• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2006

Security Log Management: Identifying Patterns in the Chaos by Carter, Everett F., Jr., Babbin, Jacob, Kleiman, Dave
Cyberwar, Netwar and the Revolution in Military Affairs by
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Mitnick, Kevin D., Simon, William L.
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions by Vladimirov, Andrew A.
Complexity and Cryptography: An Introduction by Talbot, John, Welsh, Dominic
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition by Killmeyer, Jan
Ec2nd 2005: Proceedings of the First European Conference on Computer Network Defence by
How to Cheat at Managing Microsoft Operations Manager 2005 by Piltzecker, Anthony
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium, Aaecc-16, Las Vegas, Nv, Usa, February 20-24, 2006, Pr by
Information Security For The Little Guy by Hoffman, Joseph M.
Writing Security Tools and Exploits by Foster, James C.
NIST SP 800-18 R 1 Developing Security Plans for Federal Information Systems: Feb 2006 by National Institute of Standards and Tech
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues by
Guide for Developing Security Plans for Federal Information Systems by Hash, Joan, Bowen, Pauline, Swanson, Marianne
The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology by Gattiker, Urs E.
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft by Cole
Information Security: A Strategic Approach by Leveque, Vincent
Theoretical Computer Science: Essays in Memory of Shimon Even by
Intelligence and Security Informatics: International Workshop, Wisi 2006, Singapore, April 9, 2006, Proceedings by
Privacy Protection for E-Services by Yee, George
Configuring Sonicwall Firewalls by Bendell, Dan
Professional Windows Desktop and Server Hardening by Grimes, Roger A.
Smart Card Research and Advanced Applications: 7th Ifip Wg 8.8/11.2 International Conference, Cardis 2006, Tarragona, Spain, April 19-21, 2006, Procee by
How to Cheat at Designing Security for a Windows Server 2003 Network by Ruston, Chris, Peiris, Chris
Information Security and Cryptology - Icisc 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers by
Public Key Cryptography - Pkc 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, Ny, Usa, April 24-26, 20 by
Cyberwar, Netwar and the Revolution in Military Affairs by
Understanding Voice-Over IP Security by Johnston, Alan B., Piscitello, David M.
Securing Converged IP Networks by Macaulay, Tyson
Information Assurance: Security in the Information Environment by Kovacich, Gerald L., Blyth, Andrew
Information Security: Contemporary Cases: Contemporary Cases by Wright, Marie A., Kakalik, John S.
Hacker's Challenge 3 by Bradley, Tony, Pennington, Bill, Pollino, David
Advances in Cryptology - Eurocrypt 2006: 25th International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Rus by
Practical Voip Security by Porter Cissp Ccnp Ccda Ccs, Thomas
Applied Cryptography and Network Security: 4th International Conference, Acns 2006, Singapore, June 6-9, 2006, Proceedings by
Guide to Wireless Network Security by Vacca, John R.
Bignum Math: Implementing Cryptographic Multiple Precision Arithmetic by St Denis, Tom
Multimedia Security Technologies for Digital Rights Management by
Emerging Trends in Information and Communication Security: International Conference, Etrics 2006, Freiburg, Germany, June 6-9, 2006. Proceedings by
Codes and Ciphers - A History of Cryptography by D'Agapeyeff, Alexander
Public Key Infrastructure: Third European Pki Workshop: Theory and Practice, Europki 2006, Turin, Italy, June 19-20, 2006, Proceedings by
Information Security and Privacy: 11th Australasian Conference, Acisp 2006, Melbourne, Australia, July 3-5, 2006, Proceedings by
Individualisierung Und Datenschutz: Rechtskonformer Umgang Mit Personenbezogenen Daten Im Kontext Der Individualisierung by Schwenke, Matthias
Quantum Cryptography and Secret-Key Distillation by Assche, Gilles Van
Digital Rights Management: Technologies, Issues, Challenges and Systems by
Professional Pen Testing for Web Applications by Andreu, Andres
Information Security: Design, Implementation, Measurement, and Compliance by Layton, Timothy P.
Data Science and Classification by
Fast Software Encryption: 13th International Workshop, Fse 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers by
Protecting Information: From Classical Error Correction to Quantum Cryptography by Loepp, Susan, Wootters, William K.
Computer Security Basics: Computer Security by Gangemi, G. T., Lehtinen, Rick
Protecting Information: From Classical Error Correction to Quantum Cryptography by Wootters, William K., Loepp, Susan
The Language of Compliance: A Glossary of Terms, Acronyms, and Extended Definitions by Cougias, Dorian J., Halpern, Marcelo
Network Control and Engineering for QoS, Security and Mobility, V by
The Openbsd Pf Packet Filter Book by
Concurrent Zero-Knowledge: With Additional Background by Oded Goldreich by Rosen, Alon
Electronic Government: 5th International Conference, EGOV 2006, Krakow, Poland, September 4-8, 2006, Proceedings by
The Internet: The Missing Manual by Pogue, David, Biersdorfer, J. D.
Advances in Digital Forensics II: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, January by
Integrating Security and Software Engineering: Advances and Future Vision by
Combating Spyware in the Enterprise by
Firewall Policies and VPN Configurations by Cantrell, Chris, Lucas, Mark, Singh, Abhishek
Computer Security Dictionary by Cordovana, James, Minoli, Daniel
Configuring Ipcop Firewalls: Closing Borders with Open Source by Dempster, Barrie, Eaton-Lee, James
Sequences and Their Applications - Seta 2006: 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings by
Security Protocols: 12th International Workshop, Cambridge, Uk, April 26-28, 2004. Revised Selected Papers by
Computer Security - Esorics 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings by
How to Cheat at Securing a Wireless Network by Barken, Lee, Hurley, Chris
Dictionary of Information Security by Slade, Robert
Formale Modellierung Von Authentifizierungs- Und Autorisierungsinfrastrukturen: Authentizität Von Deskriptiven Attributen Und Privilegien Auf Der Basi by Wölfl, Thomas
Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised S by
Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings by
Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, Fdtc 2006, Yokohama, Japan, October 10, 2006, Proceedings by
Assessment of Access Control Systems NISTIR 7316: NiSTIR 7316 by National Institute of Standards and Tech
Syngress Force Emerging Threat Analysis by Graham
Scripting Vmware Power Tools: Automating Virtual Infrastructure Administration by Muller, Al
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security by Bradley, T.
The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals by Bocij, Paul
Practical Hacking Techniques and Countermeasures [With CDROM] by Spivey, Mark D.
ISSE 2006 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2006 Conference by
Improving Business Statistics Through Interagency Data Sharing: Summary of a Workshop by National Research Council, Division of Behavioral and Social Sciences and Education, Committee on National Statistics
Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings by
Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceed by
How to Cheat at Managing Information Security by Osborne
On the Move to Meaningful Internet Systems 2006: Otm 2006 Workshops: Otm Confederated International Conferences and Posters, Awesome, Cams, Cominf, Is by
On the Move to Meaningful Internet Systems 2006: Coopis, Doa, Gada, and Odbase: Otm Confederated International Conferences, Coopis, Doa, Gada, and Odb by
Pranks 2 by
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops: OTM Confederated International Conferences and Posters, AWeSOMe, CAMS, COMINF, IS by
On the Move to Meaningful Internet Systems 2006: Coopis, Doa, Gada, and Odbase: Otm Confederated International Conferences, Coopis, Doa, Gada, and Odb by
Digital Watermarking: 5th International Workshop, Iwdw 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings by
Transactions on Data Hiding and Multimedia Security I by
Web Services Security and E-Business by Radhamani, G., Rao, G. S. V. Radha Krishna
Cryptography for Developers by St Denis
Microsoft Windows Security Fundamentals by Grillenmeier, Guido, de Clercq, Jan
Information Security and Cryptology: Second Sklois Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings by
Information Security and Cryptology - Icisc 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings by
Secure Localization and Time Synchronization for Wireless Sensor and AD Hoc Networks by
Preserving Privacy in On-Line Analytical Processing (Olap) by Wijesekera, Duminda, Jajodia, Sushil, Wang, Lingyu
HTML & Xhtml: The Definitive Guide by Musciano, Chuck, Kennedy, Bill
Information and Communications Security: 8th International Conference, Icics 2006, Raleigh, Nc, Usa, December 4-7, 2006, Proceedings by
Advances in Cryptology -- Asiacrypt 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai by
How to Cheat at Windows System Administration Using Command Line Scripts by Bhardwaj, Pawan K.
Progress in Cryptology - Indocrypt 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings by
Cryptology and Network Security: 5th International Conference, Cans 2006, Suzhou, China, December 8-10, 2006, Proceedings by
Mobile Ad-Hoc and Sensor Networks: Second International Conference, Msn 2006, Hong Kong, China, December 13-15, 2006, Proceedings by
Fisma Certification and Accreditation Handbook by Taylor, L., Taylor, Laura P.
Secure E-Government Web Services by
Elsevier's Dictionary of Information Security by Radichkova, B., Manoilov, G.
Network Security Hacks: Tips & Tools for Protecting Your Privacy by Lockhart, Andrew
Information Systems Security: Second International Conference, Iciss 2006, Kolkata, India, December 19-21, 2006, Proceedings by
It-Sicherheit Kompakt Und Verständlich: Eine Praxisorientierte Einführung by Witt, Bernhard C.
Electronic Postage Systems: Technology, Security, Economics by Bleumer, Gerrit
Network Security Policies and Procedures by Frye, Douglas W.
Secure Data Management in Decentralized Systems by
Complete Guide to CISM Certification by Peltier, Thomas R., Peltier, Justin
Distributed Computing and Networking: 8th International Conference, Icdcn 2006, Guwahati, India, December 27-30, 2006, Proceedings by
Critical Information Infrastructures Security: First International Workshop, Critis 2006, Samos Island, Greece, August 31 - September 1, 2006 by Lopez, Javier
Ec2nd 2006: Proceedings of the Second European Conference on Computer Network Defence, in Conjunction with the First Workshop on D by
Elementos Esenciales de Seguridad de SAP by
Topics in Cryptology - Ct-Rsa 2007: The Cryptographers' Track at the Rsa Conference 2007, San Fancisco, Ca, Usa, February 5-9, 2007, Proceedings by
Hack the Stack by Bandes, Ronald M., Watkins, Stephen, Mays, George
Progress in Cryptology - Vietcrypt 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selec by
Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, Esas 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Pape by