• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2016

Deployment Fundamentals, Vol. 6: Deploying Windows 10 Using Microsoft Deployment Toolkit by Arwidmark, Johan, Nyström, Mikael
Bind DNS Administration Reference by
Cloud Computing and Services Sciences: International Conference in Cloud Computing and Services Sciences, Closer 2014 Barcelona Spain, April 3-5, 2014 by
Energy Informatics: 4th D-A-Ch Conference, Ei 2015, Karlsruhe, Germany, November 12-13, 2015, Proceedings by
Cloud Computing and Security: First International Conference, Icccs 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers by
Mobile Networks and Management: 7th International Conference, Monami 2015, Santander, Spain, September 16-18, 2015, Revised Selected Papers by
Efficient and Reliable Cloud Architecture for Big Data Handling by Tarannum Narzu, Ahmed Nova
Big Data Over Networks by
Network Security Attacks and Countermeasures by
Relational Methodologies and Epistemology in Economics and Management Sciences by Angelini, Pier Paolo, Basevi, Mario, Biggiero, Lucio
Cable and Wireless Networks: Theory and Practice by Da Silva, Mário Marques
Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications by
Principles of Digital Communication: A Top-Down Approach by Rimoldi, Bixio
Lightweight Cryptography for Security and Privacy: 4th International Workshop, Lightsec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected by
Advances in Parallel and Distributed Computing and Ubiquitous Services: Ucawsn & Pdcat 2015 by
Boost.Asio C++ Network Programming Cookbook: Over 25 hands-on recipes to create robust and highly-efficient cross-platform distributed applications wi by Radchuk, Dmytro
Energy Efficiency in Data Centers and Clouds: Volume 100 by
Mobile Computing, Applications, and Services: 7th International Conference, Mobicase 2015, Berlin, Germany, November 12-13, 2015, Revised Selected Pap by
A Polynomial Translation of Mobile Ambients Into Safe Petri Nets: Understanding a Calculus of Hierarchical Protection Domains by Göbel, Susanne
Building Telephony Systems with OpenSIPS - Second Edition by E. Goncalves, Flavio, Iancu, Bogdan-Andrei
CentOS High Performance by A. Canepa, Gabriel
Mastering CentOS 7 Linux Server: Get to grips with configuring, managing, and securing the latest CentOS Linux server by Alibi, Mohamed, Roy, Bhaskarjyoti
Link Prediction in Social Networks: Role of Power Law Distribution by Virinchi, Srinivas, Mitra, Pabitra
The Accidental Sysadmin Handbook: A Primer for Early Level It Professionals by Kralicek, Eric
Microsoft Team Foundation Server 2015 Cookbook: Over 80 DevOps and ALM-focused recipes to enable continuous delivery of high-quality software by Arora, Tarun
Security and Privacy in Communication Networks: 11th International Conference, Securecomm 2015, Dallas, Tx, Usa, October 26-29, 2015, Revised Selected by
Trusted Systems: 6th International Conference, Intrust 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers by
Collaborative Computing: Networking, Applications, and Worksharing: 11th International Conference, Collaboratecom 2015, Wuhan, November 10-11, 2015, C by
Malware Diffusion Models for Modern Complex Networks: Theory and Applications by Karyotis, Vasileios, Khouzani, M. H. R.
Comptia A+: All-In-One Certification Exam Guide for Beginners! by Tech, Solis
Mobile Payment - Bezahlen 4.0 by Mosig, Stefan, Hierl, Ludwig
Advances in Network Science: 12th International Conference and School, Netsci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedings by
Cloud Computing and Big Data: Second International Conference, Cloudcom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers by
Algorithms for Sensor Systems: 11th International Symposium on Algorithms and Experiments for Wireless Sensor Networks, Algosensors 2015, Patras, Gre by
Topics in Cryptology - Ct-Rsa 2016: The Cryptographers' Track at the Rsa Conference 2016, San Francisco, Ca, Usa, February 29 - March 4, 2016, Proceed by
Applied Cryptography and Network Security: 13th International Conference, Acns 2015, New York, Ny, Usa, June 2-5, 2015, Revised Selected Papers by
Advances in Ubiquitous Networking: Proceedings of the Unet'15 by
Mathematical and Engineering Methods in Computer Science: 10th International Doctoral Workshop, Memics 2015, Telč, Czech Republic, October 23-25, by
Scholarly Collaboration on the Academic Social Web by He, Daqing, Jeng, Wei
Cloud Computing and Services Science: 5th International Conference, Closer 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers by
Qos-Enabled Networks: Tools and Foundations by Barreiros, Miguel, Lundqvist, Peter
Management of Cyber Physical Objects in the Future Internet of Things: Methods, Architectures and Applications by
Wireless Sensor Networks for Structural Health Monitoring by Cao, Jiannong, Liu, Xuefeng
Mobile Payment - Bezahlen 4.0 by Hierl, Ludwig, Mosig, Stefan
MPLS in the Sdn Era: Interoperable Scenarios to Make Networks Scale to New Services by Szarkowicz, Krzysztof Grzegorz, Monge, Antonio Sanchez
Opportunistic Mobile Networks: Advances and Applications by Misra, Sudip, Saha, Barun Kumar, Pal, Sujata
Algorithms and Discrete Applied Mathematics: Second International Conference, Caldam 2016, Thiruvananthapuram, India, February 18-20, 2016, Proceeding by
Optimierung Von Nested Queries Unter Verwendung Der Nf2-Algebra by Hölsch, Jürgen
Practical DevOps by Verona, Joakim
Graphical Models for Security: Second International Workshop, Gramsec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers by
Wearable Computing. Datenschutz und Datensicherheit by Möller, Mario
Cryptography and Network Security: Principles and Practice by Stallings, William
Microsoft Exchange Server PowerShell Essentials by Banerjee, Biswanath
Mastering Puppet - Second Edition by Narrabilis, Thomas
Radio Frequency Channel Coding Made Easy by Faruque, Saleh
Management von Passwörtern. Tools und Heuristiken by Steinicke, Tobias
Distributed Computer and Communication Networks: 18th International Conference, Dccn 2015, Moscow, Russia, October 19-22, 2015, Revised Selected Paper by
Technology and Practice of Passwords: 9th International Conference, Passwords 2015, Cambridge, Uk, December 7-9, 2015, Proceedings by
Mobility Modeling for Vehicular Communication Networks by Zhuang, Weihua, Abboud, Khadige
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools by Chapman, Chris
Networks of Dissipative Systems: Compositional Certification of Stability, Performance, and Safety by Arcak, Murat, Meissen, Chris, Packard, Andrew
Content-Centric Networks: An Overview, Applications and Research Challenges by Bouk, Safdar Hussain, Kim, Dongkyun, Ahmed, Syed Hassan
Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis by Fahmy, Hossam Mahmoud Ahmad
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis by Shavers, Brett, Bair, John
Big Data Concepts, Theories, and Applications by
Generating Plans from Proofs by Benedikt, Michael, Leblay, Julien, Cate, Balder Ten
Guide to Security Assurance for Cloud Computing by
Market-Driven Spectrum Sharing in Cognitive Radio by Yi, Changyan, Cai, Jun
Modeling and Optimization of Cloud-Ready and Content-Oriented Networks by Walkowiak, Krzysztof
Multimedia Networks: Protocols, Design and Applications by Barz, Hans W., Bassett, Gregory A.
Cisco UCS Cookbook by Wu, Victor
Technological Innovation for Cyber-Physical Systems: 7th Ifip Wg 5.5/Socolnet Advanced Doctoral Conference on Computing, Electrical and Industrial Sys by
Principles of Security and Trust: 5th International Conference, Post 2016, Held as Part of the European Joint Conferences on Theory and Practice of So by
Trusted Systems: 7th International Conference, Intrust 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers by
Building a Pentesting Lab for Wireless Networks by Fadyushin, Vyacheslav, Popov, Andrey
Information Security Applications: 16th International Workshop, Wisa 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers by
Networked Systems: Third International Conference, Netys 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers by
Passive and Active Measurement: 17th International Conference, Pam 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings by
Critical Information Infrastructures Security: 9th International Conference, Critis 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Pape by
Architecture of Computing Systems -- Arcs 2016: 29th International Conference, Nuremberg, Germany, April 4-7, 2016, Proceedings by
Mastering Wireshark by Mishra, Charit
Learning IBM Watson Analytics: Make the most advanced predictive analytical processes easy using Watson Analytics with this easy-to-follow practical by Miller, James
Learning ArcGIS for Desktop by Cristiana Docan, Daniela
Learning VMware App Volumes by Oven, Peter Von
Contemporary Consumer Health Informatics by
Engineering Secure Software and Systems: 8th International Symposium, Essos 2016, London, Uk, April 6-8, 2016. Proceedings by
Digital Signage: Software, Networks, Advertising, and Displays: A Primer for Understanding the Business by Schaeffler, Jimmy
VMware Performance and Capacity Management, Second Edition by Rahabok, Iwan 'E1'
Dynamic Networks and Cyber-Security by
Heterogeneous Vehicular Networks by Zhang, Lin, Xiang, Wei, Zheng, Kan
Parallel Processing and Applied Mathematics: 11th International Conference, Ppam 2015, Krakow, Poland, September 6-9, 2015. Revised Selected Papers, P by
Parallel Processing and Applied Mathematics: 11th International Conference, Ppam 2015, Krakow, Poland, September 6-9, 2015. Revised Selected Papers, P by
Risks and Security of Internet and Systems: 10th International Conference, Crisis 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Sel by
Signal Integrity: Applied Electromagnetics and Professional Practice by Russ, Samuel H.
Sustainable Wireless Network-On-Chip Architectures by Murray, Jacob, Wettin, Paul, Pande, Partha Pratim
Cyber-Physical System Design with Sensor Networking Technologies by
Advanced Methods for Complex Network Analysis by
High Performance Computer Applications: 6th International Conference, Isum 2015, Mexico City, Mexico, March 9-13, 2015, Revised Selected Papers by
Lean Computing for the Cloud by Bauer, Eric
Beginner's Guide to SAP Security and Authorizations by Juran, Tracy
Developing Interoperable and Federated Cloud Architecture by
OpenStack Networking Essentials by Denton, James
Nginx Troubleshooting by Kapranoff, Alex
Guide to Computing Fundamentals in Cyber-Physical Systems: Concepts, Design Methods, and Applications by Möller, Dietmar P. F.
CCNA and Beyond by Fordham, Stuart D.
Advances in Service-Oriented and Cloud Computing: Workshops of Esocc 2015, Taormina, Italy, September 15-17, 2015, Revised Selected Papers by
Wired/Wireless Internet Communications: 14th Ifip Wg 6.2 International Conference, Wwic 2016, Thessaloniki, Greece, May 25-27, 2016, Proceedings by
Frontier Computing: Theory, Technologies and Applications by
Troubleshooting NetScaler by Tirumalaraju, Raghu Varma
Instant Recovery with Write-Ahead Logging by Graefe, Goetz, Guy, Wey, Sauer, Caetano
Moving Target Defense for Distributed Systems by Shetty, Sachin, Song, Min, Yuchi, Xuebiao
Master Excel: Primary Interactions with the Excel by Clayton, Thomas
Master Excel: All About Formulas and Functions by Clayton, Thomas
An Architecture for Fast and General Data Processing on Large Clusters by Zaharia, Matei
An Architecture for Fast and General Data Processing on Large Clusters by Zaharia, Matei
Open Problems in Network Security: Ifip Wg 11.4 International Workshop, Inetsec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers by
Physical-Layer Security for Cooperative Relay Networks by Zou, Yulong, Zhu, Jia
Optimization of Computer Networks by Pavón Mariño, Pablo
DHCPv6-Präfix-Delegation by Al Bakri, Bilal
Virtualized Cloud Data Center Networks: Issues in Resource Management. by Liao, Wanjiun, Tsai, Linjiun
Cloud Computing: 6th International Conference, Cloudcomp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected Papers by
Microsoft Enterprise Mobility Suite: Planning and Implementation by Daalmans, Peter, Agerlund, Kent
Unsupervised Learning Algorithms by
Device-To-Device Communications in Cellular Networks by Tang, Huan, Wang, Li
Home Server Components - A Quick Overview by Hanley, Ronn
Internet of Things: Principles and Paradigms by
ICT Systems Security and Privacy Protection: 31st Ifip Tc 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings by
Smart Cities and Homes: Key Enabling Technologies by Nicopolitidis, Petros
Competition, Regulation, and Convergence: Current Trends in Telecommunications Policy Research by
Linux Server Security: Hack and Defend by Binnie, Chris
Broadband Telecommunications Technologies and Management by Esmailzadeh, Riaz
Communication Technologies for Vehicles: 10th International Workshop, Nets4cars/Nets4trains/Nets4aircraft 2016, San Sebastián, Spain, June 6-7, 2016, by
Practical Mobile Forensics - Second Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms by Bommisetty, Satish, Mahalik, Heather, Tamma, Rohit
Pervasive Social Computing: Socially-Aware Pervasive Systems and Mobile Applications by Han, Jun, Colman, Alan, Kabir, Muhammad Ashad
Distributed Applications and Interoperable Systems: 16th Ifip Wg 6.1 International Conference, Dais 2016, Held as Part of the 11th International Feder by
Buchreihe: Produktivitätssteigerung in der Softwareentwicklung, Teil 1: Produktivitäts- und Leistungsmessung - Messbarkeit und Me by Luckhaus, Stefan
Buchreihe: Produktivitätssteigerung in der Softwareentwicklung, Teil 2: Managementmodell, Aufwandsermittlung und KPI-basierte Ver by Luckhaus, Stefan
Buchreihe: Produktivitätssteigerung in der Softwareentwicklung, Teil 2: Managementmodell, Aufwandsermittlung und KPI-basierte Ver by Luckhaus, Stefan
Buchreihe: Produktivitätssteigerung in der Softwareentwicklung, Teil 1: Produktivitäts- und Leistungsmessung - Messbarkeit und Me by Luckhaus, Stefan
Integer Programming and Combinatorial Optimization: 18th International Conference, Ipco 2016, Liège, Belgium, June 1-3, 2016, Proceedings by
Cooperative Cognitive Radio Networking: System Model, Enabling Techniques, and Performance by Zhang, Qinyu, Mark, Jon W., Cao, Bin
Complex Systems: Relationships Between Control, Communications and Computing by
Cognitive Radio Oriented Wireless Networks: 11th International Conference, Crowncom 2016, Grenoble, France, May 30 - June 1, 2016, Proceedings by
Network Coding at Different Layers in Wireless Networks by
Automating Junos Administration: Doing More with Less by Smith, Stacy, Looney, Jonathan
Computer Networks: 23rd International Conference, Cn 2016, Brunów, Poland, June 14-17, 2016, Proceedings by
Industrielle Dienstleistungen 4.0: Hmd Best Paper Award 2015 by Herterich, Matthias M., Uebernickel, Falk, Brenner, Walter
Management and Security in the Age of Hyperconnectivity: 10th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and Secur by
Contributions to Networked and Event-Triggered Control of Linear Systems by Guinaldo Losada, María
Potential Game Theory: Applications in Radio Resource Allocation by Chew, Yong Huat, Soong, Boon-Hee, Lã, Quang Duy
Security in Network Coding by Lin, Chuang, Zhang, Peng
Privacy-Enhancing Aggregation Techniques for Smart Grid Communications by Lu, Rongxing
Wireless Public Safety Networks 2: A Systematic Approach by
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation and Response Guide by Ayala, Luis
Software Defined Networking Applications in Distributed Datacenters by Li, Keqiu, Qi, Heng
Applied Cryptography and Network Security: 14th International Conference, Acns 2016, Guildford, Uk, June 19-22, 2016. Proceedings by
Wireless Traffic Steering for Green Cellular Networks by Zhang, Ning, Zhang, Shan, Zhou, Sheng
Social Video Content Delivery by Liu, Jiangchuan, Zhu, Wenwu, Wang, Zhi
DNS Security: Defending the Domain Name System by Stowe, Geoffrey, Liska, Allan
5g Heterogeneous Networks: Self-Organizing and Optimization by Kadoch, Michel, Rong, Bo, Qiu, Xuesong
Communications for Control in Cyber Physical Systems: Theory, Design and Applications in Smart Grids by Li, Husheng
Cooperative Ofdm Underwater Acoustic Communications by Cheng, Xiang, Cheng, Xilin, Yang, Liuqing
Guide to TCP/IP: Ipv6 and Ipv4 by Tittel, Ed, Carrell, Jeffrey, Pyles, James
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification: First International Conference, Rssrail 20 by
High Performance Computing: 31st International Conference, Isc High Performance 2016, Frankfurt, Germany, June 19-23, 2016, Proceedings by
Red Hat Enterprise Linux (RHEL) 7 Server Installation and Administration: Training Manual: Covering CentOS-7 Server, Cloud computing, Bind9 DNS Server by Rabah, Kefa
Dynamic Information Retrieval Modeling by Yang, Grace Hui, Sloan, Marc, Wang, Jun
Security-Aware Device-To-Device Communications Underlaying Cellular Networks by Zhang, Aiqing, Zhou, Liang, Wang, Lei
Ad-Hoc, Mobile, and Wireless Networks: 15th International Conference, Adhoc-Now 2016, Lille, France, July 4-6, 2016, Proceedings by
Comptia Server+ Study Guide: Exam Sk0-004 by McMillan, Troy
Elastic Optical Networks: Architectures, Technologies, and Control by
Integration of Renewable Generation and Elastic Loads Into Distribution Grids by Keshav, S., Rosenberg, Catherine, Ardakanian, Omid
Security and Resiliency Analytics for Smart Grids: Static and Dynamic Approaches by Rahman, Mohammad Ashiqur, Al-Shaer, Ehab
Millimeter Wave Vehicular Communications: A Survey by Shimizu, Takayuki, Bansal, Gaurav, Va, Vutha
Modeling and Optimization of the Smart Grid Ecosystem by Papaioannou, Thanasis G., Hatzi, Vasiliki, Koutsopoulos, Iordanis
Listen and Talk: Full-Duplex Cognitive Radio Networks by Han, Zhu, Song, Lingyang, Liao, Yun
Digital Human Modeling: Applications in Health, Safety, Ergonomics and Risk Management: 7th International Conference, Dhm 2016, Held as Part of Hci In by
Effective Python Penetration Testing by Rehim, Rejah
A Novel Ontology and Machine Learning Driven Hybrid Clinical Decision Support Framework for Cardiovascular Preventative Care by Farooq, Kamran
Spatial Network Data: Concepts and Techniques for Summarization by Oliver, Dev
Innovative Web Applications for Analyzing Traffic Operations by Stevanovic, Aleksandar, Furht, Borko, Petrovska, Natasha
Mastering Chef Provisioning by Waud, Earl
Linux Networking Cookbook by Boyce, Gregory
Electronics, Communications and Networks V: Proceedings of the 5th International Conference on Electronics, Communications and Networks (Cecnet 2015) by
Smart City 360°: First Eai International Summit, Smart City 360°, Bratislava, Slovakia and Toronto, Canada, October 13-16, 2015. Revise by
Human Centered Computing: Second International Conference, Hcc 2016, Colombo, Sri Lanka, January 7-9, 2016, Revised Selected Papers by
Getting Started with Microsoft System Center Operations Manager: Using SCOM 2016 TP 5 by Greene, Kevin
Learning SaltStack - Second Edition: Build, manage, and secure your infrastructure with the power of SaltStack by Myers, Colton
Mobility Management: Principle, Technology and Applications by Hu, Bo, Chen, Shanzhi, Shi, Yan
Computational Science and Its Applications - Iccsa 2016: 16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part IV by
Solving Large Scale Learning Tasks. Challenges and Algorithms: Essays Dedicated to Katharina Morik on the Occasion of Her 60th Birthday by
Network Function Virtualization by Gray, Ken, Nadeau, Thomas D.
Theory and Applications of Applied Electromagnetics: Appeic 2015 by
Algorithms and Models for Network Data and Link Analysis by Saerens, Marco, Shimbo, Masashi, Fouss, François
Computational Science and Its Applications - Iccsa 2016: 16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part II by
Hcna Networking Study Guide by
Data Science and Big Data Computing: Frameworks and Methodologies by
Internationaler IT-Sicherheitsmarkt. Zahlen, Fakten, Trends by Steinicke, Tobias
Computational Science and Its Applications - Iccsa 2016: 16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part V by
Coordination, Organizations, Institutions, and Norms in Agent Systems XI: Coin 2015 International Workshops, Coin@aamas, Istanbul, Turkey, May 4, 2015 by
See More