• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2001

The Personal Internet Security Guidebook: Keeping Hackers and Crackers Out of Your Home by Ellis, Juanita, Korper, Steffano, Speed, Tim
Maximum Windows 2000 Security by
Managing Projects for Success: A Trilogy by Hamilton, Albert
Database Nation: The Death of Privacy in the 21st Century by Garfinkel, Simson
Windows 2000 Virtual Private Networking by Fortenberry, Thaddeus
The Internet Security Guidebook: From Planning to Deployment by Ellis, Juanita, Speed, Tim
Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, Pkc 2001, Cheju Island, Korea, February by
Fast Software Encryption: 7th International Workshop, Fse 2000, New York, Ny, Usa, April 10-12, 2000. Proceedings by
Designing SQL Server 2000 Databases by Syngress
Introduction to Public Key Technology and the Federal PKI Infrastructure NIST SP 800-32: 26 Feb 2001 by National Institute of Standards and Tech
Fundamentals of Network Security by Canavan, John E.
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, Ca, Usa, July 25-26, 200 by
Information Security and Cryptology - Icisc 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings by
An Information Security Handbook by Hunter, John M.
Hacking Cyberspace by Gunkel, David J.
Topics in Cryptology - Ct-Rsa 2001: The Cryptographer's Track at Rsa Conference 2001 San Francisco, Ca, Usa, April 8-12, 2001 Proceedings by
Pki: Implementing & Managing E-Security by
Demystifying the IPsec Puzzle by Frankel, Sheila
Ipsec Securing VPNs by
Selected Areas in Cryptography: 7th Annual International Workshop, Sac 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings by
Disaster Management in Telecommunications, Broadcasting and Computer Systems by El Mahdy, Galal
Cobb's Guide to PC and LAN Security by Cobb, Stephen
Reshaping National Intelligence for an Age of Information by Treverton, Gregory F.
It-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms by Fischer-Hübner, Simone
Communications and Multimedia Security Issues of the New Century: Ifip Tc6 / Tc11 Fifth Joint Working Conference on Communications and Multimedia Secu by
Trusted Information: The New Decade Challenge by
Configuring ISA Server 2000 [With CDROM] by Syngress
Java Security by Oaks, Scott
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint by Marchette, David J.
Information Security and Privacy: 6th Australasian Conference, Acisp 2001, Sydney, Australia, July 11-13, 2001. Proceedings by
Cisco IOS Access Lists by Sedayao, Jeff
Advances in Cryptology - Crypto 2001: 21st Annual International Cryptology Conference, Santa Barbara, California, Usa, August 19-23, 2001, Proceedings by
Cryptographic Hardware and Embedded Systems - Ches 2001: Third International Workshop, Paris, France, May 14-16, 2001 Proceedings by
Cryptography and Lattices: International Conference, Calc 2001, Providence, Ri, Usa, March 29-30, 2001. Revised Papers by
Secure Communicating Systems: Design, Analysis, and Implementation by Huth, Michael R. a.
Security Protocols: 8th International Workshops Cambridge, Uk, April 3-5, 2000 Revised Papers by
Malicious Mobile Code: Virus Protection for Windows by Grimes, Roger
Information Security: 4th International Conference, Isc 2001 Malaga, Spain, October 1-3, 2001 Proceedings by
Recent Advances in Intrusion Detection: 4th International Symposium, Raid 2001 Davis, Ca, Usa, October 10-12, 2001 Proceedings by
Recent Advances in Rsa Cryptography by Katzenbeisser, Stefan
Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios by
Digitale Signaturen by Bertsch, Andreas
Open Source E-mail Security by Blum, Richard
A Practical Guide to Security Engineering and Information Assurance by Herrmann, Debra S.
Windows 2000 Active Directory by Syngress
Information and Communications Security: Third International Conference, Icics 2001, Xian, China, November 13-16, 2001. Proceedings by
Java Card for E-Payment Applications by Hassler, Vesna
E-Commerce Security and Privacy by
Advances in Network and Distributed Systems Security: Ifip Tc11 Wg11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuve by
Internet & Intranet Security by Oppliger, Rolf
Foundations of Security Analysis and Design: Tutorial Lectures by
Information Hiding: 4th International Workshop, Ih 2001, Pittsburgh, Pa, Usa, April 25-27, 2001. Proceedings by
Advances in Cryptology -- Asiacrypt 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast by
Hack Proofing Sun Solaris 8 by Syngress
Trusted Recovery and Defensive Information Warfare by Jajodia, Sushil, Peng Liu
Developing Trust: Online Privacy and Security by Curtin, Matt
Microsoft ISA Server 2000 by Alexander, Zubair
Progress in Cryptology - Indocrypt 2001: Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 by
Cryptography and Coding: 8th Ima International Conference Cirencester, Uk, December 17-19, 2001 Proceedings by
Selected Areas in Cryptography: 8th Annual International Workshop, Sac 2001 Toronto, Ontario, Canada, August 16-17, 2001. Revised Papers by
Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management by Peltier, Thomas R.
Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs by Garfinkel, Simson, Spafford, Gene
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age by Levy, Steven