Semantic Web Conference, Beijing, China, September 3-7, 2006, Proceedings by
Software Composition: 5th International Symposium, SC 2006, Vienna, Austria, March 25-26, 2006, Revised Papers by
Advanced Topics in Exception Handling Techniques by
Cooperative Information Agents X: 10th International Workshop, CIA 2006, Edinburgh, Uk, September 11-13, 2006, Proceedings by
Ant Colony Optimization and Swarm Intelligence: 5th International Workshop, ANTS 2006 Brussels, Belgium, September 4-7, 2006 Proceedings by
Wata Warehousing and Knowledge Discovery: 8th International Conference, DaWaK 2006, Krakow, Poland, September 4-8, 2006, Proceedings by
Algorithms - ESA 2006: 14th Annual European Symposium, Zurich, Switzerland, September 11-13, 2006, Proceedings by
Encyclopedia of Multimedia by
Wireless Sensor Networks by
Microsoft Exchange Server 2003 Deployment and Migration: Sp1 & Sp2 by McCorry, Kieran
Web Services and Formal Methods: Third International Workshop, Ws-FM 2006, Vienna, Austria, September 8-9, 2006, Proceedings by
Database and XML Technologies: 4th International XML Database Symposium, Xsym 2006, Seoul, Korea, September 10-11, 2006, Proceedings by
Ubicomp 2006: Ubiquitous Computing: 8th International Conference, Ubicomp 2006, Orange County, Ca, Usa, September 17-21, 2006, Proceedings by
Secure Data Management: Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings by
Multimedia Content Representation, Classification and Security: International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006, Proceeding by
Security Protocols: 12th International Workshop, Cambridge, Uk, April 26-28, 2004. Revised Selected Papers by
Cooperative Design, Visualization, and Engineering: Third International Conference, CDVE 2006, Mallorca, Spain, September 17-20, 2006, Proceedings by
Recent Advances in Intrusion Detection: 9th International Symposium, RAID 2006 Hamburg, Germany, September 20-22, 2006 Proceedings by
High Performance Computing and Communications: Second International Conference, Hpcc 2006, Munich, Germany, September 13-15, 2006, Proceedings by
Interactive Computation: The New Paradigm by
Self-Organizing Systems: First International Workshop, Iwsos 2006 and Third International Workshop on New Trends in Network Architectures and S by
Groupware: Design, Implementation, and Use: 12th International Workshop, Criwg 2006, Medina del Campo, Spain, September 17-21, 2006, Proceedings by
Rechneraufbau Und Rechnerarchitektur by Böttcher, Axel
Communication Networks by Kasera, Sumit
Computer Security - Esorics 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings by
Distributed Computing: 20th International Symposium, Disc 2006, Stockholm, Sweden, September 18-20, 2006, Proceedings by
Cellular Automata: 7th International Conference on Cellular Automata for Research and Industry, Acri 2006, Perpignan, France, September 2 by
Multiagent System Technologies: 4th German Conference, MATES 2006, Erfurt, Germany, September 19-20, 2006, Proceedings by
Network-Centric Collaboration and Supporting Frameworks: IFIP TC5 WG 5.5, Seventh IFIP Working Conference on Virtual Enterprises, 25-27 September 2006 by
Management of Convergence Networks and Services: 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27- by
BizTalk 2006 Recipes: A Problem-Solution Approach by Beckner, Mark, Goeltz, Ben, Gross, Brandon
Ubiquitous Computing Systems: Third International Symposium, UCS 2006, Seoul, Korea, October 11-13, 2006, Proceedings by
Managing Knowledge in a World of Networks: 15th International Conference, EKAW 2006, Podebrady, Czech Republic, October 2-6, 2006, Proceedings by
Pro Open Source Mail: Building an Enterprise Mail Solution by Smith, Curtis
From Model-Driven Design to Resource Management for Distributed Embedded Systems: IFIP TC 10 Working Conference on Distributed and Parallel Embedded S by
Developing Ambient Intelligence: Proceedings of the First International Conference on Ambient Intelligence Developments (AmID'06) by Lotz, Volkmar, Mana, Antonio
Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised S by
Formal Techniques for Networked and Distributed Systems - Forte 2006: 26th Ifip Wg 6.1 International Conference, Paris, France, September 26-29, 2006, by
Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings by
Citrix(r) Access Suite Security for It Administrators by Citrix Engineering Team
What Every Programmer Needs to Know about Security by
Building a VoIP Network with Nortel's Multimedia Communication Server 5100 by Chaffin, Larry
Current Trends in Database Technology - Edbt 2006: Edbt 2006 Workshop Phd, Datax, Iidb, Iiha, Icsnw, Qlqp, Pim, Parma, and Reactivity on the Web, Muni by
Automated Technology for Verification and Analysis: 4th International Symposium, ATVA 2006, Beijing, China, October 23-26, 2006, Proceedings by
Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceed by
Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms: Aamas 2005 Workshop, Amec 2005, Utrecht, Netherlands, July 25, 2005, and by
Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings by
Ontology Learning and Population from Text: Algorithms, Evaluation and Applications by Cimiano, Philipp
Large Scale Management of Distributed Systems: 17th Ifip/IEEE International Workshop on Distributed Systems: Operations and Management, Dsom 2006, Dub by
RFID Implementation by Brown, Dennis
Autonomic Management of Mobile Multimedia Services: 9th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Service by
Autonomic Principles of IP Operations and Management: 6th IEEE International Workshop on IP Operations and Management, IPOM 2006, Dublin, Ireland, Oct by
IPv6 in Practice: A Unixer's Guide to the Next Generation Internet by Stockebrand, Benedikt
Practical Internet Security by Vacca, John R.
Advances in Web Mining and Web Usage Analysis: 6th International Workshop on Knowledge Discovery on the Web, Webkdd 2004, Seattle, Wa, Usa, August 22- by
Computer and Information Sciences - Iscis 2006: 21th International Symposium Istanbul, Turkey, Novenber 1-3, 2006, Proceedings by
Sensor Networks and Configuration: Fundamentals, Standards, Platforms, and Applications by
Malware Detection by
Microsoft(r) Exchange Server 2003 Scalability with Sp1 and Sp2 by Bijaoui, Pierre
Microsoft Windows Security Fundamentals by Grillenmeier, Guido, de Clercq, Jan
Virtualization with Microsoft Virtual Server 2005 by Seldam, Matthijs Ten, Dittner, Rogier, Rule, David, Jr.
Communication Complexity by Kushilevitz, Eyal, Nisan, Noam
Biometrics, Computer Security Systems and Artificial Intelligence Applications by
information Networking: Advances in Data Communications and Wireless Networks: International Conference, ICOIN 2006, Sendai, Japan, January 16 by
Security for Wireless Sensor Networks by Ning, Peng, Liu, Donggang
Probability Distributions Involving Gaussian Random Variables: A Handbook for Engineers and Scientists by Simon, Marvin K.
Preserving Privacy in On-Line Analytical Processing (Olap) by Wijesekera, Duminda, Jajodia, Sushil, Wang, Lingyu
Cryptographic Algorithms on Reconfigurable Hardware by Rodriguez-Henriquez, Francisco, Saqib, N. a., Díaz Pérez, Arturo
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services by Gunther, Neil J.
Echtzeitsysteme Im Alltag: Fachtagung Der Gi-Fachgruppe Echtzeitsysteme (Rt), Boppard, 30. November/1. Dezember 2006 by
Knowledge and Data Management in GRIDs by
High Performance Computing - HIPC 2006: 13th International Conference Bangalore, India, December 18-21, 2006, Proceedings by
Semantics, Web and Mining: Joint International Workshop, EWMF 2005 and KDO 2005, Porto, Portugal, October 3-7, 2005, Revised Selected Papers by
Pro SMS 2003 by Kruetzfeld, Rod
Multimodal Interaction with Mobile Devices: Fusing a Broad Spectrum of Modality Combinations by Wasinger, Rainer
A Graph-Theoretic Approach to Enterprise Network Dynamics by Bunke, Horst, Dickinson, Peter J., Kraetzl, Miro
Video Traces for Network Performance Evaluation: A Comprehensive Overview and Guide on Video Traces and Their Utilization in Networking Research [With by Reisslein, Martin, Fitzek, Frank H. P., Seeling, Patrick
Optical Networking Standards: A Comprehensive Guide for Professionals by
Context-Aware Pervasive Systems: Architectures for a New Breed of Applications by Loke, Seng
It-Sicherheit Kompakt Und Verständlich: Eine Praxisorientierte Einführung by Witt, Bernhard C.
Electronic Postage Systems: Technology, Security, Economics by Bleumer, Gerrit
Network Security Policies and Procedures by Frye, Douglas W.
Balanced Website Design: Optimising Aesthetics, Usability and Purpose by Lawrence, Dave, Tavakol, Soheyla
Past, Present and Future of Research in the Information Society by
The Definitive Guide to SUSE Linux Enterprise Server by Van Vugt, Sander
Iptv Crash Course by Weber, Joseph W., Newberry, Tom
Agents and Peer-To-Peer Computing: 4th International Workshop, AP2PC 2005, Utrecht, Netherlands, J Uly 25, 2005, Revised Papers by
General Theory of Information Transfer and Combinatorics by
Embedded Java Security: Security for Mobile Devices by Saleh, Mohamed, Talhi, Chamseddine, Debbabi, Mourad
Ontologies: A Handbook of Principles, Concepts and Applications in Information Systems by
Algorithmic Aspects of Wireless Sensor Networks: Second International Workshop, ALGOSENSORS 2006, Venice, Italy, July 15, 2006, Revised Selected Paper by
Hack the Stack by Bandes, Ronald M., Watkins, Stephen, Mays, George
Auswahl mit Variantenvergleich, Planung und produktionswirksame Einführung eines Verfahrens zur Verschlüsselung von externen Mails in der Berliner Vol by Müller, Matthias
E-Learning Networked Environments and Architectures: A Knowledge Processing Perspective by
Quality of Service in Optical Burst Switched Networks by Liu, Yong, Chua, Kee Chaing, Gurusamy, Mohan
Workflows for e-Science: Scientific Workflows for Grids by
Peer-To-Peer Computing: Building Supercomputers with Web Technologies by Loo, Alfred Wai-Sing