• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2012

CRIME On eBay by Ford, Michael
Achieving Systems Safety: Proceedings of the Twentieth Safety-Critical Systems Symposium, Bristol, Uk, 7-9th February 2012 by
Theory of Security and Applications: Joint Workshop, Tosca 2011, Saarbrücken, Germany, March 31-April 1, 2011, Revised Selected Papers by
Foundations and Practice of Security: 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers by
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards by Six, Jeff
RFID Security and Privacy: 7th International Workshop, Rfidsec 2011, Amherst, Ma, Usa, June 26-28, 2011, Revised Selected Papers by
Open Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers by
Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware by
Corporate Cyberwar (Mandarin) by Teng, Dr Michael
Security and Intelligent Information Systems: International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers by
Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected by
Journal of Cyber Security and Mobility by
An Introduction to Hacking and Crimeware: A Pocket Guide by Loewengart, Victoria
Inside Cyber Warfare: Mapping the Cyber Underworld by Caruso, Jeffrey
Information Security Technology for Applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revi by
Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers by
Microsoft Windows Intune 2.0: QuickStart Administration by Overton, David
Data Security and Security Data: 27th British National Conference on Databases, Bncod 27, Dundee, Uk, June 29 - July 1, 2010. Revised Selected Papers by
Topics in Cryptology - Ct-Rsa 2012: The Cryptographers' Track at the Rsa Conference 2012, San Francisco, Ca, Usa, February 27 - March 2, 2012, Proceed by
Engineering Secure Software and Systems: 4th International Symposium, ESSoS 2012, Eindhoven, the Netherlands, February, 16-17, 2012, Proceedings by
Optimizing Information Security and Advancing Privacy Assurance: New Technologies by
Situational Awareness in Computer Network Defense: Principles, Methods and Applications by
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher by U. S. Department of Commerce-Nist
Online Child Safety: Law, Technology and Governance by Savirimuthu, Joseph
Mehr It-Sicherheit Durch Pen-Tests: Optimierung Der It-Sicherheit Durch Gelenktes "Hacking" -- Von Der Planung Über Die Vertragsgestaltung Zur Realisi by Rey, Enno, Thumann, Michael
Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, 3rd Edition (Exam N10-005) by Meyers, Mike, Haley, Dennis
Mastering Microsoft Forefront Uag 2010 Customization by Amara, Rainier, Ben-Ari, Erez
Liars and Outliers: Enabling the Trust That Society Needs to Thrive by Schneier, Bruce
Noiseless Steganography: The Key to Covert Communications by Desoky, Abdelrahman
Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It by Zdziarski, Jonathan
Shields Up: Complete Guide to Windows Security and Mac Privacy by Cornwell, Liz
Role Mining in Business: Taming Role-Based Access Control Administration by Di Pietro, Roberto, Colantonio, Alessandro, Ocello, Alberto
Cyber Situational Awareness: Issues and Research by
Network Intrusion Detection and Prevention: Concepts and Techniques by Ghorbani, Ali A., Tavallaee, Mahbod, Lu, Wei
The Holistic Operational Readiness Security Evaluation: HORSE Project Series: Governance Documentation and Information Technology Security Policies De by Peters, Michael D.
Guidelines for Securing Wireless Local Area Networks (WLANS) by U. S. Department of Commerce, Souppaya, Murugiah, Scarfone, Karen
Security in Embedded Devices by Gebotys, Catherine H.
Entzifferte Geheimnisse: Methoden Und Maximen Der Kryptologie by Bauer, Friedrich L.
Disruptive Technologies, Innovation and Global Redesign: Emerging Implications by
Selected Areas in Cryptography: 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011. Revised Selected Papers by
Digital Video and Audio Broadcasting Technology: A Practical Engineering Guide by Fischer, Walter
Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday by
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide by Chappell, Laura
21st Century Chinese Cyberwarfare by Hagestad, William T.
Algebraic and Stochastic Coding Theory by Kythe, Dave K., Kythe, Prem K.
Click Fraud - Analyse und Methode zur Identifzierung by Diesenbacher, Otto
Sicherheitsanalyse Webserver by Hofer, Reinhard
Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security by Wilson, Mark, Bowen, Pauline, Hash, Joan
Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology: NIST Special Publication 800-95 by Singhal, Anoop, Scarfone, Karen, Winograd, Theodore
Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special by Korow-Diks, Karen, Hash, Joan, Smith, Jonathan
Information Security Management: Global Challenges in the New Millennium by Dhillon, Gurpreet S.
The LLL Algorithm: Survey and Applications by
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings by
Wireless and Mobile Networking: Second Ifip Wg 6.8 Joint Conference, Wmnc 2009, Gdansk, Poland, September 9-11, 2009, Proceedings by
Inetsec 2009 - Open Research Problems in Network Security: Ifip Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Select by
Innovations in Digital Watermarking Techniques by Wang, Feng-Hsing
Software Similarity and Classification by Cesare, Silvio, Xiang, Yang
Trust Management III: Third Ifip Wg 11.11 International Conference, Ifiptm 2009, West Lafayette, In, Usa, June 15-19, 2009, Proceedings by
Handbook of Remote Biometrics: For Surveillance and Security by
Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of by
Advances in Cryptology: Proceedings of Crypto 83 by
Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development by Kleidermacher, David, Kleidermacher, Mike
A Survey of Data Leakage Detection and Prevention Solutions by Shabtai, Asaf, Elovici, Yuval, Rokach, Lior
Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, B by
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System by Blunden, Bill
Transactions on Data Hiding and Multimedia Security VII by
Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology: Special Publication 800-92 by Souppaya, Murugiah, Kent, Karen
Today's Impact on Communication System by IP Spoofing and Its Detection and Prevention by Linta, Sharmin Rashid, Khan, MD Ridgewan
Analyse von TK-Anlagen unter Sicherheitsanforderungen by Steinmann, Michael
AD Hoc Networks: Third International Icst Conference, Adhocnets 2011, Paris, France, September 21-23, 2011, Revised Selected Papers by
How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone by Cambridge, Rodney D.
Computer, Network, Soft & Hard by Schneidewind, Norman F.
Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings by
Crittografia Nel Paese Delle Meraviglie by Venturi, Daniele
Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense by
Advances in Cryptology - Eurocrypt 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, U by
Cyber War: The Next Threat to National Security and What to Do about It by Clarke, Richard A., Knake, Robert
Informationssicherheit: Implementierung eines zertifizierten ISMS nach ISO27001 für IT-Dienstleister by Groß, Markus
Cloud Computing Assessing the Risks by Golden, Bernard, It Governance, Carstensen, Jared
Internet and Surveillance: The Challenges of Web 2.0 and Social Media by
Constructive Side-Channel Analysis and Secure Design: Third International Workshop, Cosade 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings by
Information Security Technology for Applications: 16th Nordic Conference on Security It Systems, Nordsec 2011, Talinn, Estonia, 26-28 October 2011, Re by
Enabling Programmable Self with Healthvault: An Accessible Personal Health Record by Bhandari, Vaibhav
Cyber Security Policy Guidebook by Healey, Jason, Rohmeyer, Paul, Bayuk, Jennifer L.
Cryptographic Protocol: Security Analysis Based on Trusted Freshness by Chen, Kefei, Dong, Ling
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Mitnick, Kevin
Trust Management VI: 6th Ifip Wg 11.11 International Conference, Ifiptm 2012, Surat, India, May 21-25, 2012, Proceedings by
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide by Allen, Lee
Threats, Countermeasures, and Advances in Applied Information Security by
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions by
The Little Black Book of Computer Security, Second Edition by Dubin, Joel
Cyber Forensics by Marcella, Albert J., Guillossou, Frederic
Secure Integrated Circuits and Systems by
Permutation Complexity in Dynamical Systems: Ordinal Patterns, Permutation Entropy and All That by Amigó, José
Critical Infrastructure Protection III: Third Ifip Wg 11.10 International Conference, Hanover, New Hampshire, Usa, March 23-25, 2009, Revised Selected by
Ethical and Social Issues in the Information Age by Kizza, Joseph Migga
Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers by
Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers by
Public Key Cryptography - PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 20 by
Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012) by Clarke, Nathan, Furnell, Steven
Instant Messaging and Cross Site Scripting (XSS) by Kurek, Katharina
Financial Cryptography and Data Security: FC 2011 Workshops, Rlcps and Wecsr, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Pap by
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings by
802.11n: A Survival Guide: Wi-Fi Above 100 Mbps by Gast, Matthew
The Illusion of Intimacy: Problems in the World of Online Dating by Bridges, John C.
Wired/Wireless Internet Communication: 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012, Proceedings by
Sequences and Their Applications - SETA 2012: 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings by
Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, by
Wireless Network Security a Beginner's Guide by Wrightson, Tyler
Public Key Infrastructures, Services and Applications: 8th European Workshop, Europki 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected P by
The 7 Qualities of Highly Secure Software by Paul, Mano
Communication System Security by Chen, Lidong, Gong, Guang
Anonymous Security Systems and Applications: Requirements and Solutions by Tamura, Shinsuke
Security-Aware Systems Applications and Software Development Methods by
Cloud Computing Synopsis and Recommendations by U. S. Department of Commerce, Patt-Corner, Robert, Grance, Tim
Financial Crimes: A Threat to Global Security by
Trust and Trustworthy Computing: 5th International Conference, Trust 2012, Vienna, Austria, June 13-15, 2012, Proceedings by
Image Encryption Scheme Based on Chaotic Maps by Maung, Su Su
Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology by Voas, Jeff, Grance, Tim, Patt-Corner, Robert
Guidelines on Security and Privacy in Public Cloud Computing by And Technology, National Institute of St, Jansen, Wayne, Grance, Timothy
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement by Finklea, Kristin M., Theohary, Catherine a.
Computer Networks: 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings by
Network Forensics: Tracking Hackers Through Cyberspace by Ham, Jonathan, Davidoff, Sherri
Pervasive Computing: 10th International Conference, Pervasive 2012, Newcastle, Uk, June 18-22, 2012. Proceedings by
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th Ifip Wg 11.2 Intern by
Applied Cryptography and Network Security: 10th International Conference, Acns 2012, Singapore, June 26-29, 2012, Proceedings by
Enhancing Information Security and Privacy by Combining Biometrics with Cryptography by Kanade, Sanjay, Petrovska-Delacretaz, Dijana, Dorizzi, Bernadette
Penetration Testing: Protecting Networks and Systems by Henry, Kevin M.
Securing Peer-to-Peer Video Conferences by Liu, Fuwen
Mastering Windows Network Forensics and Investigation by Anson, Steve, Bunting, Steve, Johnson, Ryan
Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings by
Implementación de Calidad de Servicio basado en ISO/IEC 20000 - Guía de Gestión by Kunas, Michael
Progress in Cryptology -- Africacrypt 2012: 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings by
Crime Prevention Technologies and Applications for Advancing Criminal Investigation by
Ethical Impact of Technological Advancements and Applications in Society by
Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i: Recommendations of the National Institute of Standards and Technology (Specia by Owens, Les, Scarfone, Karen, Eydt, Bernard
Wireless LAN Security in a SOHO Environment: A Holistic Approach by Wimmer, Christian
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1) by Chen, Lily, Padgette, John, Scarfone, Karen
Identity Theft and Fraud: Evaluating and Managing Risk by Yuan, Yufei, Archer, Norm, Sproule, Susan
Cloud Security and Control by Griffin, Dan
Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization by
Data and Applications Security and Privacy XXVI: 26th Annual Ifip Wg 11.3 Conference, Dbsec 2012, Paris, France, July 11-13, 2012, Proceedings by
Wirtschaftsspionage Und Intelligence Gathering: Neue Trends Der Wirtschaftlichen Vorteilsbeschaffung by Tsolkas, Alexander, Wimmer, Friedrich
Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology (Special Publication 800-63-1) by Perlner, Ray a., Dodson, Donna F., Newton, Elaine M.
BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology (Special Publication 800-147) by Regenscheid, Andrew, Souppaya, Murugiah, Polk, William
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2: Recommendations of the National Institute of Standa by Halbardier, Adam, Scarfone, Karen, Quinn, Stephen
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher: NIST Special Publication 800-67, Revision 2 by And Technology, National Institute of St, Barker, Elaine, Commerce, U. S. Department of
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations: National Institute of Standards and Technology Sp by Johnson, Arnold, Johnston, Ronald, Chawla, Nirali Shah
Mobile Forensic Reference Materials: A Methodology and Reification (NIST IR 7617) by Jansen, Wayne, Delaitre, Aurelien
NIST Handbook 150-17, NVLAP (National Voluntary Laboratory Accreditation Program) Cryptographic and Security Testing by And Technology, National Institute of St, Leaman, Dana S., Commerce, U. S. Department of
Guide for Security-Focused Configuration Management of Information Systems: The National Institute of Standards and Technology Special Publication 800 by Gupta, Sarbari, Dempsey, Kelley, Ross, Ron
Der Hackerbegriff in den Medien: Ein Diskurs by Witte, Randy
Information Theoretic Security: 6th International Conference, Icits 2012, Montreal, Qc, Canada, August 15-17, 2012, Proceedings by
Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 Revised Selected Papers by
Privacy Enhancing Technologies: 12th International Symposium, Pets 2012, Vigo, Spain, July 11-13, 2012, Proceedings by
Advances in Cryptology -- Crypto 2012: 32nd Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2012, Proceedings by
Transactions on Data Hiding and Multimedia Security VIII by
Street Cryptography: A Quick and Dirty Way to Maintain Your Secret Conspiracy by Forrest, Christopher
Cybersecurity: Authoritative Reports and Resources by Tehan, Rita
Cybersecurity: Selected Legal Issues by Stevens, Gina, Ruane, Kathleen Ann, Dolan, Alissa M.
Wireshark Certified Network Analyst Exam Prep Guide (Second Edition) by Chappell, Laura
Webserver Security by Ermolin, Pavel
Data Protection from Insider Threats by Bertino, Elisa
Digital Forensics and Watermarking: 10th International Workshop, Iwdw 2011, Atlantic City, Nj, Usa, October 23-26, 2011, Revised Selected Papers by
Privacy and Identity Management for Life: 7th Ifip Wg 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revis by
Trust, Privacy and Security in Digital Business: 9th International Conference, Trustbus 2012, Vienna, Austria, September 3-7, 2012, Proceedings by
Data Warehousing and Knowledge Discovery: 14th International Conference, Dawak 2012, Vienna, Austria, September 3-6, 2012, Proceedings by
Multidisciplinary Research and Practice for Informations Systems: Ifip Wg 8.4, 8.9, Tc 5 International Cross Domain Conference and Workshop on Availab by
Communications and Multimedia Security: 13th Ifip Tc 6/Tc 11 International Conference, CMS 2012, Canterbury, Uk, September 3-5, 2012, Proceedings by
Security and Privacy in Communication Networks: 7th International Icst Conference, Securecomm 2011, London, September 7-9, 2011, Revised Selected Pape by
Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP: Streamlined Enterprise Security Management & Monito by Witte, Greg, Cook, Melanie, Kerr, Matt
Reverse Deception: Organized Cyber Threat Counter-Exploitation by Carpenter, Gregory, Kilger, Max, Bodmer, Sean
Secure Data Management: 9th Vldb Workshop, Sdm 2012, Istanbul, Turkey, August 27, 2012, Proceedings by
Recent Advances in Information Hiding and Applications by
Eco-Friendly Computing and Communication Systems: International Conference, Iceccs 2012, Kochi, India, August 9-11, 2012. Proceedings by
Policing Cyber Hate, Cyber Threats and Cyber Terrorism by Blakemore, Brian
Journal of Cyber Security and Mobility 1-2/3 by
Safeguarding Critical E-Docume by Smallwood, Robert F.
Hacking Exposed 7: Network Security Secrets and Solutions by Scambray, Joel, McClure, Stuart, Kurtz, George
Security and Cryptography for Networks: 8th International Conference, Scn 2012, Amalfi, Italy, September 5-7, 2012, Proceedings by
Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Pap by
Future Security: 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings by
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk by McCarthy, N. K., Todd, Matthew, Klaben, Jeff
Computer Security -- Esorics 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings by
Information Security and Cryptology - Icisc 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers by
The Legal Challenges of Global Cyberspace: Why National Regulations Fail to Protect Digital Assets on Cyberspace by Mishago, Tilahun
Security and Privacy in Social Networks by
Cloud Computing by Adams, Randee, Bauer, Eric
Provable Security: 6th International Conference, Provsec 2012, Chengdu, China, September 26-28, 2012, Proceedings by
Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática by Castro Reynoso, Sergio
Information Technology Convergence, Secure and Trust Computing, and Data Management: Itcs 2012 & Sta 2012 by
Digital Forensics for Handheld Devices by Doherty, Eamon P.
Mobile Authentication: Problems and Solutions by Jakobsson, Markus
Using Automated Fix Generation by Thomas, Stephen
Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, Psd 2012, Palermo, Italy, September 26-28, 2012, Proceedings by
Concepts and Case Studies in Threat Management by Weston, J. D. Stephen W., Calhoun, Frederick S.
Multimedia Security: Watermarking, Steganography, and Forensics by
Security and Privacy in Mobile Information and Communication Systems: 4th International Conference, Mobisec 2012, Frankfurt Am Main, Germany, June 25- by
Microsoft Forefront Identity Manager 2010 R2 Handbook by Nordstr M., Kent
Hacking Web Apps: Detecting and Preventing Web Application Security Problems by Shema, Mike
See More