• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2011

Transactions on Computational Science XI: Special Issue on Security in Computing, Part II by
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers by
Transactions on Computational Science X: Special Issue on Security in Computing, Part I by
IP Address Management by Rooney, Timothy
Implementing SSL / Tls Using Cryptography and Pki by Davies, Joshua
Information Security Applications by
Konzeption Eines Systems Zur Überbetrieblichen Sammlung Und Nutzung Von Quantitativen Daten Über Informationssicherheitsvorfälle by Nowey, Thomas
Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers by
Protecting Against The Unknown: A guide to improving network security to protect the Internet against future forms of security hazards by Akman, Kemal
Identitätsdiebstahl Und Identitätsmissbrauch Im Internet: Rechtliche Und Technische Aspekte by Schwenk, Jörg, Stuckenberg, Carl-Friedrich, Borges, Georg
Information Security: 13th International Conference, Isc 2010, Boca Raton, Fl, Usa, October 25-28, 2010, Revised Selected Papers by
Topics in Cryptology -- Ct-Rsa 2011: The Cryptographers' Track at the Rsa Conference 2011, San Francisco, Ca, Usa, February 14-18, 2011, Proceedings by
Microsoft Forefront Uag 2010 Administrator's Handbook by Dolev, Ran, Ben-Ari, Erez
Dynamic Mixed Models for Familial Longitudinal Data by Sutradhar, Brajendra C.
Honeypots: A New Paradigm to Information Security by
Practical Methods for Legal Investigations: Concepts and Protocols in Civil and Criminal Cases by Beers, CLI Dean a.
IBM Websphere Application Server V7.0 Security by Siliceo, Omar
Open Research Problems in Network Security: Ifip Wg 11.4 International Workshop, Inetsec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Pape by
Data Privacy Management and Autonomous Spontaneous Security: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010 Athens, G by
Kryptographie Und It-Sicherheit: Grundlagen Und Anwendungen by Spitz, Stephan, Pramateftakis, Michael, Swoboda, Joachim
Computers, Privacy and Data Protection: An Element of Choice by
Computer Security by Gollmann, Dieter
Intrusion Detection: A Machine Learning Approach by Tsai, Jeffrey J. P., Yu, Zhenwei
Public Key Cryptography: PKC 2011 by
Biometrics and Id Management: Cost 2101 European Workshop, Bioid 2011, Brandenburg (Havel), March 8-10, 2011, Proceedings by
Selected Areas in Cryptography: 17th International Workshop, Sac 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers by
Formal Aspects of Security and Trust by
Theory of Cryptography: 8th Theory of Cryptography Conference, Tcc 2011, Providence, Ri, Usa, March 28-30, 2011, Proceedings by
Computer Forensics Jumpstart by Solomon, Michael G., Rudolph, Kai, Tittel, Ed
Security Sound Bites: Important Ideas About Security from Smart-Ass, Dumb-Ass, & Kick-Ass Quotations (2nd Edition) by Johnston, Roger G.
Privacy and Security Issues in Data Mining and Machine Learning: International ECML/PKDD Workshop, PSDML 2010 Barcelona, Spain, September 24, 2010 Rev by
Backtrack 4: Assuring Security by Penetration Testing by Ali, Shakeel, Tedi, Heriyanto
Pfsense 2 Cookbook by Williamson, Matt
Introduction to Computer Forensics: With 33 Real Life Cases by Pelton, Gordon E.
Managing Information Security Risk: Organization, Mission, and Information System View by U. S. Department of Commerce-Nst
NIST SP 800-39 Managing Information Security Risk: March 2011 by National Institute of Standards and Tech
Ethical Issues and Security Monitoring Trends in Global Healthcare: Technological Advancements by
Advanced Research on Electronic Commerce, Web Application, and Communication: International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 201 by
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives by
Security Patch Management by Nicastro, Felicia
Identity-Based Encryption by Sarkar, Palash, Chatterjee, Sanjit
Guide to Biometrics for Large-Scale Systems: Technological, Operational, and User-Related Factors by Ashbourn, Julian
Healthy Passwords: Learn to make strong passwords you can remember by Klein, Ken S.
Voice Over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research by Keromytis, Angelos D.
Metriken - Der Schlüssel Zum Erfolgreichen Security Und Compliance Monitoring: Design, Implementierung Und Validierung in Der PRAXIS by Sowa, Aleksandra
Digital Forensics with Open Source Tools by Carvey, Harlan, Altheide, Cory
Information and Automation: International Symposium, ISIA 2010 Guangzhou, China, November 10-11, 2010 Revised Selected Papers by
Digital Privacy: PRIME - Privacy and Identity Management for Europe by
NIST Special Publication 800-53 Information Security by National Institute of Standards and Tech
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6 by
Data Mining and Machine Learning in Cybersecurity by Du, Xian, Dua, Sumeet
Securing and Sustaining the Olympic City: Reconfiguring London for 2012 and Beyond by Coaffee, Jon, Fussey, Pete, Hobbs, Dick
NIST SP 800-147 & -155 BIOS Protection Guidelines & BIOS Integrity Measurement: Recommendations by National Institute of Standards and Tech
ICT Ethics and Security in the 21st Century: New Developments and Applications by
Cyber Infrastructure Protection by Jordan, Louis, Saadawi, Tarek
Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011, Proceedings by
Information Theoretic Security: 5th International Conference, ICITS 2011, Amsterdam, the Netherlands, May 21-24, 2011, Proceedings by
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication: 5th Ifip Wg 11.2 International Workshop, W by
Interdisciplinary and Multidimensional Perspectives in Telecommunications and Networking: Emerging Findings by
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software by
Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings by
Cloud-Computing-Security by Tajts, Tiberiu
Future Challenges in Security and Privacy for Academia and Industry: 26th Ifip Tc 11 International Information Security Conference, SEC 2011, Lucerne, by
Introduction to Cryptography with Open-Source Software by McAndrew, Alasdair
Staying Safe at School by Quarles, Chester L., Quarles, Tammy F.
Management in der Malware-Industrie: Die zunehmende Professionalisierung auf Seiten der Malware-Industrie und ihrer Gegner by Kexel, Sebastian
Speech Spectrum Analysis by Fulop, Sean A.
Computational Intelligence in Security for Information Systems: 4th International Conference, Cisis 2011, Held at Iwann 2011, Torremolinos-Málaga, Spa by
Internet of Things - Global Technological and Societal Trends from Smart Environments and Spaces to Green Ict by
Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and o by Scarfone, Karen, Stouffer, Keith, Falco, Joe
Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings by
FIPS 140 Demystified: An Introductory Guide for Vendors by Potter, Ray, Higaki, Wesley Hisao
Computer Networks: 18th Conference, Cn 2011, Ustron, Poland, June 14-18, 2011. Proceedings by
50 Tips and Tricks for MongoDB Developers: Get the Most Out of Your Database by Chodorow, Kristina
Wired/Wireless Internet Communications: 9th Ifip Tc 6 International Conference, Wwic 2011, Vilanova I La Geltrú, Spain, June 15-17, 2011, Proceedings by
Information Security for Automatic Speaker Identification by El-Samie, Fathi E. Abd
Android Forensics: Investigation, Analysis and Mobile Security for Google Android by Hoog, Andrew
IT-Security und Botnetze. Aktuelle Angriffs- und Abwehrmethoden by Wagner, Dominik
Trustworthy Internet by
Chaos-Based Cryptography: Theory, Algorithms and Applications by
Wordpress 3 Ultimate Security by Connelly, Olly
Self-Learning Speaker Identification: A System for Enhanced Speech Recognition by Herbig, Tobias, Gerl, Franz, Minker, Wolfgang
Progress in Cryptology - AFRICACRYPT 2011: 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011, Proceedings by
Machine Learning Forensics for Law Enforcement, Security, and Intelligence by Mena, Jesus
Intelligence and Security Informatics: Pacific Asia Workshop, Paisi 2011, Beijing, China, July 9, 2011. Proceedings by
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers by
Critical Information Infrastructure Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010, Revised Papers by
Microsoft Windows Security Essentials by Gibson, Darril
Counterterrorism and Open Source Intelligence by
Network Security, Administration and Management: Advancing Technology and Practice by
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011, Amsterdam, the Netherlands, July 7-8, 201 by
Data and Applications Security and Privacy XXV: 25th Annual Ifip Wg 11.3 Conference, Dbsec 2011, Richmond, Va, Usa, July 11-13, 2011, Proceedings by
Cyber Storm III by Department of Homeland Security
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems by
Security Protocols XVI: 16th International Workshop, Cambridge, Uk, April 16-18, 2008. Revised Selected Papers by
Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings by
Secure and Trust Computing, Data Management, and Applications: 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Procee by
Privacy and Identity Management for Life by
Information Security and Cryptology by
Parallel and Distributed Computing and Networks: International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010, Revised Selected Papers by
Privacy Enhancing Technologies by
Influences on the Adoption of Multifactor Authentication by Libicki, Martin C.
Advances in Cryptology -- Crypto 2011: 31st Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 14-18, 2011, Proceedings by
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification by Marschke, Doug, Southwick, Peter, Reynolds, Harry
It-Notfallmanagement Mit System: Notfälle Bei Der Informationsverarbeitung Sicher Beherrschen by Kersten, Heinrich, Klett, Gerhard, Schröder, Klaus-Werner
Complete Guide to Internet Privacy, Anonymity & Security by Bailey, Matthew
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations by Halder, Debarati, Jaishankar, K.
Virtual Chaos: Our Vulnerability to Cyber-Crime and How to Prevent It by Rohrbach, Shawn
Finding Services for an Open Architecture: A Review of Existing Applications and Programs in PEO C4I by Connor, Kathryn, Porche, Isaac R., III, Dryden, James
Studies in Complexity and Cryptography: Miscellanea on the Interplay Between Randomness and Computation by Goldreich, Oded
Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime by
Advanced Communication and Networking: International Conference, ACN 2011, Brno, Czech Republic, August 15-17, 2011, Proceedings by
Auditing Cloud Computing by Halpert, Ben
Availability, Reliability and Security for Business, Enterprise and Health Information Systems: Ifip Wg 8.4/8.9 International Cross Domain Conference by
Visual Cryptography and Secret Image Sharing by
Not Again!: How The Online "Bad Guys" Get Us and How You Can Beat Them! by Wimer, Robert D.
Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications by Bremner, Murray R.
Transparent User Authentication: Biometrics, RFID and Behavioural Profiling by Clarke, Nathan
The Law and Economics of Cybersecurity by
Secure Data Managment: 8th Vldb Workshop, Sdm 2011, Seattle, Wa, Usa, September 2, 2011, Proceedings by
Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures by
Trust, Privacy and Security in Digital Business: 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceed by
Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings by
Data Warehousing and Knowledge Discovery: 13th International Conference, Dawak 2011, Toulouse, France, August 29- September 2, 2011, Proceedings by
Handbook of Face Recognition by
It-Sicherheit Zwischen Regulierung Und Innovation: Tagungsband Zur Zweiten Eict-Konferenz It-Sicherheit by
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats by
NIST SP 800-128 Guide for Security-Focused Configuration Management of Informati: Recomendations by National Institute of Standards and Tech
Security Risk Analysis of Enterprise Networks Using Probabilistic Atttack Graphs: Nistir 7788 by National Institute of Standards and Tech
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies by
The Hidden Corporation: A Data Management Security Novel by Schlesinger, David
Recent Advances in Intrusion Detection: 14th International Symposium, Raid 2011, Menlo Park, Ca, Usa, September 20-21, 2011, Proceedings by
Computer Security - Esorics 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings by
Einführung in Die Quanteninformatik: Quantenkryptografie, Teleportation Und Quantencomputing by Brands, Gilbert
Spyware by Harkins, John M.
Encyclopedia of Cryptography and Security by
Biorthogonal Systems in Banach Spaces by Vanderwerff, Jon, Hajek, Petr, Montesinos Santalucia, Vicente
Information Security and Assurance: International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011, Proceedings by
Backtrack 5 Wireless Penetration Testing Beginner's Guide by Ramachandran, Vivek
Step by Step Procedure: A little Handbook for System Administrator by Kalingaraj, S.
Provable Security: 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011, Proceedings by
How to Spot Scams Online: First Edition by Gower III, John
Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings by
Information Security Management Handbook, Volume 5 by
PC Viruses: Detection, Analysis and Cure by Solomon, Alan
Robust Control System Networks: How to Achieve Reliable Control After Stuxnet by Langner, Ralph
Advances in Digital Forensics VII: 7th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 31 - February 2, 2011, Re by
Public Key Infrastructures, Services and Applications: 7th European Workshop, Europki 2010, Athens, Greece, September 23-24, 2010. Revised Selected Pa by
Neuroimmunology of Sleep by
Corporate Cyberwar by Teng, Michael
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint by Marchette, David J.
Physical-Layer Security by Bloch, Mattieu
Stabilization, Safety, and Security of Distributed Systems: 13th International Symposium, SSS 2011, Grenoble, France, October 10-12, 2011, Proceedings by
Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers by
Internet and Surveillance: The Challenges of Web 2.0 and Social Media by
Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers by
Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 2011. Proceedings by
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by Coffin, David
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Stuttard, Dafydd, Pinto, Marcus
Continuous Authentication Using Biometrics: Data, Models, and Metrics by
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations by Chawla, Nirali Shah, Johnson, Arnold, Johnston, Ronald
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices by
An Investigation Into the Detection and Mitigation of Denial of Service (Dos) Attacks: Critical Information Infrastructure Protection by
Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings by
Information Security: 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings by
Terrestrial Trunked Radio - Tetra: A Global Security Tool by Stavroulakis, Peter
Police Reform in China by Wong, Kam C.
Preventing Good People from Doing Bad Things: Implementing Least Privilege by Mutch, John, Anderson, Brian
Dependable and Historic Computing: Essays Dedicated to Brian Randell on the Occasion of His 75th Birthday by
Group Testing Theory in Network Security: An Advanced Solution by Thai, My T.
Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa, by
Digitale Forensik und Werkzeuge zur Untersuchung wirtschaftskrimineller Aktivitäten im Umfeld von Kreditinstituten by Schimpf, Ralph
Email Forensics: Eliminating Spam, Scams and Phishing by Hatton, Les
Applied Information Security: A Hands-On Approach by Schläpfer, Michael, Basin, David, Schaller, Patrick
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks by
Securing the Clicks: Network Security in the Age of Social Media by Inasi, Jason, Bahadur, Gary, De Carvalho, Alex
Privacy and Big Data: The Players, Regulators, and Stakeholders by Craig, Terence, Ludloff, Mary
Cloud Computing und Datenschutz by Janisch, Fabian
High Performance Networking, Computing, and Communication Systems: Second International Conference ICHCC 2011, Singapore, May 5-6, 2011, Selected Pape by
Decision and Game Theory for Security: Second International Conference, Gamesec 2011, College Park, MD, Maryland, Usa, November 14-15, 2011, Proceedin by
Advances in Information and Computer Security: 6th International Workshop on Security, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings by
Quantitative Security Risk Assessment of Enterprise Networks by Ou, Xinming, Singhal, Anoop
Differential Cryptanalysis of the Data Encryption Standard by Biham, Eli, Shamir, Adi
Transactions on Data Hiding and Multimedia Security VI by
Security Metrics, A Beginner's Guide by Wong, Caroline
ISSE 2011 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2011 Conference by
A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act by Elmers, Sven
Information and Communication Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings by
Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011, Proceedings by
RC4 Stream Cipher and Its Variants by Paul, Goutam, Maitra, Subhamoy
Introduction to Biometrics by Jain, Anil K., Ross, Arun A., Nandakumar, Karthik
Trusted Systems: Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers by
Advances in Cryptology - ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, So by
Progress in Cryptology - INDOCRYPT 2011: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings by
Cryptology and Network Security: 10th International Conference, CANS 2011 Sanya, China, December 10-12, 2011 Proceedings by
The Healthy PC: Preventive Care, Home Remedies, and Green Computing, 2nd Edition by Hart-Davis, Guy
Web Application Security by Sullivan, Bryan, Liu, Vincent
The ABC of Information Security: Part One(1) by Asiedu, Timothy
Information Systems Security: 7th International Conference, Iciss 2011, Kolkata, India, December 15-19, 2011, Proceedings by
The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September by
See More