• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2004

Implementing Homeland Security for Enterprise It by Erbschloe, Michael
Check Point Next Generation with Application Intelligence Security Administration by Syngress
Guide to Elliptic Curve Cryptography by Menezes, Alfred J., Vanstone, Scott, Hankerson, Darrel
Software Forensics: Collecting Evidence from the Scene of a Digital Crime by
Security Protocols: 10th International Workshop, Cambridge, Uk, April 17-19, 2002, Revised Papers by
Information Security Applications: 4th International Workshop, Wisa 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers by
Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers by
Foundations of Security Analysis and Design II: Fosad 2001/2002 Tutorial Lectures by
Security Assessment: Case Studies for Implementing the Nsa Iam by Syngress
Cryptography for Dummies by Cobb, Chey
Secrets and Lies: Digital Security in a Networked World by Schneier, Bruce
Java Cryptography Extensions: Practical Guide for Programmers by Weiss, Jason
Security Warrior by Peikari, Cyrus, Chuvakin, Anton
Public Key Cryptography -- Pkc 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 by
Wireless Operational Security by Rittinghouse Phd Cism, John, Ransome Phd Cism Cissp, James F.
Wardriving: Drive, Detect, Defend: A Guide to Wireless Security by Hurley, Chris
Windows Server 2003 Security Infrastructures: Core Security Features by de Clercq, Jan
Computer Security for the Home and Small Office by Greene, Thomas
SQL Server Security Distilled by Lewis, Morris
Managing and Securing a Cisco Structured Wireless-Aware Network by Wall, David
Always Use Protection: A Teen's Guide to Safe Computing by Appleman, Dan
Hacking the Code: ASP.Net Web Application Security by Burnett, Mark
Windows Server Hacks: 100 Industrial-Strength Tips & Tools by Tulloch, Mitch
Hardening Apache by Mobily, Tony
Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics by Neuenschwander, Daniel
A Practical Guide to Managing Informati by Purser, Steve
The Abilene Net by Powers, Gregg
Hardening Network Infrastructure by Noonan, Wesley J.
Hardening Windows Systems by Bragg, Roberta
The Cryptogic Password Protocol by Gilbertson, Sean, Bhamidipati, Murli
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, Isi 2004, Tucson, Az, Usa, June 10-11, 2004, Proceed by
CYA Securing IIS 6.0: Cover Your A** by Getting It Right the First Time by Peiris, Chris, Schaefer, Ken
CYA Securing Exchange Server 2003 and Outlook Web Access by Gidal
Stealing the Network: How to Own a Continent by Grand, Joe, Craig, Tom, Russell, Ryan
Black Hat: Misfits, Criminals, and Scammers in the Internet Age by Biggs, Dup John
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition by Peltier, Thomas R.
Primality Testing in Polynomial Time: From Randomized Algorithms to Primes Is in P by Dietzfelbinger, Martin
Engineering Principles for Information Technology Security (A Baseline for Achieving Security), Revision A by Hayden, Clark, Feringa, Alexis, Stoneburner, Gary
Cyber Adversary Characterization: Auditing the Hacker Mind by Devost, Matthew G., Sachs, Marcus H., Parker, Tom
Introduction to Cryptography by Buchmann, Johannes
The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology by Gattiker, Urs E.
The Expert Guide to PeopleSoft Security by Carter, Jason
The Expert Guide to PeopleSoft Security by Carter, Jason
Research Directions in Data and Applications Security XVIII: Ifip Tc11 / Wg11.3 Eighteenth Annual Conference on Data and Applications Security July 25 by
Information Security Management, Education and Privacy: Ifip 18th World Computer Congress Tc11 19th International Information Security Workshops 22-27 by
Security and Protection in Information Processing Systems: Ifip 18th World Computer Congress Tc11 19th International Information Security Conference 2 by
Hardening Linux by
Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property by
Computer Viruses for Dummies by Gregory, Peter H.
Secure Data Management: Vldb 2004 Workshop, Sdm 2004, Toronto, Canada, August 30, 2004, Proceedings by
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia by Ramkumar, Mahalingam, Akansu, Ali N., Sencar, Husrev T.
SpamAssassin by Schwartz, Alan
Your Evil Twin: Behind the Identity Theft Epidemic by Sullivan, B.
XML Hacks by Fitzgerald, Michael
Managing Security with Snort and IDS Tools by Cox, Kerry, Gerg, Christopher
Computer Safety, Reliability, and Security: 23rd International Conference, Safecomp 2004, Potsdam, Germany, September 21-24,2004, Proceedings by
SpamAssassin: A practical guide to integration and configuration by McDonald, Alistair
How to Cheat at Managing Windows Small Business Server 2003 by Snedaker, Susan
The Ethical Hack: A Framework for Business Value Penetration Testing by Tiller, James S.
Citizen Cyborg: Why Democratic Societies Must Respond to the Redesigned Human of the Future by Hughes, James
Secure Systems Development with UML by Jürjens, Jan
Secure Group Communications Over Data Networks by Zou, Xukai, Ramamurthy, Byrav, Magliveras, Spyros S.
Introduction to Computer Security by Bishop, Matt
Network Control and Engineering for Qos, Security and Mobility, III: Ifip Tc6 / Wg6.2, 6.6, 6.7 and 6.8. Third International Conference on Network Con by
Expert Web Services Security in the .Net Platform by Moroney, Laurence, Nantz, Brian
Physical Security for IT by Erbschloe, Michael
Voice Over Internet Protocol (Voip) Security by Ransome, James F., Rittinghouse, John
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code by Erbschloe, Michael
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks by Brooks, R. R.
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems by
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication by Uhl, Andreas, Pommer, Andreas
Real World Web Services by Iverson, Will
Intrusion Detection and Correlation: Challenges and Solutions by Kruegel, Christopher, Valeur, Fredrik, Vigna, Giovanni
Selinux: NSA's Open Source Security Enhanced Linux by McCarty, Bill
Semistructured Database Design by Dobbie, Gillian, Ling, Tok Wang
Defending the Digital Frontier: Practical Security for Management by Babiak, Jan, Ernst & Young Llp, Butters, John
Firewalls: Jumpstart for Network and Systems Administrators by Ellis, Scott, Vacc, John R., Vacca, John
Configuring Netscreen Firewalls by Cameron, Rob
Advances in Computer Science - Asian 2004, Higher Level Decision Making: 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the by
Hardening Network Security by Kelly, Patrick, McMullin, Robert, Mallery, John
Trusted Computing Platforms: Design and Applications by Smith, Sean W.
Privacy, Security and Trust Within the Context of Pervasive Computing by
Progress in Cryptology - Indocrypt 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings by
Computer Security in The Workplace: A Quick And Simple Guide by Burgess, Ralph C., Small, Michael P.
Information Hiding: 6th International Workshop, Ih 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers by
Informatik: Aufgaben Und Lösungen by Schildt, Gerhard Helge, Kastner, Wolfgang