• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2012

Green Communications and Networks: Proceedings of the International Conference on Green Communications and Networks (Gcn 2011) by
Service Placement in AD Hoc Networks by Wittenburg, Georg, Schiller, Jochen
Fault Tolerance: Principles and Practice by Lee, Peter A., Anderson, Thomas
Interface Fundamentals in Microprocessor-Controlled Systems by Georgopoulos, C. J.
Mathematical and Engineering Methods in Computer Science: 7th International Doctoral Workshop, Memics 2011, Lednice, Czech Republic, October 14-16, 20 by
Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware by
Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected by
Distributed Environments: Software Paradigms and Workstations by
Scrambling Techniques for Digital Transmission by Kim, Seok C., Lee, Byeong G.
Enterprise Networks and Telephony: From Technology to Business Strategy by Dufour, Arnaud, Ghernaouti-Helie, Solange
A Primer of Multicast Routing by Rosenberg, Eric
Understanding and Using the Controller Area Network Communication Protocol: Theory and Practice by Di Natale, Marco, Zeng, Haibo, Giusto, Paolo
Responsive Computer Systems by
Wandel Von Der Telekommunikation Zu Unified Communications: Veränderungsprozesse Für Unternehmen Durch Internetbasierte Innovation by Lehmann, Ralf
Wilde's WWW: Technical Foundations of the World Wide Web by Wilde, Erik
Aplicación para el diseño y optimización de una red inalámbrica WiFi by Ferreira Enrique D., Rafaniello Gambogi Florencia, Ludueña Muniz Marcos G
Quorum Systems: With Applications to Storage and Consensus by Vukolic, Marko
Engineering Secure Software and Systems: 4th International Symposium, ESSoS 2012, Eindhoven, the Netherlands, February, 16-17, 2012, Proceedings by
Research, Practice, and Educational Advancements in Telecommunications and Networking by
Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management by
Iaeng Transactions on Engineering Technologies Volume 7 - Special Edition of the International Multiconference of Engineers and Computer Scientists 20 by
Mike Meyers' Comptia Network+ Guide to Managing and Troubleshooting Networks Lab Manual, 3rd Edition (Exam N10-005) by Meyers, Mike, Haley, Dennis
Advances in Real-Time Systems by
Ortsfeste Dieselmotoren Und Schiffsdieselmotoren by Mayr, Fritz
Systementwurf Mit Netzen by Reisig, Wolfgang
Softwaretechnik Für Verteilte Systeme by Nehmer, Jürgen
Successful Fiber Optic Installation: A Rapid Start Guide by Pearson Cfos, Eric Robert
Pro SharePoint 2010 Governance by Wright, Steve, Erkes, Corey
Advanced Topics in Multimedia Research by
Verteilte Systeme: Grundlagen Und Basistechnologien by Schill, Alexander, Springer, Thomas
Der "Information Superhighway": Amerikanische Visionen Und Erfahrungen by
Future Wireless and Optical Networks: Networking Modes and Cross-Layer Design by Jiang, Shengming
The Economics of Networks: Interaction and Behaviours by
Recent Advances in Speech Understanding and Dialog Systems by
Pro SharePoint with jQuery by Duffy, Phill
Computational Linguistics and Intelligent Text Processing: 13th International Conference, Cicling 2012, New Delhi, India, March 11-17, 2012, Proceedin by
Computational Linguistics and Intelligent Text Processing: 13th International Conference, Cicling 2012, New Delhi, India, March 11-17, 2012, Proceedin by
Power Distribution and Performance Analysis for Wireless Communication Networks by Zhao, Dongmei
Advanced Distributed Measuring Systems - Exhibits of Application by
Guidelines for Securing Wireless Local Area Networks (WLANS) by U. S. Department of Commerce, Souppaya, Murugiah, Scarfone, Karen
Enterprise Software Architectu by Duggan, Dominic
Simulation in Computer Network Design and Modeling: Use and Analysis by
Wireless Technologies in Vehicular Ad Hoc Networks: Present and Future Challenges by
My Personal Adaptive Global Net (Magnet) by
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide by Chappell, Laura
Click Fraud - Analyse und Methode zur Identifzierung by Diesenbacher, Otto
Modern Telecommunication by Carne, E. Bryan
Practical Computer Data Communications by Barksdale, William J.
Treatment of Urolithiasis by
Adaptive and Learning Agents: Aamas 2011 International Workshop, ALA 2011, Taipei, Taiwan, May 2, 2011, Revised Selected Papers by
Sicherheitsanalyse Webserver by Hofer, Reinhard
Autonomic Cooperative Networking by Wódczak, Michal
802.1aq Shortest Path Bridging Design and Evolution: The Architect's Perspective by Allan, David, Bragg, Nigel
Wireless Communications and Networks: Recent Advances by
Applied Cryptography and Network Security by
Multimedia Communications and Networking by Da Silva, Mario Marques
Analysis, Architectures and Modelling of Embedded Systems: Third Ifip Tc 10 International Embedded Systems Symposium, Iess 2009, Langenargen, Germany, by
Pervasive Computing: Innovations in Intelligent Multimedia and Applications by
Inetsec 2009 - Open Research Problems in Network Security: Ifip Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Select by
Advances in Intelligent and Distributed Computing: Proceedings of the 1st International Symposium on Intelligent and Distributed Computing IDC 2007, C by
Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of by
Rhodes Framework for Android(tm) Platform and Blackberry(r) Smartphones by Vohra, Deepak
Social Computing, Behavioral-Cultural Modeling and Prediction: 5th International Conference, Sbp 2012, College Park, MD, Usa, April 3-5, 2012, Proceed by
Multi-Media Document Translation: Oda and the Expres Project by Marks, Ann, Rosenberg, Jonathan, Sherman, Mark
Today's Impact on Communication System by IP Spoofing and Its Detection and Prevention by Linta, Sharmin Rashid, Khan, MD Ridgewan
Understanding Weightless: Technology, Equipment, and Network Deployment for M2m Communications in White Space by Webb, William
Wörterbuch Der Elektronik, Datentechnik Und Telekommunikation / Dictionary of Electronics, Computing and Telecommunications: Deutsch-Englisch / German by Ferretti, Vittorio
Analyse von TK-Anlagen unter Sicherheitsanforderungen by Steinmann, Michael
Cisco Unified Communications Manager 8: Expert Administration Cookbook by Ezell, Tanner
Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings by
SharePoint 2010 at Work: Tricks, Traps, and Bold Opinions by Miller, Mark
Getting Started with Netduino: Open Source Electronics Projects with .Net by Walker, Chris
Mobile Networking with WAP: The Ultimate Guide to the Efficient Use of Wireless Application Protocol by
Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends by
Building Internet of Things with the Arduino by Doukas, Charalampos
Distributed Operating Systems: Theory and Practice by
Energy Efficiency in Communications and Networks by
8 Steps to Amazing Webinars by Burton, Sharon
Mobile Lightweight Wireless Systems: Third International Icst Conference, Mobilight 2011, Bilbao, Spain, May 9-10, 2011, Revised Selected Papers by
Deployment Fundamentals, Vol. 3: Deploying Windows 7 Using System Center Configuration Manager 2007 by Nystr M., Mikael, Nackers, Chris, Arwidmark, Johan
Leistungsbewertung Von Kommunikationssystemen by Sandmann, Werner
Informationssicherheit: Implementierung eines zertifizierten ISMS nach ISO27001 für IT-Dienstleister by Groß, Markus
Getting Started with RFID: Identify Objects in the Physical World with Arduino by Igoe, Tom
P2P Techniques for Decentralized Applications by El-Dick, Manal, Pacitti, Esther, Akbaranian, Reza
Processor Networks and Aspects of the Mapping Problem by Hilbers, Peter A. J.
Information Technology and the Computer Network by
Constructive Side-Channel Analysis and Secure Design: Third International Workshop, Cosade 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings by
Look Smarter Than You Are with Oracle Enterprise Planning Cloud by Roske, Edward, McMullen, Tracy, Consulting, Interrel
Advanced Internet Protocols by Rojas-Cessa, Roberto, Tatipamula, Mallikarjun, Oki, Eiji
Multiple-Criteria Decision Making: Concepts, Techniques, and Extensions by Yu, Po-Lung
Technology Integration Advancements in Distributed Systems and Computing by
Using Cross-Layer Techniques for Communication Systems by
Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers by
Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers by
Algorithms for Next Generation Networks by
Practical SharePoint 2010 Information Architecture by Gotz, Ruven
Context Management for Distributed and Dynamic Context-Aware Computing by Da Rocha, Ricardo Couto Antunes, Endler, Markus
The Regularized Fast Hartley Transform: Optimal Formulation of Real-Data Fast Fourier Transform for Silicon-Based Implementation in Resource-Constrain by Jones, Keith
Performance Analysis of the CAP-SV Routing Protocol by Yazıcı, Mehmet Akif
Networking 2012: 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part I by
Networking 2012: 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part II by
Instant Messaging and Cross Site Scripting (XSS) by Kurek, Katharina
Financial Cryptography and Data Security: FC 2011 Workshops, Rlcps and Wecsr, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Pap by
The Network Migration Workbook: Zero Downtime Migration Strategies for Windows Networks 2nd Edition by Palachuk, Karl W., Palachuk, Manuel L.
SharePoint Apps with Lightswitch: A QuickStart Guide to Programming Business Applications in VB.NET by Ferrill, Paul
802.11n: A Survival Guide: Wi-Fi Above 100 Mbps by Gast, Matthew S.
Wireless Network Security a Beginner's Guide by Wrightson, Tyler
Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments by
Multimedia Communications, Services and Security: 5th International Conference, MCSS 2012, Krakow, Poland, May 31--June 1, 2012, Proceedings by
Public Key Infrastructures, Services and Applications: 8th European Workshop, Europki 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected P by
Decentralized Reasoning in Ambient Intelligence by Endler, Markus, Viterbo, José
Channel Estimation for LTE MIMO-OFDM Systems by Omri, Aymen
Microsoft Sharepoint for Business Executives: Q&A Handbook by Ward, Peter, Andrushkiw, Pavlo, Harbridge, Richard
Coverage Control in Sensor Networks by Wang, Bang
Cloud Computing Synopsis and Recommendations by U. S. Department of Commerce, Patt-Corner, Robert, Grance, Tim
Streaming Media with Peer-to-Peer Networks: Wireless Perspectives by
System Center 2012 Configuration Manager: Mastering the Fundamentals by Agerlund, Kent
Computational Science and Its Applications -- Iccsa 2012: 12th International Conference, Salvador de Bahia, Brazil, June 18-21, 2012, Proceedings, Par by
Computational Science and Its Applications -- Iccsa 2012: 12th International Conference, Salvador de Bahia, Brazil, June 18-21, 2012, Proceedings, Par by
Look Smarter Than You are with Smart View 11.1.2 by Roske, Edward, McMullen, Tracy
Computational Science and Its Applications -- Iccsa 2012: 12th International Conference, Salvador de Bahia, Brazil, June 18-21, 2012, Proceedings, Par by
Computational Science and Its Applications -- Iccsa 2012: 12th International Conference, Salvador de Bahia, Brazil, June 18-21, 2012, Proceedings, Par by
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th Ifip Wg 11.2 Intern by
Pro SharePoint Migration: Moving from Moss 2007 to SharePoint Server 2010 by LLC, Winsmarts, Sistla, Srini, Malik, Sahil
CWNA Guide to Wireless LANs by Ciampa, Mark
Structural Information and Communication Complexity: 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30 - July 2, 2012, Revised by
Gestion de Redes Orientado a la Telematica y Cableado Estructurado by Cortes, Antonio, Cort S., Antonio
Embedded Systems and Wireless Technology: Theory and Practical Applications by
Advances in Neural Networks - Isnn 2012: 9th International Symposium on Neural Networks, Isnn 2012, Shenyang, China, July 11-14, 2012. Proceedings, Pa by
Advances in Neural Networks - Isnn 2012: 9th International Symposium on Neural Networks, Isnn 2012, Shenyang, China, July 11-14, 2012. Proceedings, Pa by
Progress in Cryptology -- Africacrypt 2012: 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings by
Computational Social Networks: Tools, Perspectives and Applications by
Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology (Special Publicati by Scarfone, Karen, Souppaya, Murugiah
Knowledge Grid, The: Toward Cyber-Physical Society (2nd Edition) by Zhuge, Hai
Next Generation Content Delivery Infrastructures: Emerging Paradigms and Technologies by
Developments in Wireless Network Prototyping, Design, and Deployment: Future Generations by
Wireless LAN Security in a SOHO Environment: A Holistic Approach by Wimmer, Christian
Interworking of Wireless LANs and Cellular Networks by Zhuang, Weihua, Song, Wei
Combinatorial Optimization: Second International Symposium, Isco 2012, Athens, Greece, 19-21, Revised Selected Papers by
Guide to Reliable Internet Services and Applications by
Der Hackerbegriff in den Medien: Ein Diskurs by Witte, Randy
Privacy Enhancing Technologies: 12th International Symposium, Pets 2012, Vigo, Spain, July 11-13, 2012, Proceedings by
Advances in Cryptology -- Crypto 2012: 32nd Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2012, Proceedings by
Wireshark Certified Network Analyst Exam Prep Guide (Second Edition) by Chappell, Laura
Self-* and P2P for Network Management: Design Principles and Case Studies by Marquezan, Clarissa Cassales, Granville, Lisandro Zambenedetti
Webserver Security by Ermolin, Pavel
Pro2Expert CCIE R&S lab 4.0 by Chisholm, Greg
Wireless Sensor Networks: Technology and Applications by
Business Processes by Milo, Tova, Deutsch, Daniel
Intelligence in Networks: Ifip Tc6 Wg6.7 Fifth International Conference on Intelligence in Networks (Smartnet '99) November 22-26, 1999, Pathumt by
Network Management and Control by
Personal Wireless Communications: Ifip Tc6/Wg6.8 Working Conference on Personal Wireless Communications (Pwc'2000), September 14-15, 2000, Gdańsk by
Network-Embedded Management and Applications: Understanding Programmable Networking Infrastructure by
Mastering Fiber Optic Network Design: The Essentials by Pearson, Eric R.
Mobile Commerce: Technology, Theory, and Applications by Mennecke, Brian E., Strader, Troy
Getting Started with Citrix Xenapp 6.5 by Musumeci, Guillermo
Combinatorial Optimization and Applications: 6th International Conference, Cocoa 2012, Banff, Ab, Canada, August 5-9, 2012, Proceedings by
Control of Discrete-Event Systems: Automata and Petri Net Perspectives by
Signal Processing and Information Technology: First International Joint Conference, Spit 2011, Amsterdam, the Netherlands, December 1-2, 2011, Revised by
Network and Traffic Engineering in Emerging Distributed Computing Applications by
Cloud Computing Simplified for Small Businesses: Five Steps for Successful Cloud Office Automation by Augustine, Kimberlee, Rasmussen, Roy
Security and Cryptography for Networks: 8th International Conference, Scn 2012, Amalfi, Italy, September 5-7, 2012, Proceedings by
Effiziente Datenanalyse in Netzwerkgraphen: Durch User Defined Functions in PostgreSQL by Redmer, Andreas
Eagle Eye by Kathiresshan, Nandhakumar
Smart Networks: Ifip Tc6 / Wg6.7 Seventh International Conference on Intelligence in Networks (Smartnet 2002) April 8-10, 2002, Saaris by
Mastering Fiber Optic Network Design: Presentation Slides by Pearson Cfos, Eric Robert
Certification and Troubleshooting Fiber Optic Networks by Pearson Cfos, Eric R.
Resource Management Schemes in Wireless Networks by Min, Geyong, Zabanoot, Zaid
Wireless Mesh Networks: Efficient Link Scheduling, Channel Assignment and Network Planning Strategies by
Security and Privacy in Social Networks by
Computational Social Networks: Security and Privacy by
Computational Social Networks: Mining and Visualization by
Recent Advances in the Message Passing Interface: 19th European Mpi Users' Group Meeting, Eurompi 2012, Vienna, Austria, September 23-26, 2012. Procee by
Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management by Oki, Eiji
Green Communication and Networking: First International Conference, Greenets 2011, Colmar, France, October 5-7, 2011, Revised Selected Papers by
Flow Control of Congested Networks by
Some Research on Optical Fibre Security by Dutt, Inadyuti, Paul, Soumya
Theoretical Foundations for Digital Libraries: The 5s (Societies, Scenarios, Spaces, Structures, Streams) Approach by Gonçalves, Marcos André, Shen, Rao, Fox, Edward
Knowledge Management Innovations for Interdisciplinary Education: Organizational Applications by
Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID by
Cognitive Radio and Interference Management: Technology and Strategy by
Web-Based Multimedia Advancements in Data Communications and Networking Technologies by
Cloud Computing in Easy Steps by Crookes, David
Energy-Efficient High Performance Computing: Measurement and Tuning by Kelly, Suzanne M., Laros III, James H., Pedretti, Kevin
Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-Acns by
A Manager's Primer on E-Networking: An Introduction to Enterprise Networking in E-Business Acid Environment by Nikolik, Dragan
New Network Architectures: The Path to the Future Internet by
A Discipline of Multiprogramming: Programming Theory for Distributed Applications by Misra, Jayadev
Wireless Sensor Networks: Technology and Protocols by
Active Middleware Services: From the Proceedings of the 2nd Annual Workshop on Active Middleware Services by
Trustworthy Ubiquitous Computing by
The Internet Challenge: Technology and Applications: Proceedings of the 5th International Workshop Held at the Tu Berlin, Germany, October 8th-9th, 20 by
Principles of Secure Network Systems Design by Ghosh, Sumit
Communications and Networking: An Introduction by Cowley, John
Dynamic Cloud Collaboration Platform: A Market-Oriented Approach by Hassan, Mohammad Mehedi, Huh, Eui-Nam
The Era of Interactive Media by Xu, Min, Jin, Jesse S., Xu, Changsheng
Collaborative Networks in the Internet of Services: 13th Ifip Wg 5.5 Working Conference on Virtual Enterprises, Pro-Ve 2012, Bournemouth, Uk, October by
Distributed Programming: Theory and Practice by Shankar, A. Udaya
Cloud Computing - Chance oder Risiko? Für die Implementierung und Anwendung in Unternehmen by Lanzrath, Matthias
Direct Digital Control Systems: Application - Commissioning by Nardone, Mary S.
See More