• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2014

Computer & IT Policies and Procedures Manual by
Soziologie Der Online-Kommunikation by Beck, Klaus
Security and Privacy in Communication Networks: 9th International Icst Conference, Securecomm 2013, Revised Selected Papers by
Sensor Systems and Software: 4th International Icst Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers by
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything by Dacosta, Francis, Henderson, Byron
Critical Information Infrastructures Security: 8th International Workshop, Critis 2013, Amsterdam, the Netherlands, September 16-18, 2013, Revised Sel by
SharePoint 2013 Solution Series Volumes 1-5 by Mann, Steven
SharePoint 2013 Survey Ramp-Up Guide by Mann, Steven
Modifying Your Site Navigation in SharePoint 2013 by Mann, Steven
Information Computing and Applications: 4th International Conference, Icica 2013, Singapore, August 16-18, 2013. Revised Selected Papers, Part II by
Algorithms for Sensor Systems: 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Roboti by
Information Computing and Applications: 4th International Conference, Icica 2013, Singapore, August 16-18, 2013. Revised Selected Papers, Part I by
Frontiers in Internet Technologies: Second Ccf Internet Conference of China, Icoc 2013, Zhangjiajie, China. Revised Selected Papers by
How To Integrate BCS with Search in SharePoint 2013 by Mann, Steven
Improving the Performance of Wireless LANs: A Practical Guide by Sarkar, Nurul
Wireless Sensors in Industrial Time-Critical Environments by Cecílio, José, Furtado, Pedro
Real-World Wireless Sensor Networks: Proceedings of the 5th International Workshop, Realwsn 2013, Como (Italy), September 19-20, 2013 by
Mobile Networks and Management: 5th International Conference, Monami 2013, Cork, Ireland, September 23-25, 2013, Revised Selected Papers by
SharePoint 2013 Solution Series Volumes 6-10 by Mann, Steven
SharePoint 2013 Solution Series Volumes 1-20 by Mann, Steven
SharePoint 2013 Solution Series Volumes 1-10 by Mann, Steven
SharePoint 2013 Solution Series Volumes 11-15 by Mann, Steven
SharePoint 2013 Solution Series Volumes 16-20 by Mann, Steven
Sicherheit in vernetzten Systemen: 21. DFN-Workshop by
AD Hoc Networks: 5th International Icst Conference, Adhocnets 2013, Barcelona, Spain, October 2013, Revised Selected Papers by
Collaborative Web Hosting: Challenges and Research Directions by Ahmed, Reaz, Boutaba, Raouf
Deep Space Telecommunications Systems Engineering by Administration, National Aeronautics and
Troubleshooting with Wireshark: Locate the Source of Performance Problems by Chappell, Laura
Packet Tracer Network Simulator by A, Jesin
Practical IIS: Internet Information Services in the Data Center and the Cloud by Walch, Helmuth, Walch, Christian
Public Key Infrastructures, Services and Applications: 10th European Workshop, Europki 2013, Egham, Uk, September 12-13, 2013, Revised Selected Papers by
Verification, Model Checking, and Abstract Interpretation: 15th International Conference, Vmcai 2014, San Diego, Ca, Usa, January 19-21, 2014, Proceed by
Secure Cloud Computing by
IOS and OS X Network Programming Cookbook by Hoffman, Jon
Service Level Agreements for Cloud Computing by
Mobile Intention Recognition by Kiefer, Peter
Administering Arcgis for Server by Nasser, Hussein
Satellite Data Compression by
Vmware Vsphere 5.X Datacenter Design Cookbook by Cartwright, Hersey
Getting Started with Citrix Provisioning Services 7.0 by Udayakumar, Puthiyavan
Autonomic Clustering of Distributed Agents by Ogston, Elizabeth
Fundamentals of Autonomic Communications: Principles for Building Autonomic Systems by Jennings, Brendan, Strassner, John C., Meer, Sven Van Der
Location Privacy Preservation in Cognitive Radio Networks by Zhang, Qian, Wang, Wei
The State of the Art in Intrusion Prevention and Detection by
How to Do Everything: Icloud, Second Edition by Rich, Jason R.
Wireless Sensor Networks: 11th European Conference, Ewsn 2014, Oxford, Uk, February 17-19, 2014, Proceedings by
Security-Aware Cooperation in Cognitive Radio Networks by Mark, Jon W., Zhang, Ning
Seamless and Secure Communications Over Heterogeneous Wireless Networks by Cao, Jiannong, Zhang, Chisheng
Architecture of Computing Systems -- Arcs 2014: 27th International Conference, Lübeck, Germany, February 25-28, 2014, Proceedings by
Frontiers in Gaming Simulation: 44th International Simulation and Gaming Association Conference, Isaga 2013 and 17th Ifip Wg 5.7 Workshop on Experimen by
Passive and Active Measurement: 15th International Conference, Pam 2014, Los Angeles, Ca, Usa, March 10-11, 2014, Proceedings by
Self-Organizing Systems: 7th Ifip Tc6 International Workshop, Iwsos 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers by
Proceedings of International Conference on Computer Science and Information Technology: Csait 2013, September 21-23, 2013, Kunming, China by
XML in der NC-Verfahrenskette: Die Optimierung des Informationsflusses im Kontext eines XML-basierten Dateiformates by Wagner, Christian
Raspberry Pi Server Essentials by Kula, Piotr
Networking Services: QoS, Signaling, Processes by Perros, Harry
Game Theoretic Approaches for Spectrum Redistribution by Wu, Fan
Energy Detection for Spectrum Sensing in Cognitive Radio by Tellambura, Chintha, Jiang, Hai, Atapattu, Saman
Wi-Fi Enabled Healthcare by Youssef, Ali, Linton, Jon, McDonald, Douglas, II
Communication Networks for Smart Grids: Making Smart Grid Real by Budka, Kenneth C., Deshpande, Jayant G., Thottan, Marina
Penetration Testing with Backbox by Umit Uygur, Stefan
From the Web to the Grid and Beyond: Computing Paradigms Driven by High-Energy Physics by
Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware by
Understanding and Using the Controller Area Network Communication Protocol: Theory and Practice by Giusto, Paolo, Di Natale, Marco, Zeng, Haibo
Mosh (Mobile Shell): A New Era of Remote Access by Raj, Aditya
Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises by Reed, Andy
Networked Audiovisual Systems by Grimes, Brad, Avixa Inc Na
Handbook of Research on Cloud Infrastructures for Big Data Analytics by
Radio Resource Management Using Geometric Water-Filling by Zhao, Lian, Zhou, Sheng, He, Peter
Implementation and Evaluation of a Zigbee Network by Takpor Temitope
Computación en la Nube by Arias, Angel
Cloud Computing for Enterprise Architectures by
Handbook of Optimization in Complex Networks: Theory and Applications by
Handbook of Optimization in Complex Networks: Communication and Social Networks by
Support Vector Machines Applications by
Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, Snds 2014, Trivandrum, India, March 13-14, 2014. by
Openshmem and Related Technologies. Experiences, Implementations, and Tools: First Workshop, Openshmem 2014, Annapolis, MD, Usa, March 4-6, 2014, Proc by
Measurement, Modeling and Evaluation of Computing Systems and Dependability and Fault Tolerance: 17th International Gi/ITG Conference, Mmb & DFT 2014, by
Web Information Systems Engineering - Wise 2013 Workshops: Wise 2013 International Workshops Bigwebdata, Mbc, Pcs, Steh, Quat, Sceh, and Stsc 2013, Na by
Engineering Secure Software and Systems: 6th International Symposium, Essos 2014, Munich, Germany, February 26-28, 2014. Proceedings by
ELSTER - Die elektronische Steuererklärung by Dieter, Susanne
Dynamic Provisioning for Community Services by Qi, Li, Jin, Hai
Emerging Trends in Computing and Communication: Etcc 2014, March 22-23, 2014 by
Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks by Li, Junkun, He, Shibo, Chen, Jiming
Security for Multi-Hop Wireless Networks by Mahmoud, Mohamed M. E. a., Shen
Advances in Wireless Sensor Networks: 7th China Conference, Cwsn 2013, Qingdao, China, October 17-19, 2013. Revised Selected Papers by
Principles of Security and Trust: Third International Conference, Post 2014, Held as Part of the European Joint Conferences on Theory and Practice of by
Structured Object-Oriented Formal Language and Method: Third International Workshop, Sofl+msvl 2013, Queenstown, New Zealand, October 29, 2013, Revise by
Stable Throughput Regions in Wireless Networks by Kompella, Sastry, Ephremides, Anthony
BGP for Cisco Networks: A CCIE v5 guide to the Border Gateway Protocol by Fordham, Stuart D.
Learning Nagios 4 by Kocjan, Wojciech
Running Mainframe Z on Distributed Platforms: How to Create Robust Cost-Efficient Multiplatform Z Environments by Barrett, Kenneth, Norris, Stephen
Implementing Samba 4 by Leal, Marcelo
Guide to OSI and TCP/IP Models by Alani, Mohammed M.
Network Hardening: An Automated Approach to Improving Network Security by Wang, Lingyu, Albanese, Massimiliano, Jajodia, Sushil
Architectures of Small-Cell Networks and Interference Management by Ngo, Duy Trong, Le-Ngoc, Tho
Building Information Modeling (BIM) in der Planung von Bauleistungen by Albrecht, Matthias
Resource Management for Heterogeneous Networks in Lte Systems by Hu, Rose Qingyang, Qian, Yi
Linear Network Error Correction Coding by Guang, Xuan, Zhang, Zhen
Cloud Computing: Eine kritische Analyse des Cloud Computings im gewerblichen Bereich by Burkert, Matthias
Intelligence for Embedded Systems: A Methodological Approach by Alippi, Cesare
Attachment Transmission in Wireless Networks by Wu, Kaishun, Hamdi, Mounir, Wang, Lu
Vmware Horizon Workspace Essentials by Von Oven, Peter, Bjork, Peter, Lindberg, Joel
Libro Cientifico: Investigaciones En Tecnologias de Informacion Informatica y Computacion by Vasquez, Jorge
Libro Cientifico: Investigaciones En Tecnologias de Informacion Informatica y Computacion by Vasquez, Jorge
Cloud Data Management by Zhao, Liang, Sakr, Sherif, Liu, Anna
Recent Advances in Information Technology: Rait-2014 Proceedings by
Distributed Computer and Communication Networks: 17th International Conference, Dccn 2013, Moscow, Russia, October 7-10, 2013. Revised Selected Papers by
Pro Angularjs by Freeman, Adam
Digital Libraries Applications by Leidig, Jonathan P., Fox, Edward a.
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps: Sicherheitsanalyse von Microsoft Komponenten by Szameitat, Daniel
Computational Linguistics and Intelligent Text Processing: 15th International Conference, Cicling 2014, Kathmandu, Nepal, April 6-12, 2014, Proceeding by
Computational Linguistics and Intelligent Text Processing: 15th International Conference, Cicling 2014, Kathmandu, Nepal, April 6-12, 2014, Proceeding by
Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education by
Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments by
Controller Area Network Prototyping with Arduino by Voss, Wilfried
Digital Library Technologies by Fox, Edward a., Da Silva Torres, Ricardo
Modeling and Analysis of Voice and Data in Cognitive Radio Networks by Zhuang, Weihua, Gunawardena, Subodha
Traffic Monitoring and Analysis: 6th International Workshop, Tma 2014, London, Uk, April 14, 2014, Proceedings by
Cloud Computing: A Hands-On Approach by Madisetti, Vijay, Bahga, Arshdeep
Lets VDIfy Our Systems: What is the Virtual Desktop ? by Alshafee, Khalid
Information Security Practice and Experience: 10th International Conference, Ispec 2014, Fuzhou, China, May 5-8, 2014, Proceedings by
The Book on Networks: Everything you need to know about the Internet, Online Security and Cloud Computing. by Fisher, Robin
Enabling Content Distribution in Vehicular AD Hoc Networks by Bai, Fan, Shen, Luan, Tom H.
Enabling Secure and Privacy Preserving Communications in Smart Grids by Li, Hongwei
Applied Optimization Methods for Wireless Networks by Sherali, Hanif D., Hou, Y. Thomas, Shi, Yi
Autonomic Computing Enabled Cooperative Networked Design by Wódczak, Michal
Mining Text Data by
Future Wireless and Optical Networks: Networking Modes and Cross-Layer Design by Jiang, Shengming
Technological Innovation for Value Creation: Third Ifip Wg 5.5/Socolnet Doctoral Conference on Computing, Electrical and Industrial Systems, Doceis 20 by
Elasticsearch Server Second Edition by Rogozi Ski, Marek, Ku, Rafa
Logic and Algebra of Specification by
Advances in Real-Time Systems by
Collaboration with Cloud Computing: Security, Social Media, and Unified Communications by Messier, Ric
Learning Veeam(r) Backup and Replication for Vmware Vsphere by Mohn, Christian
Exchange Online Fast Start: A Quick Start Guide for Exchange Online, Office 365 and Windows Azure by Training Solutions, Smart Brain
Fundamentals of Multimedia by Li, Ze-Nian, Drew, Mark S., Liu, Jiangchuan
Fundamentals of Diffusion-Based Molecular Communication in Nanonetworks by Akyildiz, Ian F., Pierobon, Massimiliano
Using Security Patterns in Web -Application by Alam, Shahnawaz
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense by Watson, Gavin, Mason, Andrew, Ackroyd, Richard
Designing a Digital Future: Report to the President and Congress by Executive Office of the President
Evolutionary Algorithms for Mobile AD Hoc Networks by Danoy, Grégoire, Dorronsoro, Bernabé, Ruiz, Patricia
XML Fast Start: A Quick Start Guide for XML by Training Solutions, Smart Brain
Ethernet: The Definitive Guide: Designing and Managing Local Area Networks by Zimmerman, Joann, Spurgeon, Charles E.
Heroku Cloud Application Development by Hanjura, Anubhav
Advancing Embedded Systems and Real-Time Communications with Emerging Technologies by
Windows 7 Fast Start: A Quick Start Guide for Windows 7 by Training Solutions, Smart Brain
Body Sensor Networks by
Frontier and Innovation in Future Computing and Communications by
Distributed Context-Aware Systems by Ferreira, Paulo, Alves, Pedro
Ranking for Web Data Search Using On-The-Fly Data Integration by Herzig, Daniel Markus
Secure and Efficient IP Mobility Support for Aeronautical Communications by Bauer, Christian
Cloud Computing: 4th International Conference, Cloudcomp 2013, Wuhan, China, October 17-19, 2013, Revised Selected Papers by
Satellite Network Robust Qos-Aware Routing by Long, Fei
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach: Security in Cloud Computing by Dhivakar, Ashwin
Guia de Configuracao Para O Asterisk Pbx: Como Construir Um Pabx Com Software Livre by Goncalves, Flavio Eduardo
Cloud Computing Basics by Srinivasan, S.
Big Data: Related Technologies, Challenges and Future Prospects by Zhang, Yin, Chen, Min, Mao, Shiwen
Electrical Design of Through Silicon Via by
Cognitive Resource Management for Heterogeneous Cellular Networks by Liu, Yongkang, Shen
Querying Over Encrypted Data in Smart Grids by Liang, Xiaohui, Wen, Mi, Lu, Rongxing
Communication Technologies for Vehicles: 6th International Workshop, Nets4cars/Nets4trains/Nets4aircraft 2014, Offenburg, Germany, May 6-7, 2014, Proc by
Flexible Application-Layer Multicast in Heterogeneous Networks by Hübsch, Christian
Advanced Signaling Support for IP-based Networks by Röhricht, Martin
Software Defined Networks: A Comprehensive Approach by Goransson, Paul, Black, Chuck
Application and Theory of Petri Nets and Concurrency: 35th International Conference, Petri Nets 2014, Tunis, Tunisia, June 23-27, 2014, Proceedings by
Wireless Algorithms, Systems, and Applications: 9th International Conference, Wasa 2014, Harbin, China, June 23-25, 2014, Proceedings by
Ad-Hoc, Mobile, and Wireless Networks: 13th International Conference, Adhoc-Now 2014, Benidorm, Spain, June 22-27, 2014 Proceedings by
Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns by
Social Networking and Impression Management: Self-Presentation in the Digital Age by
Rapid Prototyping with JS: Agile JavaScript Development by Mardan, Azat
Game Theory Applications in Network Design by Kim, Sungwook
Network Topology in Command and Control: Organization, Operation, and Evolution by
Characterization, Avoidance and Repair of Packet Collisions in Inter-Vehicle Communication Networks by Mittag, Jens
Energy-Efficient Data Centers: Second International Workshop, E²dc 2013, Berkeley, Ca, Usa, May 21, 2013. Revised Selected Papers by
ICT Systems Security and Privacy Protection: 29th Ifip Tc 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings by
Information Security and Privacy Research: 27th Ifip Tc 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, by
Virtualization Techniques for Mobile Systems by Agarwal, Ankur, Furht, Borko, Jaramillo, David
System Center 2012 R2 Virtual Machine Manager Cookbook (Update) by Alessandro Cardoso, Edvaldo
Building Virtual Pentesting Labs for Advanced Penetration Testing by Cardwell, Kevin
Auction Design for the Wireless Spectrum Market by Feng, Xiaojun, Zhang, Qian, Lin, Peng
Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking by Townsend, Kevin, Cufí, Carles, Akiba
System Center 2012 R2 Configuration Manager: Mastering the Fundamentals by Agerlund, Kent
Impossibility Results for Distributed Computing by Ellen, Faith, Attiya, Hagit
Emerging Trends in Communication Networks by Hasan, Syed Faraz
Cloud Networking: Understanding Cloud-Based Data Center Networks by Lee, Gary
Automata, Languages, and Programming: 41st International Colloquium, Icalp 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part II by
Agent-Oriented Software Engineering: Reflections on Architectures, Methodologies, Languages, and Frameworks by
Automata, Languages, and Programming: 41st International Colloquium, Icalp 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I by
Potential for Data Loss from Security Protected Smartphones by Rajole, Vikas
Privacy Enhancing Technologies: 14th International Symposium, Pets 2014, Amsterdam, the Netherlands, July 16-18, 2014, Proceedings by
Cyberterrorism: Understanding, Assessment, and Response by
High-Performance Computational Solutions in Protein Bioinformatics by Mrozek, Dariusz
Resource Management in Mobile Computing Environments by
Maritime Wideband Communication Networks: Video Transmission Scheduling by Shen, Yang, Tingting
Universal Access in Human-Computer Interaction: Universal Access to Information and Knowledge: 8th International Conference, Uahci 2014, Held as Part by
Cloud Computing im Mittelstand. Vertrauensbasis und IT-Sicherheit als zentrale Erfolgsfaktoren by Harnau, Yvonne
Information Security Theory and Practice. Securing the Internet of Things: 8th Ifip Wg 11.2 International Workshop, Wistp 2014, Heraklion, Crete, Gree by
Monitoring and Securing Virtualized Networks and Services: 8th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and Secu by
Pervasive Wireless Environments: Detecting and Localizing User Spoofing by Chen, Yingying, Trappe, Wade, Yang, Jie
See More