• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2023

Internet of Things: 5th the Global Iot Summit, Giots 2022, Dublin, Ireland, June 20-23, 2022, Revised Selected Papers by
Cloud Computing and Services Science: 11th International Conference, Closer 2021, Virtual Event, April 28-30, 2021, Revised Selected Papers by
Computing, Communication and Learning: First International Conference, Cocole 2022, Warangal, India, October 27-29, 2022, Proceedings by
The Evolution of Pervasive Information Systems by
Secure It Systems: 27th Nordic Conference, Nordsec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings by
ICT Innovations 2022. Reshaping the Future Towards a New Normal: 14th International Conference, ICT Innovations 2022, Skopje, Macedonia, September 29 by
Cryptography, Codes and Cyber Security: First International Conference, I4cs 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings by
Distributed Computer and Communication Networks: Control, Computation, Communications: 25th International Conference, Dccn 2022, Moscow, Russia, Septe by
Optimization, Learning Algorithms and Applications: Second International Conference, Ol2a 2022, Póvoa de Varzim, Portugal, October 24-25, 2022, Procee by
Advances in Service-Oriented and Cloud Computing: International Workshops of Esocc 2022, Wittenberg, Germany, March 22-24, 2022, Revised Selected Pape by
Smart Applications and Data Analysis: 4th International Conference, Sadasc 2022, Marrakesh, Morocco, September 22-24, 2022, Proceedings by
Internet of Things - Iciot 2022: 7th International Conference, Held as Part of the Services Conference Federation, Scf 2022, Honolulu, Hi, Usa, Decemb by
Cognitive Computing - ICCC 2022: 6th International Conference, Held as Part of the Services Conference Federation, Scf 2022, Honolulu, Hi, Usa, Decemb by
Human Centered Computing: 7th International Conference, Hcc 2021, Virtual Event, December 9-11, 2021, Revised Selected Papers by
Cellular Vehicle-To-Everything (C-V2x) by Chen, Shanzhi, Hu, Jinling, Zhao, Li
Science of Cyber Security - Scisec 2022 Workshops: Ai-Cryptosec, Ta-Bc-Nft, and Mathsci-Qsafe 2022, Matsue, Japan, August 10-12, 2022, Revised Selecte by
Computer Vision and Machine Intelligence Paradigms for Sdgs: Select Proceedings of Icrtac-Cvmip 2021 by
Early Soft Error Reliability Assessment of Convolutional Neural Networks Executing on Resource-Constrained Iot Edge Devices by Reis, Ricardo, Abich, Geancarlo, Ost, Luciano
Machine Learning, Image Processing, Network Security and Data Sciences: Select Proceedings of 3rd International Conference on Mind 2021 by
Bioinformatics Research and Applications: 18th International Symposium, Isbra 2022, Haifa, Israel, November 14-17, 2022, Proceedings by
Emerging Information Security and Applications: Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings by
High Performance Computing. Isc High Performance 2022 International Workshops: Hamburg, Germany, May 29 - June 2, 2022, Revised Selected Papers by
Advances in Artificial Intelligence - Iberamia 2022: 17th Ibero-American Conference on Ai, Cartagena de Indias, Colombia, November 23-25, 2022, Procee by
Visual Data Insights Using SAS Ods Graphics: A Guide to Communication-Effective Data Visualization by Bessler, Leroy
Network Automation with Go: Learn how to automate network operations and build applications using the Go programming language by Leiva, Nicolas, Kashin, Michael
Signal Integrity: Applied Electromagnetics and Professional Practice by Russ, Samuel H.
Critical Infrastructure Protection XV: 15th Ifip Wg 11.10 International Conference, Iccip 2021, Virtual Event, March 15-16, 2021, Revised Selected Pap by
Intelligent Computing and Communication for the Internet of Vehicles by Gao, Jie, Shen, Li, Mushu
Proceedings of Data Analytics and Management: Icdam 2021, Volume 1 by
Electronic Participation: 14th Ifip Wg 8.5 International Conference, Epart 2022, Linköping, Sweden, September 6-8, 2022, Proceedings by
Game Theory for Networks: 11th International Eai Conference, Gamenets 2022, Virtual Event, July 7-8, 2022, Proceedings by
Connecting the Internet of Things: Iot Connectivity Standards and Solutions by Chun, Anthony, Kumar, Anil, Hussain, Jafer
Cloud VR: Technology and Application by Huang, Kun, Xiong, Huaping, Li, Dawei
Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control by
The Internet of Materials by
Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence Using Sip: Scalable Distributed Applications and Media by Ranjan Roy, Radhika
Smart Grid in Iot-Enabled Spaces: The Road to Intelligence in Power by Al-Turjman, Fadi
Innovative Smart Healthcare and Bio-Medical Systems: Ai, Intelligent Computing and Connected Technologies by
Blockchain Technology Solutions for the Security of Iot-Based Healthcare Systems by
Arithmetic of Finite Fields: 9th International Workshop, Waifi 2022, Chengdu, China, August 29 - September 2, 2022, Revised Selected Papers by
Advancements in Smart Computing and Information Security: First International Conference, Ascis 2022, Rajkot, India, November 24-26, 2022, Revised Sel by
Wireless Localization Techniques by Wang, Xinbing, Tong, Xinyu, Tian, Xiaohua
Recent Trends in Image Processing and Pattern Recognition: 5th International Conference, Rtip2r 2022, Kingsville, Tx, Usa, December 1-2, 2022, Revised by
Application of Big Data, Blockchain, and Internet of Things for Education Informatization: Second Eai International Conference, Bigiot-Edu 2022, Virtu by
Microsoft Azure for Dummies by Hyman, Jack A.
Application of Big Data, Blockchain, and Internet of Things for Education Informatization: Second Eai International Conference, Bigiot-Edu 2022, Virtu by
Application of Big Data, Blockchain, and Internet of Things for Education Informatization: Second Eai International Conference, Bigiot-Edu 2022, Virtu by
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Ratemo, Michael, Cambric, Shinesa
Machine Learning for Cyber Security: 4th International Conference, Ml4cs 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I by
Machine Learning for Cyber Security: 4th International Conference, Ml4cs 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part III by
Implementing and Leveraging Blockchain Programming by
Analyzing Digital Discourses: Between Convergence and Controversy by
Artificial General Intelligence: 15th International Conference, Agi 2022, Seattle, Wa, Usa, August 19-22, 2022, Proceedings by
Frontiers of Data and Knowledge Management for Convergence of Ict, Healthcare, and Telecommunication Services by
Wie kommt Ethik in die künstliche Intelligenz? Prinzipien, Merkmale und Leitlinien einer ethischen KI by Anonymous
Image Processing and Intelligent Computing Systems by
Optisystem Program for Various Fiber Optic Modeling by Kurnaz, Sefer, Abdu Ibrahim, Abdullahi, Muataz Abdulwahid, Maan
Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, Mind 2022, Virtual Event, January 19-20, 2023, P by
Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, Mind 2022, Virtual Event, January 19-20, 2023, P by
Security in Smart Home Networks by Zhu, Haojin, Shen, Meng, Yan
Algorithms for Big Data: Dfg Priority Program 1736 by
Silicon Valley Cybersecurity Conference: Third Conference, Svcc 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers by
Transactions on Computational Collective Intelligence XXXVII by
Data Mining and Big Data: 7th International Conference, Dmbd 2022, Beijing, China, November 21-24, 2022, Proceedings, Part I by
Industrial IoT for Architects and Engineers: Architecting secure, robust, and scalable industrial IoT solutions with AWS by Sridhar, Bharath, Bernal, Joey
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio by Hardt, Robert, Pandit, Parth
Community Engagement in the Online Space by
Community Engagement in the Online Space by
Mastering Python Networking - Fourth Edition: Utilize Python packages and frameworks for network automation, monitoring, cloud, and management by Chou, Eric
The Internet of Things and Big Data Analytics: Integrated Platforms and Industry Use Cases by
High-Performance It Services by Critchley, Terry
Advancements in Interdisciplinary Research: First International Conference, Air 2022, Prayagraj, India, May 6-7, 2022, Revised Selected Papers by
Fast and Low-Resource Semi-Supervised Abdominal Organ Segmentation: Miccai 2022 Challenge, Flare 2022, Held in Conjunction with Miccai 2022, Singapore by
Human-Computer Interaction: 8th Iberoamerican Workshop, Hci-Collab 2022, Havana, Cuba, October 13-15, 2022, Revised Selected Papers by
Artificial Life and Evolutionary Computation: 15th Italian Workshop, Wivace 2021, Winterthur, Switzerland, September 15-17, 2021, Revised Selected Pap by
Analyse de données scientifiques à l'aide de NEO4J by Chang, Victor, Songala, Yeshwanth Kumar, Xu, Qianwen Ariel
Compliance Made Easy by Cybersecurity Experts, Leading
Artificial Intelligence and Soft Computing: 21st International Conference, Icaisc 2022, Zakopane, Poland, June 19-23, 2022, Proceedings, Part I by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Collaborative Computing: Networking, Applications and Worksharing: 18th Eai International Conference, Collaboratecom 2022, Hangzhou, China, October 15 by
Computer Performance Engineering: 18th European Workshop, Epew 2022, Santa Pola, Spain, September 21-23, 2022, Proceedings by
JN0-104 Junos, Associate (JNCIA-Junos): Best Practice Exams by Ya, Son
Emerging Technologies in Computing: 5th Eai International Conference, Icetic 2022, Chester, Uk, August 15-16, 2022, Proceedings by
High-Performance Computing Systems and Technologies in Scientific Research, Automation of Control and Production: 12th International Conference, Hpcst by
Pattern Recognition Applications and Methods: 10th International Conference, Icpram 2021, and 11th International Conference, Icpram 2022, Virtual Even by
Applied Technologies: 4th International Conference, iCat 2022, Quito, Ecuador, November 23-25, 2022, Revised Selected Papers, Part III by
Microsoft 365 Administration Inside Out by Guilmette, Aaron, Kegg, Darryl, Fisher, Ed
Intelligent Networked Things: 5th China Conference, Cint 2022, Urumqi, China, August 7-8, 2022, Revised Selected Papers by
Applied Technologies: 4th International Conference, iCat 2022, Quito, Ecuador, November 23-25, 2022, Revised Selected Papers, Part I by
Statistical Atlases and Computational Models of the Heart. Regular and Cmrxmotion Challenge Papers: 13th International Workshop, Stacom 2022, Held in by
The Recent Advances in Transdisciplinary Data Science: First Southwest Data Science Conference, Sdsc 2022, Waco, Tx, Usa, March 25-26, 2022, Revised S by
Smart Card Research and Advanced Applications: 21st International Conference, Cardis 2022, Birmingham, Uk, November 7-9, 2022, Revised Selected Papers by
Applied Technologies: 4th International Conference, iCat 2022, Quito, Ecuador, November 23-25, 2022, Revised Selected Papers, Part II by
Social Networking Sites, Body Image and Wellbeing: The Roles of Social by Walker, Mary
Trustworthy Autonomic Computing by Eze, Thaddeus
The Spatial Grasp Model: Applications and Investigations of Distributed Dynamic Worlds by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Visual Inference for Iot Systems: A Practical Approach by Rodríguez-Vázquez, Angel, Velasco-Montero, Delia, Fernández-Berni, Jorge
6G Enabling Technologies: New Dimensions to Wireless Communication by
Machine Learning and Principles and Practice of Knowledge Discovery in Databases: International Workshops of Ecml Pkdd 2022, Grenoble, France, Septemb by
Machine Learning and Principles and Practice of Knowledge Discovery in Databases: International Workshops of Ecml Pkdd 2022, Grenoble, France, Septemb by
Emerging Technologies for Authorization and Authentication: 5th International Workshop, Etaa 2022, Copenhagen, Denmark, September 30, 2022, Revised Se by
Innovations and Interdisciplinary Solutions for Underserved Areas: 5th Eai International Conference, Intersol 2022, Abuja, Nigeria, March 23-24, 2022, by
Green, Pervasive, and Cloud Computing: 17th International Conference, Gpc 2022, Chengdu, China, December 2-4, 2022, Proceedings by
Emerging Networking Architecture and Technologies: First International Conference, Icenat 2022, Shenzhen, China, November 15-17, 2022, Proceedings by
Mobile Multimedia Communications: 15th Eai International Conference, Mobimedia 2022, Virtual Event, July 22-24, 2022, Proceedings by
Product Lifecycle Management. Plm in Transition Times: The Place of Humans and Transformative Technologies: 19th Ifip Wg 5.1 International Conference, by
Medical Applications with Disentanglements: First Miccai Workshop, Mad 2022, Held in Conjunction with Miccai 2022, Singapore, September 22, 2022, Proc by
Agile Methods: 11th Brazilian Workshop, Wbma 2021, Virtual Event, October 8-10, 2021, Revised Selected Papers by
Social Robotics: 14th International Conference, Icsr 2022, Florence, Italy, December 13-16, 2022, Proceedings, Part II by
Applied Intelligence and Informatics: Second International Conference, Aii 2022, Reggio Calabria, Italy, September 1-3, 2022, Proceedings by
Current Trends in Web Engineering: Icwe 2022 International Workshops, Becs, Sweet and Wals, Bari, Italy, July 5-8, 2022, Revised Selected Papers by
Nordic Artificial Intelligence Research and Development: 4th Symposium of the Norwegian AI Society, Nais 2022, Oslo, Norway, May 31 - June 1, 2022, Re by
Biomedical and Computational Biology: Second International Symposium, Becb 2022, Virtual Event, August 13-15, 2022, Revised Selected Papers by
Computer Vision, Imaging and Computer Graphics Theory and Applications: 16th International Joint Conference, Visigrapp 2021, Virtual Event, February 8 by
Information Security Applications: 23rd International Conference, Wisa 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers by
Image and Vision Computing: 37th International Conference, Ivcnz 2022, Auckland, New Zealand, November 24-25, 2022, Revised Selected Papers by
4th International Conference on Wireless, Intelligent and Distributed Environment for Communication: Widecom 2021 by
Learning and Intelligent Optimization: 16th International Conference, Lion 16, Milos Island, Greece, June 5-10, 2022, Revised Selected Papers by
Access Control Models and Architectures for Iot and Cyber Physical Systems by Bhatt, Smriti, Alshehri, Asma Hassan, Gupta, Maanak
Decision and Game Theory for Security: 13th International Conference, Gamesec 2022, Pittsburgh, Pa, Usa, October 26-28, 2022, Proceedings by
Cloud-Computing by Upadhyay, Anurag, Kumar, Anshul
Cloud Computing by Upadhyay, Anurag, Kumar, Anshul
Implementing Cellular IoT Solutions for Digital Transformation: Successfully develop, deploy, and maintain LTE and 5G enterprise IoT systems by McCain, Dennis
Software Defined Networking for AD Hoc Networks by
New Trends in Computer Technologies and Applications: 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedi by
Practical Rust 1.x Cookbook: 100+ Solutions across Command Line, CI/CD, Kubernetes, Networking, Code Performance and Microservices by Team, Rustacean
Computational Data and Social Networks: 11th International Conference, Csonet 2022, Virtual Event, December 5-7, 2022, Proceedings by
Cloud Computing Playbook: 10 In 1 Practical Cloud Design With Azure, Aws And Terraform by Miller, Richie
Entwicklung eines neuartigen Modells für die Empfehlung vertrauenswürdiger Nutzer in OSN by Issac, Franklin, Ishwariya, M.
Client Logbook: A client log book is a written record of a client's interactions with a particular service or organization. by Publishing, Myjwc
Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks by Fahmy, Hossam Mahmoud Ahmad
Content Distribution for Mobile Internet: A Cloud-Based Approach by Li, Zhenhua, Dai, Yafei, Chen, Guihai
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part I by
Advanced Communication and Intelligent Systems: First International Conference, Icacis 2022, Virtual Event, October 20-21, 2022, Revised Selected Pape by
Matrix and Analytical Methods for Performance Analysis of Telecommunication Systems by Naumov, Valeriy, Gaidamaka, Yuliya, Yarkina, Natalia
Computer Security. Esorics 2022 International Workshops: Cybericps 2022, Secpre 2022, Spose 2022, Cps4cip 2022, Cdt&secomane 2022, Eis 2022, and Secas by
Intelligent Robotics: Third China Annual Conference, Ccf Cirac 2022, Xi'an, China, December 16-18, 2022, Proceedings by
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part V by
Wireless Internet: 15th Eai International Conference, Wicon 2022, Virtual Event, November 2022, Proceedings by
Eine Technik zur Standardisierung von Big Data für Datenmanagement-Anwendungen by Issac, R. Franklin, Ishwariya, M.
Cisco Cloud Infrastructure by Patel, Jalpa, Panzade, Komal, Shukla, Avinash
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part VI by
Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers by
Künstliche Intelligenz: Das Wichtigste, was Du wissen musst by Simon, Walter
Interazione basata su raccomandazioni by Nandihal, Priya, G. K., Suhas, Kumar Pareek, Piyush
Interação Baseada em Recomendação by Kumar Pareek, Piyush, Nandihal, Priya, G. K., Suhas
A Proactive Network Surveillance Framework by Singh, Maninder
Managing the Buffer Overflow Attack in Network and Operating System Detecting and Preventing Techniques by Vadivelmurugan, P.
Certified Information Security Manager Cism Study Guide by Cism
Certified Information Security Manager Cism Study Guide by Cism
Pan-African Artificial Intelligence and Smart Systems: Second Eai International Conference, Paaiss 2022, Dakar, Senegal, November 2-4, 2022, Proceedin by
Closing the Loop: Systems Thinking for Designers by Cababa, Sheryl
Systems Engineering Neural Networks by Migliaccio, Alessandro, Iannone, Giovanni
Machine Learning Empowered Intelligent Data Center Networking: Evolution, Challenges and Opportunities by Wang, Ting, Li, Bo, Chen, Mingsong
Artificial Intelligence and Cognitive Science: 30th Irish Conference, Aics 2022, Munster, Ireland, December 8-9, 2022, Revised Selected Papers by
Rust for Network Programming and Automation: Learn to Design and Automate Networks, Performance Optimization, and Packet Analysis with low-level Rust by Anderson, Brian
Cognitive Systems and Information Processing: 7th International Conference, Iccsip 2022, Fuzhou, China, December 17-18, 2022, Revised Selected Papers by
Data Privacy Management, Cryptocurrencies and Blockchain Technology: Esorics 2022 International Workshops, Dpm 2022 and CBT 2022, Copenhagen, Denmark, by
Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program by Brown, Jason
L'intelligenza artificiale nelle tecniche di data mining by Yovan Felix, A., Refonaa, J., Dhamodaran, S.
Machine Learning and Data Mining for Sports Analytics: 9th International Workshop, Mlsa 2022, Grenoble, France, September 19, 2022, Revised Selected P by
Data Center Networking: Network Topologies and Traffic Management in Large-Scale Data Centers by Guo, Deke
Red Hat Certified Specialist in Services Management and Automation EX358 Exam Guide: Get your certification and prepare for real-world challenges as a by McLeroy, Eric
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks by Tevault, Donald a.
Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program by Tang, Alan
Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program by Tang, Alan
Distributed Systems: Theory and Applications by Ghosh, Hiranmay, Ghosh, Ratan K.
Google Cloud Certified Associate Cloud Engineer Study Guide by Sullivan, Dan
Artificial Intelligence for Knowledge Management, Energy, and Sustainability: 9th Ifip Wg 12.6 and 1st Ifip Wg 12.11 International Workshop, Ai4kmes 2 by
Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities by
Computer Vision - Accv 2022: 16th Asian Conference on Computer Vision, Macao, China, December 4-8, 2022, Proceedings, Part III by
Computer Vision - Accv 2022: 16th Asian Conference on Computer Vision, Macao, China, December 4-8, 2022, Proceedings, Part IV by
International Conference on Computing, Communication, Electrical and Biomedical Systems by
Azure Containers Explained: Leverage Azure container technologies for effective application migration and deployment by Haakman, Wesley, Hooper, Richard
Computer Verstehen: Ein Streifzug Durch Das Innenleben Eines Computers by Nehmer, Jürgen
Innovative Smart Materials Used in Wireless Communication Technology by
Innovative Smart Materials Used in Wireless Communication Technology by
Die Verbindung von KI und Marketing. Eine revolutionäre Kraft im digitalen Zeitalter by Anonymous
Soft Computing and Its Engineering Applications: 4th International Conference, Icsoftcomp 2022, Changa, Anand, India, December 9-10, 2022, Proceedings by
Machine Learning, Optimization, and Data Science: 8th International Conference, Lod 2022, Certosa Di Pontignano, Italy, September 18-22, 2022, Revised by
E-Learning, E-Education, and Online Training: 8th Eai International Conference, Eleot 2022, Harbin, China, July 9-10, 2022, Proceedings, Part II by
E-Learning, E-Education, and Online Training: 8th Eai International Conference, Eleot 2022, Harbin, China, July 9-10, 2022, Proceedings, Part I by
Computer Vision - Accv 2022: 16th Asian Conference on Computer Vision, Macao, China, December 4-8, 2022, Proceedings, Part V by
Passive and Active Measurement: 24th International Conference, Pam 2023, Virtual Event, March 21-23, 2023, Proceedings by
Digital Multimedia Communications: 19th International Forum, Iftc 2022, Shanghai, China, December 8-9, 2022, Revised Selected Papers by
Information for a Better World: Normality, Virtuality, Physicality, Inclusivity: 18th International Conference, Iconference 2023, Virtual Event, March by
Information for a Better World: Normality, Virtuality, Physicality, Inclusivity: 18th International Conference, Iconference 2023, Virtual Event, March by
Machine Learning, Optimization, and Data Science: 8th International Conference, Lod 2022, Certosa Di Pontignano, Italy, September 18-22, 2022, Revised by
Grand Research Challenges in Games and Entertainment Computing in Brazil - Grandgamesbr 2020-2030: First Forum, Grandgamesbr 2020, Recife, Brazil, Nov by
Computer Vision - Accv 2022: 16th Asian Conference on Computer Vision, Macao, China, December 4-8, 2022, Proceedings, Part VII by
Understanding NFS: Network File System on Linux by Noble, Liza, Biswas, Sujata
Cyber Security in Intelligent Computing and Communications by
Mastering Go Network Automation: Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter by Taylor, Ian
Mastering C++ Network Automation: Run Automation across Configuration Management, Container Orchestration, Kubernetes, and Cloud Networking by Barbara, Justin
Mixed-Criticality Industrial Wireless Networks by Jin, XI, Xia, Changqing, Xu, Chi
Mixed-Criticality Industrial Wireless Networks by Jin, XI, Xia, Changqing, Xu, Chi
PKI Implementation and Infrastructures by Ashbourn, Julian
See More