• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2002

Hack Proofing Coldfusion: The Only Way to Stop a Hacker Is to Think Like One by Meyer, Greg
Configuring Symantec AntiVirus by Syngress
McOmmerce Security: A Beginner's Guide by Raina, Kapil, Harsh, Anurag
Cisco Avvid and IP Telephony Design and Implementation by Lawson, Wayne
Building Robots with Lego Mindstorms by Ferrari, Mario, Ferrari, Guilio
Consumers Guide to Cell Phones and Wireless Service Plans by Syngress
Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, Pkc 2002, Paris, France, February 12-14 by
XML Security by
Topics in Cryptology - Ct-Rsa 2002: The Cryptographer's Track at the Rsa Conference 2002, San Jose, Ca, Usa, February 18-22, 2002, Proceedings by
A Guide to Data Compression Methods [With CD-ROM] by Salomon, David
The Design of Rijndael: AES - The Advanced Encryption Standard by Daemen, Joan, Rijmen, Vincent
Content Delivery Networks: Web Switching for Security, Availability, and Speed by
Introduction to Communication Electronic Warfare Systems by Poisel, Richard A.
Information Security and Cryptology - ICISC 2001: 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings by
Security for Ubiquitous Computing by Stajano, Frank
Hardening Cisco Routers by Akin, Thomas
Principles of Secure Network Systems Design by Ghosh, Sumit
Locksmithing and Electronic Security Wiring Diagrams by Schum, John L.
Internet and Wireless Security by
Inference Control in Statistical Databases: From Theory to Practice by
World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing by Hunter, Richard S.
Hackproofing Your Wireless Network by Syngress
Web Performance Tuning by Killelea, Patrick
Hack Proofing Your Network by Syngress
Security and Privacy in Digital Rights Management: ACM Ccs-8 Workshop Drm 2001, Philadelphia, Pa, Usa, November 5, 2001. Revised Papers by
Wireless Security by
Database and Application Security XV: Ifip Tc11 / Wg11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Ni by
Securing and Controlling Cisco Routers Ology, and Profits by Davis, Peter T.
Checkpoint Next Generation Security Administration by Syngress
Broadband Network and Device Security by
Informed Watermarking by Girod, Bernd, Eggers, Joachim
Applications of Data Mining in Computer Security by
Information Assurance: Managing Organizational It Security Risks by Boyce, Joseph G., Jennings, Dan W.
Local Area Network Management, by Mikalsen, Arne, Borgesen, Per
Fast Software Encryption: 8th International Workshop, Fse 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers by
Managing Cisco Network Security by Syngress
Smart Card Application Development Using Java by Nicklous, Martin S., Schäck, Thomas, Hansmann, Uwe
Internet Security Dictionary by Phoha, Vir V.
Network Security with OpenSSL: Cryptography for Secure Communications by Messier, Matt, Chandra, Pravir, Viega, John
Fast Software Encryption: 9th International Workshop, Fse 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers by
IIS Security by
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization by Speed, Tim, Ellis, Juanita, Carrington, Charles
Advances in Cryptology - Crypto 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, Usa, August 18-22, 2002. Proceedings by
Cryptography: A Very Short Introduction by Murphy, Sean, Piper, Fred
Biometric Solutions: For Authentication in an E-World by
Advanced Communications and Multimedia Security: Ifip Tc6 / Tc11 Sixth Joint Working Conference on Communications and Multimedia Security September 26 by
Configuring Ipv6 for Cisco IOS by Syngress
Information Security: 5th International Conference, Isc 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings by
Security Protocols: 9th International Workshop, Cambridge, Uk, April 25-27, 2001 Revised Papers by
Infrastructure Security: International Conference, Infrasec 2002 Bristol, Uk, October 1-3, 2002 Proceedings by
Hacking Exposed J2ee & Java: Developing Secure Web Applications with Java Technology by
Computer Security -- Esorics 2002: 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings by
Recent Advances in Intrusion Detection: 5th International Symposium, Raid 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings by
Verschlüsselungsalgorithmen: Angewandte Zahlentheorie Rund Um Sicherheitsprotokolle by Brands, Gilbert
Hacker Contest: Sicherheitsprobleme, Lösungen, Beispiele by Schumacher, Markus, Roedig, Utz, Moschgath, Marie-Luise
The Art of Deception: Controlling the Human Element of Security by Mitnick, Kevin D., Simon, William L.
On the Move to Meaningful Internet Systems 2002: Coopis, Doa, and Odbase: Confederated International Conferences Coopis, Doa, and Odbase 2002 Proceedi by
Windows XP Professional Security by
Performing Security Analyses of Information Systems by Smith, Charles L., Sr.
Network Control and Engineering for Qos, Security and Mobility: Ifip Tc6 / Wg6.2 & Wg6.7 Conference on Network Control and Engineering for Qos, Securi by
Radius: Securing Public Access to Private Resources by Hassell, Jonathan
The Art of the Steal: How to Protect Yourself and Your Business from Fraud, America's #1 Crime by Abagnale, Frank W.
Advances in Cryptology - Asiacrypt 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown by
Computers, Ethics, and Society by
Information and Communications Security: 4th International Conference, Icics 2002, Singapore, December 9-12, 2002, Proceedings by
Network Interdiction and Stochastic Integer Programming by
The Hacking of America: Who's Doing It, Why, and How by Schell, Bernadette H., Dodge, John L.
Progress in Cryptology - Indocrypt 2002: Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002 by
Implementing Intrusion Detection Systems by Crothers, Tim
Public Key Cryptography - Pkc 2003: 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, Fl, Usa, January 6-8, 2003, P by
Investigative Data Mining for Security and Criminal Detection by Mena, Jesus
Biometrics by
Asset Protection and Security Management Handbook by