• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2008

Microsoft Forefront Security Administration Guide by Varsalone, Jesse
Internet-Security Aus Software-Sicht: Grundlagen Der Software-Erstellung Für Sicherheitskritische Bereiche by Kriha, Walter, Schmitz, Roland
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Lackey, Zane, Cannings, Rich, Dwivedi, Himanshu
Information Security Applications: 8th International Workshop, WISA 2007 Jeju Island, Korea, August 27-29, 2007 Revised Selected Papers by
Advances in Nonlinear Speech Processing: International Conference on Non-Linear Speech Processing, Nolisp 2007 Paris, France, May 22-25, 2007 Revised by
Information Hiding: 9th International Workshop, Ih 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers by
Security of Information and Networks: Proceedings of the First International Conference on Security of Information and Networks (Sin 2007) by
Vulnerability Analysis and Defense for the Internet by
Advances in Computer Science - ASIAN 2006: Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 20 by
Watermarking in Audio: Key Techniques and Technologies by He, Xing
Cybercrime: Secure It or Lose It by Chatam, Denise M.
Cryptography and Security Services: Mechanisms and Applications by Mogollon, Manuel
OS X Exploits and Defense by Long, Johnny, Harley, David, Hurley, Chris
Secrets Stolen, Fortunes Lost by Power, Richard, Burgess, Christopher
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Long, Johnny
Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities by Thomas, Stephen
Public Key Cryptography - Pkc 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, by
Theory of Cryptography: Fifth Theory of Cryptography Conference, Tcc 2008, New York, Usa, March 19-21, 2008, Proceedings by
The Real McTs/McItp Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions [With Dvdrom] by Piltzecker, Anthony
Secure Computer and Network Systems: Modeling, Analysis and Design by Ye, Nong
Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers by Alexander, Philip
The Internet of Things: First International Conference, Iot 2008, Zurich, Switzerland, March 26-28, 2008, Proceedings by
Trustworthy Global Computing: Third Symposium, Tgc 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers by
Advances in Cryptology - Eurocrypt 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Tu by
Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions by
Information Security Practice and Experience: 4th International Conference, Ispec 2008 Sydney, Australia, April 21-23, 2008 Proceedings by
The Real McTs/McItp Exam 70-643 Prep Kit: Independent and Complete Self-Paced Solutions by Martin, Jeffery A., Bowern, Colin, Posey, Brien
Pattern Recognition Technologies and Applications: Recent Advances by
Multimedia Forensics and Security by
Screenos Cookbook: Time-Saving Techniques for Screenos Administrators by Brunner, Stefan, Davar, Vik, Delcourt, David
Topics in Cryptology - Ct-Rsa 2008: The Cryptographers' Track at the Rsa Conference 2008, San Francisco, Ca, Usa, April 8-11, 2008, Proceedings by
Insider Attack and Cyber Security: Beyond the Hacker by
Rational, Robust, and Secure Negotiations in Multi-Agent Systems by
Algorithmic Number Theory: 8th International Symposium, Ants-VIII Banff, Canada, May 17-22, 2008 Proceedings by
Pervasive Computing: 6th International Conference, Pervasive 2008, Sydney, Australia, May 19-22, 2008 by
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second Ifip Wg 11.2 International Workshop, Wistp by
Web Services Research and Practices by
Security and Software for Cybercafes by
SonicWALL Secure Wireless Networks Integrated Solutions Guide by Lightstone
Wired/Wireless Internet Communications: 6th International Conference, Wwic 2008 Tampere, Finland, May 28-30, 2008 Proceedings by
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization by Tiensivu, Aaron
Progress in Cryptology - Africacrypt 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings by
Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, Ny, Usa, June 3-6, 2008, Proceedings by
RFID Security and Privacy: Concepts, Protocols, and Architectures by Henrici, Dirk
Dependability Metrics: Gi-Dagstuhl Research Seminar, Dagstuhl Castle, Germany, October 5 - November 1, 2005, Advanced Lectures by
Transactions on Data Hiding and Multimedia Security III by
Malware Forensics: Investigating and Analyzing Malicious Code by Malin, Cameron H., Aquilina, James M., Casey, Eoghan
Policies and Research in Identity Management: First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Era by
Advances in AD Hoc Networking: Proceedings of the Seventh Annual Mediterranean AD Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 by
The Best Damn Windows Server 2008 Book Period by Piltzecker, Anthony
Public Key Infrastructure: 5th European Pki Workshop: Theory and Practice, Europki 2008 Trondheim, Norway, June 16-17, 2008, Proceedings by
Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20 by
Global E-Security: 4th International Conference, Icges 2008, London, Uk, June 23-25, 2008, Proceedings by
Autonomic and Trusted Computing: 5th International Conference, Atc 2008, Oslo, Norway, June 23-25, 2008, Proceedings by
Trusted Computing Systeme: Konzepte Und Anforderungen by Müller, Thomas
Ubiquitous Intelligence and Computing: 5th International Conference, UIC 2008 Oslo, Norway, June 23-25, 2008 Proceedings by
Internet Security For Parents: Discover The Hidden Dangers That You And Your Children Face Online by Ivancic, Dan
Information Security and Privacy: 13th Australasian Conference, Acisp 2008, Wollongong, Australia, July 7-9, 2008, Proceedings by
Information Assurance Architecture by Willett, Keith D.
Human Ear Recognition by Computer by Chen, Hui, Bhanu, Bir
Arithmetic of Finite Fields: Second International Workshop, Waifi 2008, Siena, Italy, July 6-9, 2008, Proceedings by
Data and Applications Security XXII: 22nd Annual Ifip Wg 11.3 Working Conference on Data and Applications Security London, Uk, July 13-16, 2008, Proce by
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedi by
Security for Telecommunications Networks by La Porta, Thomas, Traynor, Patrick, McDaniel, Patrick
Privacy-Preserving Data Mining: Models and Algorithms by
Intrusion Detection Systems by
Privacy Enhancing Technologies: 8th International Symposium, Pets 2008 Leuven, Belgium, July 23-25, 2008 Proceedings by
Information Security: Policy, Processes, and Practices by Goodman, Seymour, Straub, Detmar W., Baskerville, Richard
E-Business and Telecommunication Networks: Third International Conference, Icete 2006, Setúbal, Portugal, August 7-10, 2006, Selected Papers by
New Stream Cipher Designs: The Estream Finalists by
Exposing Internet Address Use to EnhanceNetwork Security by Cooke, Evan M.
Information Security and Cryptology: Third Sklois Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers by
Information Theoretic Security: Third International Conference, Icits 2008, Calgary, Canada, August 10-13, 2008, Proceedings by
Fast Software Encryption: 15th International Workshop, Fse 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers by
Advances in Cryptology - Crypto 2008: 28th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 17-21, 2008, Proceedings by
Proceedings of the Ifip Tc 11 23rd International Information Security Conference: Ifip 20th World Computer Congress, Ifip Sec'08, September 7-10, 2008 by
Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers by
NIST SP 800-123 Guide to General Server Security: NiST SP 800-123 by National Institute of Standards and Tech
Guide to Securing Legacy IEEE 802.11 Wireless Networks by Tibbs, Cyrus, Dicoi, Derrick, Sexton, Matthew
Guide to General Server Security by Jansen, Wayne, Tracy, Miles, U. S. Department of Commerce-
Fuzzing for Software Security by Demott, Jared D., Miller, Charles, Takanen, Ari
Handbook of Research on Information Security and Assurance by
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet by Melnick, Jim, Dunham, Ken
Building an Effective Information Security Policy Architecture by Bacik, Sandy
Computational Forensics: Second International Workshop, Iwcf 2008, Washington, DC, Usa, August 7-8, 2008, Proceedings by
Secure Data Management: 5th Vldb Workshop, Sdm 2008, Auckland, New Zealand, August 24, 2008, Proceedings by
Quantum Computing for Computer Scientists by Mannucci, Mirco A., Yanofsky, Noson S.
Trust, Privacy and Security in Digital Business by
Intellectual Property and Open Source: A Practical Guide to Protecting Code by Lindberg, Van
Network-Based Information Systems: 2nd Internatonal Conference, Nbis 2008, Turin, Italy, September 1-5, 2008, Proceedings by
Smart Card Research and Advanced Applications: 8th Ifip Wg 8.8/11.2 International Conference, Cardis 2008, London, Uk, September 8-11, 2008, Proceedin by
Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography by Dube, Roger R.
Affect and Emotion in Human-Computer Interaction: From Theory to Applications by
Information Security: 11th International Conference, Isc 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings by
Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, Uk, September 1-3, 2008, Proceedings by
Progress in Pattern Recognition, Image Analysis and Applications: 13th Iberoamerican Congress on Pattern Recognition, Ciarp 2008, Havana, Cuba, Septem by
Security and Cryptography for Networks: 6th International Conference, Scn 2008, Amalfi, Italy, September 10-12, 2008, Proceedings by
NIST SP 800-60 Guide for Mapping Types of Information and Information Systems to: Nist SP 800-60 by National Institute of Standards and Tech
Forensic Filtering of Cell Phone Protocols by Jansen, Wayne, Delaitre, Aurelien
Computer Forensics for Dummies by Anzaldua, Reynaldo, Pollard, Carol
Operating System Security by Jaeger, Trent
Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20 by
Sequences and Their Applications - Seta 2008: 5th International Conference Lexington, Ky, Usa, September 14-18, 2008, Proceedings by
Coding Theory and Applications: 2nd International Castle Meeting, Ismcta 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Pr by
IP Operations and Management: 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008, Proceedings by
Hacking Wall Street: Attacks And Countermeasures by Krinklebine, Karlos
Computer Safety, Reliability, and Security: 27th International Conference, Safecomp 2008 Newcastle Upon Tyne, Uk, September 22-25, 2008 Proceedings by
RFID Security: Techniques, Protocols and System-On-Chip Design by
Gfi Network Security and PCI Compliance Power Tools by Posey, Brien
Computer Security - Esorics 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings by
Using the BACnet Communications DLL v1.0 by Galler, Michael a.
INFORMATION SECURITY OBJECTIVES AND PRACTICES - An Exploratory Study by Ma, Qingxiong, Pearson, John
NIST SP 800-115 Technical Guide to Information Security Testing and Assessment: NiST SP 800-115 by National Institute of Standards and Tech
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection by Wang, Yun
Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line: Reduce Your Information System' by Velte, Toby, Velte, Anthony, Elsenpeter, Robert
Wireless Internet Security by Kempf, James
Post-Quantum Cryptography by
Spam 2 Scam How 2 B E-Safe by Manikantan, K. P.
Information and Communications Security: 10th International Conference, Icics 2008 Birmingham, Uk, October 20 - 22, 2008. Proceedings by
Research in Cryptology: Second Western European Workshop, Weworc 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers by
ISSE 2008 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference by
Provable Security: Second International Conference, Provsec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings by
Security Engineering for Service-Oriented Architectures by Hafner, Michael, Breu, Ruth
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks: Second International Conference, Ip by
On the Move to Meaningful Internet Systems: Otm 2008: Otm Confederated International Conferences, Coopis, Doa, Gada, Is, and Odbase 2008, Monterrey, M by
On the Move to Meaningful Internet Systems: Otm 2008: Otm Confederated International Conferences, Coopis, Doa, Gada, Is, and Odbase 2008, Monterrey, M by
On the Move to Meaningful Internet Systems: OTM 2008 Workshops: OTM Confederated International Workshops and Posters, ADI, AWeSoMe, COMBEK, EI2N, IWSS by
Information Hiding: 10th International Workshop, Ih 2008, Sana Barbara, Ca, Usa, May 19-21, 2008, Revised Selected Papers by
Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist by Scarfone, Karen, Johnson, Paul M., Souppaya, Murugiah
CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives by Gentile, Michael, Gentile, Skye, Collette, Ron
Critical Information Infrastructures Security by
E-Business and Telecommunications: 4th International Conference, Icete 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers by
Constraint-based Analysis of Security Properties by Sarna-Starosta, Beata
Information Networking: Towards Ubiquitous Networking and Services by
Ambient Intelligence: European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008, Proceedings by
Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008, Proceedings by
Advances in Cryptology-Asiacrypt 2008 by
Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008, Proceedings by
Codes and Ciphers - A History of Cryptography by D'Agapeyeff, Alexander
Security in Computing Systems: Challenges, Approaches and Solutions by Biskup, Joachim
Introduction to Network Security by Jacobson, Douglas
How to Complete a Risk Assessment in 5 Days or Less by Peltier, Thomas R.
Post-Quantum Cryptography by
Open Source Systems Security Certification by Damiani, Ernesto, Ardagna, Claudio Agostino, El Ioini, Nabil
Information Systems Security: 4th International Conference, Iciss 2008, Hyderabad, India, December 16-20, 2008, Proceedings by
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast by Walther, Ben, Hope, Paco
Securing Emerging Wireless Systems: Lower-Layer Approaches by Chen, Yingying, Xu, Wenyuan, Trappe, Wade
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS) by Mehta, Ketan, Cooper, David, Scarfone, Karen
Recent Advances in Face Recognition by
Progress in Cryptology - Indocrypt 2008: 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings by
Secure Multi-Party Non-Repudiation Protocols and Applications by Onieva, José a., Zhou, Jianying
Managing Information Risk and the Economics of Security by
Primality Testing and Integer Factorization in Public-Key Cryptography by Yan, Song Y.
Cryptographic Engineering by
Biometric System and Data Analysis: Design, Evaluation, and Data Mining by Yager, Neil, Dunstone, Ted
Global Initiatives to Secure Cyberspace: An Emerging Landscape by
Secure Key Establishment by Choo, Kim-Kwang Raymond
Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth by
Privatsphäre Durch Die Delegation Von Rechten by Wohlgemuth, Sven
Finite Automata and Application to Cryptography by Tao, Renji
Distributed Computing and Networking: 10th International Conference, Icdcn 2009, Hyderabad, India, January 3-6, 2009, Proceedings by
Digital Watermarking: 6th International Workshop, Iwdw 2007 Guangzhou, China, December 3-5, 2007, Proceedings by
Breakthrough Perspectives in Network and Data Communications Security, Design and Applications by
Cisco Routers for the Small Business: A Practical Guide for IT Professionals by Neumann, Jason