• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2007

Stealing the Network by Mullen, Long
Wardriving & Wireless Penetration Testing by Thornton, Frank, Hurley, Chris, Rogers, Russ
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures by Contos, Brian T.
Developer's Guide to Web Application Security by Cross, Michael
Secure Your Network for Free by Seagren, Eric
Rfid+ Study Guide and Practice Exams: Study Guide and Practice Exams by Sanghera, Paul
Geometric Spanner Networks by Narasimhan, Giri, Smid, Michiel
Foundations of Cryptography: Volume 1, Basic Tools by Goldreich, Oded, Oded, Goldreich
Botnets by Binkley, Schiller
Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24, 2007, Proceedings by
Intrusion Detection Effektiv!: Modellierung Und Analyse Von Angriffsmustern by Meier, Michael
Computer Related Occupational Deviance: Ein Mehr-Ebenen-Modell Zur Erklärung Und Prävention by Godschalk, David
Foundations of Security: What Every Programmer Needs to Know by Kesavan, Anita, Daswani, Neil, Kern, Christoph
Security for Wireless AD Hoc Networks by Anjum, Farooq, Mouchtaris, Petros
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access by Walther, Henrik
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators [With CDROM] by Wiles, Jack, Rogers, Russ, Long, Johnny
How to Cheat at IIS 7 Server Administration by
Biometric Technologies and Verification Systems by Vacca, John R.
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors by Steele, James, Reyes, Anthony, Brittson, Richard
Cybercrime: Digital Cops in a Networked Environment by
Cybercrime by
Security in Distributed, Grid, Mobile, and Pervasive Computing by Xiao, Yang
Snort Intrusion Detection and Prevention Toolkit [With CDROM] by Baker, Andrew, Caswell, Brian, Beale, Jay
Wireless Security and Cryptography: Specifications and Implementations by
Computer Forensics: Evidence Collection and Management by Newman, Robert C.
Grid Computing Security by Chakrabarti, Anirban
Cyber-Safe Kids, Cyber-Savvy Teens: Helping Young People Learn to Use the Internet Safely and Responsibly by Willard, Nancy E.
Cybercrime: How to Avoid Becoming a Victim by Milhorn, H. Thomas
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) by Smid, Miles, Barker, Elaine, Johnson, Don
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers by
Public Key Cryptography - Pkc 2007: 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007 by
Xss Attacks: Cross Site Scripting Exploits and Defense by Hansen, Robert, Petkov, Petko, Grossman, Jeremiah
How to Cheat at VoIP Security by Porter, Thomas Cissp, Gough, Michael
Building Robots with Lego Mindstorms NXT by Ferrari, Mario, Ferrari, Guilio
Zen and the Art of Information Security by Winkler, Ira
Elektronische Signaturen in Modernen Geschäftsprozessen: Schlanke Und Effiziente Prozesse Mit Der Eigenhändigen Elektronischen Unterschrift Realisiere by Wolff-Marting, Vincent, Köhler, Andre, Gruhn, Volker
Conquest in Cyberspace: National Security and Information Warfare by Libicki, Martin C.
Information Security Practice and Experience: Third International Conference, Ispec 2007, Hong Kong, China, May 7-9, 2007, Proceedings by
Sicherheit Und Rechtsverbindlichkeit Mobiler Agenten by
Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6/WG 8.8/WG 11.2 International Workshop, by
Applied Cryptanalysis: Breaking Ciphers in the Real World by Low, Richard M., Stamp, Mark
Pervasive Computing: 5th International Conference, Pervasive 2007, Toronto, Canada, May 13-16, 2007, Proceedings by
Neuroimmunology of Sleep by
How to Cheat at Configuring Open Source Security Tools by Grey
Linksys WRT54G Ultimate Hacking by Asadoorian, Paul, Pesce, Larry
Physical and Logical Security Convergence: Powered by Enterprise Security Management by Derodeff, Colby, Crowell, William P., Contos, Brian T.
A+, Network+, Security+ Exams in a Nutshell by Bhardwaj, Pawan
Computational Intelligence in Information Assurance and Security by
Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, S by
Wired/Wireless Internet Communications: 5th International Conference, WWIC 2007 Coimbra, Portugal, May 23-25, 2007 Proceedings by
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conferen by
Conquest in Cyberspace: National Security and Information Warfare by Libicki, Martin C.
Applied Cryptography and Network Security: 5th International Conference, Acns 2007 by
Alternate Data Storage Forensics by Cohen
How to Cheat at Microsoft Vista Administration by Kanclirz, Jan
Wireless Network Security by
Security Convergence: Managing Enterprise Security Risk by Tyson, Dave
Arithmetic of Finite Fields: First International Workshop, Waifi 2007 by
Lecture Workshop - Understanding the Initiation of Projects within Cyber Insider (CINDER) environments: CINDER Threat Detection using Packet Analysis by Stern, Kent
Anti-Spam Measures: Analysis and Design by Schryen, Guido
Transactions on Data Hiding and Multimedia Security II by
Terrestrial Trunked Radio - TETRA: A Global Security Tool by Stavroulakis, Peter
Pairing-Based Cryptography - Pairing 2007: First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings by
Public Key Infrastructure: 4th European Pki Workshop: Theory and Practice, Europki 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings by
Laboratory Biosecurity Handbook by Gaudioso, Jennifer, Brodsky, Benjamin H., Salerno, Reynolds M.
Security and Privacy in Ad-Hoc and Sensor Networks: 4th European Workshop, Esas 2007, Cambridge, Uk, July 2-3, 2007, Proceedings by
Data and Applications Security XXI: 21st Annual Ifip Wg 11.3 Working Conference on Data and Applications Security, Redondo Beach, Ca, Usa, July 8-11, by
Fifth World Conference on Information Security Education: Proceedings of the Ifip Tc 11 Wg 11.8, Wise 5, 19 to 21 June 2007, United States Military Ac by
PRAXIS Des It-Rechts: Praktische Rechtsfragen Der It-Sicherheit Und Internetnutzung by Speichert, Horst
Advances in Enterprise Information Technology Security by
Cyber Warfare and Cyber Terrorism by
Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, Dimva 2007 Lucerne, Switzerland, July 12-13, 2007 Pro by
Netzwerke und deren Sicherheit by Protic, Dea Ana
Synchronizing Internet Protocol Security (Sipsec) by Shoniregun, Charles A.
Trust Management by
How to Cheat at Securing SQL Server 2005 by
The Shellcoder's Handbook: Discovering and Exploiting Security Holes by Heasman, John, Lindner, Felix, Anley, Chris
Trust, Privacy and Security in Digital Business: 4th International Conference, Trustbus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings by
Advances in Cryptology - Crypto 2007: 27th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2007, Proceedings by
Network-Based Information Systems: First International Conference, NBiS 2007 Regensburg, Germany, September 3-7, 2007 Proceedings by
Computer Network Security by
Fast Software Encryption: 14th International Workshop, FSE 2007 Luxembourg, Luxembourg, March 26-28, 2007 Revised Selected Papers by
Cryptographic Hardware and Embedded Systems - Ches 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings by
Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Turtorial Lectures by
Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks by
Fighting Fraud: How to Establish and Manage an Anti-Fraud Program by Kovacich, Gerald L.
Avien Malware Defense Guide for the Enterprise by Harley, David
How to Cheat at Securing Linux by Alder, Raven, Seagren, Eric S., Krishnamurthy, Mohan
Practical Embedded Security: Building Secure Resource-Constrained Systems by Stapko, Timothy
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research by Maynor, David
Techno Security's Guide to E-Discovery and Digital Forensics by
Shifting the Security Paradigm - The Risks of Information Assurance by Morgan, Grayson
UbiComp 2007: Ubiquitous Computing: 9th International Conference, UbiComp 2007 Innsbruck, Austria, September 16-19, 2007 Proceedings by
Dependable Computing: Third Latin-American Symposium, Ladc 2007, Morelia, Mexico, September 26-28, 2007, Proceedings by
New Technologies, Mobility and Security by
Secure Data Management: 4th Vldb Workshop, Sdm 2007, Vienna, Austria, September 23-24, 2007, Proceedings by
Computer Security: ESORICS 2007 by
Critical Information Infrastructures: Resilience and Protection by Hyslop, Maitland
Cybercrime: The Transformation of Crime in the Information Age by Wall, David S.
Cybercrime: The Transformation of Crime in the Information Age by Wall, David S.
Information Hiding: 8th International Workshop, Ih 2006, Alexandria, Va, Usa, July 10-12, 2006, Revised Seleceted Papers by
Information Security: 10th International Conference, Isc 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings by
Selected Areas in Cryptography by
Isse/Secure 2007 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe/Secure 2007 Conference by
Pancreatic Cytopathology by Chhieng, David C., Stelow, Edward B.
NIST SP 800-44 Guidelines on Securing Public Web Servers: NiST SP 800-44 Version 2 by National Institute of Standards and Tech
Implementing the ISO/IEC 27001 Information Security Management System Standard by Humphreys, Edward
How to Cheat at Securing Your Network by Dubrawsky, Ido
How to Cheat at Administering Office Communications Server 2007 by Piltzecker, Anthony
How to Cheat at Deploying and Securing RFID by Thornton, Frank, Sanghera, Paul
The Best Damn Cybercrime and Digital Forensics Book Period: Your Guide to Digital Information Seizure, Incident Response, and Computer Forensics by Reyes, Anthony, Wiles, Jack
The Official Chfi Study Guide (Exam 312-49): For Computer Hacking Forensic Investigator by Kleiman, Dave
Security Power Tools by Burns, Bryan, Manzuik, Steve, Granick, Jennifer
Advances in Information and Computer Security: Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings by
Managing Virtualization of Networks and Services: 18th Ifip/IEEE International Workshop on Distributed Systems: Operations and Management, Dsom 2007, by
Human Motion - Understanding, Modeling, Capture and Animation: Second Workshop, Humanmotion 2007, Rio de Janeiro, Brazil, October 20, 2007, Proceeding by
Privacy-Respecting Intrusion Detection by Flegel, Ulrich
Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting by
Provable Security by
Advances in Information Processing and Protection by
Variable-Length Codes for Data Compression by Salomon, David
Handbook of Biometrics by
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security by Shaul, Josh, Ingram, Aaron
Kismet Hacking by Schearer, Michael J., Haines, Brad, Thornton, Frank
How to Cheat at Configuring VmWare ESX Server by Rule, David
Infosecurity 2008 Threat Analysis by Schiller, Craig, Fogie, Seth, Derodeff, Colby
The Best Damn IT Security Management Book Period by Snedaker, Susan, McCrie, Robert
The Best Damn Server Virtualization Book Period: Including VMware, Xen, and Microsoft Virtual Server by Dittner, Rogier, Rule, David
Securing Web Services: Practical Usage of Standards and Specifications by Periorellis, Panos
Privacy Enhancing Technologies by
Fighting Terror Online: The Convergence of Security, Technology, and the Law by Golumbic, Martin Charles
E-Business and Telecommunication Networks: Second International Conference, Icete 2005, Reading, Uk, October 3-7, 2005. Selected Papers by
Advances in Cryptology - Asiacrypt 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, by
Biorthogonal Systems in Banach Spaces by Vanderwerff, Jon, Hajek, Petr, Montesinos Santalucia, Vicente
Information Security and Cryptology: ICISC 2007 by
Progress in Cryptology - Indocrypt 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings by
Cryptology and Network Security: 6th International Conference, CANS 2007 Singapore, December 8-10, 2007 Proceedings by
Mobile Ad-Hoc and Sensor Networks: Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings by
Trustworthy Global Computing by
Advances in Computer Science - Asian 2007. Computer and Network Security: 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, P by
Cryptanalytic Attacks on Rsa by Yan, Song Y.
How to Achieve 27001 Certification: An Example of Applied Compliance Management by Arnason, Sigurjon Thor, Willett, Keith D.
Botnet Detection: Countering the Largest Security Threat by
Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing by Hubaux, Jean-Pierre, Buttyán, Levente
Information and Communications Security by
Information Systems Security: Third International Conference, Iciss 2007, Delhi, India, December 16-20, 2007, Proceedings by
Cyber-Security and Threat Politics: US Efforts to Secure the Information Age by Dunn Cavelty, Myriam
User's Guide to Securing External Devices for Telework and Remote Access by Souppaya, Murugiah, U. S. Department of Commerce, Scarfone, Karen
Security Protocols: 13th International Workshop, Cambridge, Uk, April 20-22, 2005, Revised Selected Papers by
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes by
Handbook of Database Security: Applications and Trends by
Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring by Carvey, Harlan
Dr. Tom Shinder's ISA Server 2006 Migration Guide by Shinder, Thomas W.
Juniper(r) Networks Secure Access SSL VPN Configuration Guide by Wyler, Neil R., Cameron, Rob
Web Application Vulnerabilities: Detect, Exploit, Prevent by Palmer, Steven
Open Source Fuzzing Tools by Evron, Gadi, Rathaus, Noam
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition by Menendez, Doug, Marcella, Albert, Jr.
Hacking: The Art of Exploitation, 2nd Edition [With CDROM] by Erickson, Jon
Emerging Directions in Embedded and Ubiquitous Computing: Euc 2007 Workshops: Trust, Wsoc, Ncus, Uuwsn, Usn, Eso, and Secubiq, Taipei, Taiwan, Decembe by
Securing Biometrics Applications by Crosier, Stephen, Shoniregun, Charles A.
Random Curves: Journeys of a Mathematician by Koblitz, Neal
VoIP Network Security and Forensic Models Using Patterns by Pelaez, Juan C.
Cryptography and Coding: 11th Ima International Conference, Cirencester, Uk, December 18-20, 2007, Proceedings by
Securing Peer-to-Peer Video Conferences - From concepts to implementations by Liu, Fuwen
Selected Areas in Cryptography by
Medical Biometrics by
Digital Watermarking and Steganography: Fundamentals and Techniques by Shih, Frank Y.
Distributed Computing and Networking by
E-Voting and Identity: First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers by
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarbo by
The Best of Freebsd Basics by Lavigne, Dru
Digital Privacy: Theory, Technologies, and Practices by
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition: Microsoft Windows Security Secrets and Solutions, Thi by Scambray, Joel
Identity Theft: A Comprehensive Guide by Mason, Jay
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace by Cavelty, Myriam Dunn, Mauer, Victor