• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 1999

Virtual Private Networks: Turning the Internet Into Your Private Network by Scott, Charlie, Wolfe, Paul, Erwin, Mike
Practical Intranet Security: Overview of the State of the Art and Available Technologies by Ashley, Paul M., Vandenwauver, M.
Using and Managing PPP: Help for Network Administrators by Sun, Andrew
Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, Pkc'99, Kamakura, Japan, March 1-3, 1 by
Security Protocols: 6th International Workshop, Cambridge, Uk, April 15-17, 1998, Proceedings by
The Twofish Encryption Algorithm by Schneier, Bruce
Lectures on Data Security: Modern Cryptology in Theory and Practice by
Advances in Cryptology - Eurocrypt '99: International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, Ma by
Selected Areas in Cryptography: 5th Annual International Workshop, Sac'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings by
Database Security XII: Status and Prospects by
I-Way Robbery: Crime on the Internet by Boni, William C.
Secure Internet Programming: Security Issues for Mobile and Distributed Objects by
Digitale Signatur: Grundlagen, Funktion Und Einsatz by Brisch, Klaus M., Bitzer, Frank
Fast Software Encryption: 6th International Workshop, Fse'99 Rome, Italy, March 24-26, 1999 Proceedings by
Advances in Cryptology - Crypto '99: 19th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 15-19, 1999 Proceedings by
Financial Cryptography: Third International Conference, Fc'99 Anguilla, British West Indies, February 22-25, 1999 Proceedings by
Hackers: Crime and the Digital Sublime by Taylor, Paul
Elliptic Curves and Their Applications to Cryptography: An Introduction by Enge, Andreas
Secure Information Networks: Communications and Multimedia Security Ifip Tc6/Tc11 Joint Working Conference on Communications and Multimedia Securit by
Jit'99: Java-Informations-Tage 1999 by
Hackers: Crime and the Digital Sublime by Taylor, Paul
Multilingual Dictionary of It Security: English-German-French-Spanish-Italian by
Information Security Management & Small Systems Security: Ifip Tc11 Wg11.1/Wg11.2 Seventh Annual Working Conference on Information Security Management by
Information and Communication Security: Second International Conference, Icics'99 Sydney, Australia, November 9-11, 1999 Proceedings by
Information Security: Second International Workshop, Isw'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings by
Cryptographic Hardware and Embedded Systems: First International Workshop, Ches'99 Worcester, Ma, Usa, August 12-13, 1999 Proceedings by
Advances in Cryptology - Asiacrypt'99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, Novem by
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 13th International Symposium, Aaecc-13 Honolulu, Hawaii, Usa, November 15-19, 1999 P by
Oracle8i Internal Services for Waits, Latches, Locks, and Memory by Adams, Steve
Secure Networking - Cqre (Secure) '99: International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings by
Coding Theory, Cryptography and Related Areas: Proceedings of an International Conference on Coding Theory, Cryptography and Related Areas, Held in Gu by
Coding Theory and Cryptography: From Enigma and Geheimschreiber to Quantum Theory by
Information Hiding Techniques for Steganography and Digital Watermarking by Katzenbeisser, Stefan
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial by Van Tilborg, Henk C. a.