• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2011

Security Technology: International Conference, Sectech 2011, Held as Part of the Future Generation Information Technology Conference, Fgit by
Information Technology for Intellectual Property Protection: Interdisciplinary Advancements by
The Psychology of Cyber Crime: Concepts and Principles by Kirwan, Gráinne, Power, Andrew
Computer Terrorism by Campbell, Douglas E.
Introduction to Gangs in America by Holmes, Ronald M., Tewksbury, Richard, Higgins, George
Security Protocols XIX: 19th International Workshop, Cambridge, Uk, March 28-30, 2011, Revised Selected Papers by
Smart Grid Security: An End-To-End View of Security in the New Electrical Grid by Sorebo, Gilbert N., Echols, Michael C.
Data Mining Tools for Malware Detection by Masud, Mehedy, Khan, Latifur, Thuraisingham, Bhavani
Fundamentals of Speaker Recognition by Beigi, Homayoon
The Design of Rijndael: AES - The Advanced Encryption Standard by Rijmen, Vincent, Daemen, Joan
Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned by Tambe, Milind
Security De-Engineering: Solving the Problems in Information Risk Management by Tibble, Ian
Cryptographic Security Architecture: Design and Verification by Gutmann, Peter
The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology by Gattiker, Urs E.
Data Privacy and Security by Salomon, David
Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Re by
German Yearbook on Business History 1988 by
Fundamentals of Communications and Networking by Solomon, Michael G.
Information Security Governance Simplified: From the Boardroom to the Keyboard by Fitzgerald, Todd
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS by Macaulay, Tyson, Singer, Bryan L.
An Introduction to DDoS Attacks and Defense Mechanisms by Gupta, B. B.
Digitale Rechenanlagen: Grundlagen / Schaltungstechnik / Arbeitsweise Betriebssicherheit by Speiser, Ambros P.
Digital Identity and Access Management: Technologies and Frameworks by
Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards by
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances by
Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology by U. S. Department of Commerce