• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2010

Info Security Risk Management by Minoli, Daniel, Kouns, Jake
Information Security Applications: 10th International Workshop, Wisa 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers by
Security in Emerging Wireless Communication and Networking Systems: First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, by
Information Security and Digital Forensics: First International Conference, ISDF 2009 London, United Kingdom, September 7-9, 2009 Revised Selected Pap by
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) by Christodonte II, Marcos
Power Analysis Side Channel Attacks by Ignjatovic, Alexandar, Parameswaran, Sri, Ambrose, Jude
Engineering Secure Software and Systems by
Trust Modeling and Management in Digital Environments: From Social Concept to System Development by
Computer Synthesized Speech Technologies: Tools for Aiding Impairment by
Net Neutrality by Marsden, Christopher T.
Mobile Application Security: VS ePub for Mobile Application Security by Clark, Chris, Dwivedi, Himanshu, Thiel, David
Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition by Yang, Yi Xian, Niu, Xin Xin, Xu, Cheng Qing
Open Source Software for Digital Forensics by
Data Privacy Management and Autonomous Spontaneous Security by
Theory of Cryptography: 7th Theory of Cryptography Conference, Tcc 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings by
IT Induction and Information Security Awareness by Maddock, Valerie
Decrypted Secrets: Methods and Maxims of Cryptology by Bauer, Friedrich L.
Handbook of Information and Communication Security by
Serious Game Design and Development: Technologies for Training and Learning by
New Applications in IT Standards: Developments and Progress by
Information Systems, Technology and Management by
Asset Protection through Security Awareness by Speed, Tyler Justin
Topics in Cryptology - Ct-Rsa 2010: The 10th Cryptographers' Track at the Rsa Conference 2010, San Francisco, Ca, Usa, March 1-5, 2010. Proceedings by
Replication: Theory and Practice by
Cryptography Engineering: Design Principles and Practical Applications by Kohno, Tadayoshi, Schneier, Bruce, Ferguson, Niels
Secure Integrated Circuits and Systems by
Datenschutz Kompakt Und Verständlich: Eine Praxisorientierte Einführung by Witt, Bernhard C.
Permutation Complexity in Dynamical Systems: Ordinal Patterns, Permutation Entropy and All That by Amigó, José
Information Security Risk Analysis by Peltier, Thomas R.
Seven Deadliest Web Application Attacks by Shema, Mike
Seven Deadliest Microsoft Attacks by Alpern, Naomi, Kraus, Rob, Barber, Brian
Seven Deadliest Wireless Technologies Attacks by Haines, Brad
High Performance Networking, Computing, Communication Systems, and Mathematical Foundations: International Conferences, ICHCC 2009-ICTMF 2009 Sanya, H by
Face Recognition by
Broadband Quantum Cryptography by Rogers, Daniel
Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings by McGovern, Glenn P.
Sicher & Mobil: Sicherheit in Der Drahtlosen Kommunikation by Osterhage, Wolfgang W.
Smart Card Research and Advanced Applications: 9th Ifip Wg 8.8/11.2 International Conference, Cardis 2010, Passau, Germany, April 14-16, 2010, Proceed by
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP by
Progress in Cryptology--AFRICACRYPT 2010 by
Digital Video and Audio Broadcasting Technology: A Practical Engineering Guide by Fischer, Walter
Innovationen und IT-Sicherheit: Innovationen und Sicherheit von RFID-Systemen by Hack, Daniel
Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 Eindhoven, The Netherlands, November 5-6, 2009 Revised Selected Papers by
Loganalysis Tools für Datamining in Logfiles by Hurm, Dominic
Information Security Risk Management for ISO27001/Iso27002 by Watkins, Steve G., Calder, Alan
Seven Deadliest Unified Communications Attacks by York, Dan
Seven Deadliest USB Attacks by Anderson, Brian, Anderson, Barbara
Seven Deadliest Social Network Attacks by Timm, Carl, Perez, Richard
Information Security Practice and Experience by
Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January by
Networking 2010: 9th International IFIP TC 6 Networking Conference Chennai, India, May 11-15, 2010 Proceedings by
The Illusion of Due Diligence: Notes from the CISO Underground by Bardin, Jeffrey S.
Analysis Techniques for Information Security by Datta, Anupam, Jha, Somesh, Li, Ninghui
Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives by
Implications of Aggregated DoD Information Systems for Information Assurance Certification and Accreditation by Landree, Eric
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments by Kipper, Greg, Barrett, Diane
Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques French Rivier by
Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference, CMS 2010 Linz, Austria, May 31 - June 2, 2010 Proceedings by
Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography Paris, France, May 26-28, 2010 Pro by
Wired/Wireless Internet Communications: 8th International Conference, WWIC 2010 Lulea, Sweden, June 1-3, 2010 Proceedings by
Post-Quantum Cryptography: Third International Workshop, Pqcrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings by
The Cryptography of Shakespeare V1 by Arensberg, Walter Conrad
CISSP Exam Prep Questions, Answers & Explanations: 1000+ CISSP Practice Questions with Detailed Solutions by Ssi Logic
Combinatorial Designs for Authentication and Secrecy Codes by Huber, Michael
Trust Management IV: 4th Ifip Wg 11.11 International Conference, Ifiptm 2010, Morioka, Japan, June 16-18, 2010, Proceedings by
Handbook of Electronic Security and Digital Forensics by Watson, David Lilburn, Jahankhani, Hamid, Me, Gianluigi
Personal Satellite Services: Second International ICST Conference, PSATS 2010, Rome, Italy, February 4-5, 2010, Revised Selected Papers by
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 Hyderabad, India, June 21, 2010 Proceedings by
Towards Trustworthy Elections: New Directions in Electronic Voting by
Applied Cryptography and Network Security: 8th International Conference, Acns 2010, Beijing, China, June 22-25, 2010, Proceedings by
Architecting Critical Systems: First International Symposium, Prague, Czech Republic, June 23-25, 2010 by
Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings by
Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings by
Computer Networks: 17th Conference, Cn 2010, Ustron, Poland, June 15-19, 2010. Proceedings by
Trust and Trustworthy Computing: Third International Conference, Trust 2010, Berlin, Germany, June 21-23, 2010, Proceedings by
Secure and Resilient Software Development by Merkow, Mark S., Raghavan, Lakshmikanth
Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World by Fried, Stephen
Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation by Schuckers, Michael E.
Information Security and Privacy: 15th Australasian Conference, Acisp 2010, Sydney, Australia, July 5-7, 2010, Proceedings by
Arithmetic of Finite Fields: Third International Workshop, Waifi 2010, Istanbul, Turkey, June 27-30, 2010, Proceedings by
Networked Services and Applications - Engineering, Control and Management: 16th Eunice/Ifip Wg 6.6 Workshop, Eunice 2010, Trondheim, Norway, June 28-3 by
Coastal Lagoons: Critical Habitats of Environmental Change by
Web Service Mining: Application to Discoveries of Biological Pathways by Zheng, George, Bouguettaya, Athman
Risiko-Assessments Für Datenqualität: Konzept Und Realisierung by Harrach, Hakim
Digital Triage Forensics: Processing the Digital Crime Scene by Pearson, Stephen, Watson, Richard
Network Flow Analysis by Lucas, Michael W.
Privacy and Identity Management for Life: 5th Ifip Wg 9.2, 9.6/11.4, 11.6, 11.7/Primelife International Summer School, Nice, France, September 7-11, 2 by
E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development by
Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers by
802.11 Wireless Networks: Security and Analysis by Holt, Alan, Huang, Chi-Yu
Handbook of FPGA Design Security by Nguyen, Thuy D., Huffmire, Ted, Irvine, Cynthia
It Security Management: It Securiteers - Setting Up an It Security Function by Andina, Diego, Partida, Alberto
Transactions on Data Hiding and Multimedia Security V by
Hackers & Painters: Big Ideas from the Computer Age by Graham, Paul
Recent Trends in Network Security and Applications: Third International Conference, Cnsa 2010, Chennai, India, July 23-25, 2010 Proceedings by
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th International Conference, Dimva 2010, Bonn, Germany, July 8-9, 2010, Proceeding by
Algorithmic Number Theory: 9th International Symposium, Ants-IX, Nancy, France, July 19-23, 2010, Proceedings by
Least Privilege Security for Windows 7, Vista and XP by Smith, Russell
It Security Metrics: A Practical Framework for Measuring Security & Protecting Data by Hayden, Lance
Critical Information Infrastructures Security: 4th International Workshop, Critis 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers by
Information Security and Cryptology - Icisc 2009: 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers by
Privacy Enhancing Technologies: 10th International Symposium, Pets 2010, July 21-23, 2010, Berlin, Germany, Proceedings by
Trusted Systems: First International Conference, Intrust 2009, Beijing, China, December 17-19, 2009. Proceedings by
Surviving Cyberwar by Stiennon, Richard
Surviving Cyberwar by Stiennon, Richard
Privacy, Identity, and Cloud Computing by Katzan, Harry, Jr.
Privacy, Identity, and Cloud Computing by Katzan, Harry, Jr.
Access Control, Security, and Trust: A Logical Approach by Chin, Shiu-Kai, Older, Susan Beth
Economics of Information Security and Privacy by
Speech Dereverberation by
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings by
Cryptographic Hardware and Embedded Systems -- Ches 2010: 12th International Workshop, Santa Barbara, Usa, August 17-20,2010, Proceedings by
Progress in Cryptology - LATINCRYPT 2010: First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, Augu by
Digital Business Security Development: Management Technologies by
Pervasive Information Security and Privacy Developments: Trends and Advancements by
Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption by
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems by
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised by
Insider Threats in Cyber Security by
Introduction to Cryptography with Mathematical Foundations and Computer Implementations by Stanoyevitch, Alexander
Wireless Network Administration A Beginner's Guide by Soyinka, Wale
Elements of Computer Security by Salomon, David
Adaptive Cryptographic Access Control by Martin, Patrick, Kayem, Anne V. D. M., Akl, Selim G.
Designing an IAM Framework with Oracle Identity and Access Management Suite by Scheidel, Jeff
Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings by
Global Security, Safety, and Sustainability: 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, Proceedings by
E-Government, E-Services and Global Processes: Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010, by
What Kind of Information Society?: Governance, Virtuality, Surveillance, Sustainability, Resilience by
Advanced Statistical Steganalysis by Böhme, Rainer
Managing an Information Security and Privacy Awareness and Training Program by Herold, Rebecca
Dynamic Police Training by Bumbak, Ann R.
Swanson on Internal Auditing: Raising the Bar by Swanson, Dan
Securing the Information Infrastructure by Kizza, Joseph M., Kizza, Florence M.
Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings by
Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings by
Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings by
Sequences and Their Applications - Seta 2010: 6th International Conference, Paris, France, September 13-17, 2010. Proceedings by
Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, by
Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings by
Securing Strats in Linux Platforms and Applications by Jang, Michael
Multiple Access Communications: Third International Workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010, Proceedings by
Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, Revised Selected Papers by
Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings by
Stabilization, Safety, and Security of Distributed Systems: 12th International Symposium, SSS 2010, New York, Ny, Usa, September 20-22, 2010, Proceedi by
Trustworthy Global Computing: 5th International Symposium, Tgc 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers by
A Guide to Kernel Exploitation: Attacking the Core by Oldani, Massimiliano, Perla, Enrico
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives by
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering by
Security in Fiber-Wireless (FiWi) Broadband Access Networks by Chowdhury, Sarwarul
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec by
Emergency Notification by Chandler, Robert C.
Spyware and Adware by Aycock, John
Citrix XenDesktop Implementation: A Practical Guide for IT Professionals by James, Gareth R.
Terrorism and Homeland Security: Perspectives, Thoughts, and Opinions by
Provable Security: 4th International Conference, Provsec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings by
Communications and Networking by
Cyber Terrorism: Political and Economic Implications by Colarik, Andrew M.
Junos Security: A Guide to Junos for the Srx Services Gateways and Security Certification by Giecco, Patricio, Cameron, Rob, Woodberg, Brad
Computational Gas-Solids Flows and Reacting Systems: Theory, Methods and Practice by
Certification and Security in Health-Related Web Applications: Concepts and Solutions by
Conducting Biosocial Surveys: Collecting, Storing, Accessing, and Protecting Biospecimens and Biodata by Committee on Population, National Research Council, Division of Behavioral and Social Sciences and Education
Secure Group Communications Over Data Networks by Zou, Xukai, Ramamurthy, Byrav, Magliveras, Spyros S.
Brute Force: Cracking the Data Encryption Standard by Curtin, Matt
Information Hiding: 12th International Conference, Ih 2010, Calgary, Ab, Canada, June 28-30, 2010, Revised Selected Papers by
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, by
Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings by
Ubiquitous Intelligence and Computing: 7th International Conference, UIC 2010, Xi'an, China, October 26-29, 2010, Proceedings by
Machine Learning and Systems Engineering by
Guide to Biometric Reference Systems and Performance Evaluation by
Secure Systems Development with UML by Jürjens, Jan
Foundations of Computer Security by Salomon, David
Preserving Privacy in Data Outsourcing by Foresti, Sara
Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting by
Security Strategy: From Requirements to Reality by Stackpole, Bill, Oksendahl, Eric
Grid Computing Security by Chakrabarti, Anirban
ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference by
Linguistisches Identity Matching: Paradigmenwechsel in Der Suche Und Im Abgleich Von Personendaten by Lisbach, Bertrand
Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection by
Coding for Data and Computer Communications by Salomon, David
Anti-Spam Measures: Analysis and Design by Schryen, Guido
Smart Cards, Tokens, Security and Applications by
Security in Computing Systems: Challenges, Approaches and Solutions by Biskup, Joachim
The Future of Identity in the Information Society: Challenges and Opportunities by
Security Engineering for Service-Oriented Architectures by Hafner, Michael, Breu, Ruth
Gröbner Bases, Coding, and Cryptography by
Post-Quantum Cryptography by
Web Application Security: Iberic Web Application Security Conference, Ibwas 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers by
Advances in Information Technology: 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedings by
Network Security: A Decision and Game-Theoretic Approach by Alpcan, Tansu, Başar, Tamer
Model-Driven Risk Analysis: The Coras Approach by Lund, Mass Soldal, Solhaug, Bjørnar, Stølen, Ketil
Guide to Computer Network Security by Kizza, Joseph Migga
Human Ear Recognition by Computer by Bhanu, Bir, Chen, Hui
Complexity Theory and Cryptology: An Introduction to Cryptocomplexity by Rothe, Jörg
Algebraic Aspects of Cryptography by Koblitz, Neal
Public Key Infrastructures, Services and Applications: 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Paper by
Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20 by Gritzalis, Dimitris, Lopez, Javier
Intelligence and Security Informatics: Techniques and Applications by
RFID Security and Privacy: Concepts, Protocols, and Architectures by Henrici, Dirk
Economics of Identity Theft: Avoidance, Causes and Possible Cures by Camp, L. Jean
Power Analysis Attacks: Revealing the Secrets of Smart Cards by Popp, Thomas, Mangard, Stefan, Oswald, Elisabeth
See More