• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2013

Self-Learning Speaker Identification: A System for Enhanced Speech Recognition by Gerl, Franz, Minker, Wolfgang, Herbig, Tobias
Counterterrorism and Open Source Intelligence by
Trust, Privacy, and Security in Digital Business: 10th International Conference, Trustbus 2013, Prague, Czech Republic, August 28-29, 2013. Proceeding by
Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers by
Dynamic Secrets in Communication Security by Gong, Weibo, Towsley, Don, Xiao, Sheng
Handbook For Securing Your Home or Small Business Computer Network by Meyers, Andrew
Essential Information Security by Pitt, Cathy
Digital-Forensics and Watermarking: 11th International Workshop, Iwdw 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers by
Mobile Security: How to Secure, Privatize and Recover Your Devices by Nykamp, Darla, Anderson, Joseph, Speed, Timothy
Trustworthy Execution on Mobile Devices by Vasudevan, Amit, Newsome, James, McCune, Jonathan M.
Lightweight Cryptography for Security and Privacy: 2nd International Workshop, Lightsec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers by
Public Key Infrastructures, Services and Applications: 9th European Workshop, Europki 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Paper by
Advances in Security of Information and Communication Networks: First International Conference, Secnet 2013, Cairo, Egypt, September 3-5, 2013. Procee by
Web Penetration Testing with Kali Linux by Lakhani, Aamir, Muniz, Joseph
Cryptography Infosec Pro Guide by Oriyano, Sean-Philip
Introduction to Computer and Network Security: Navigating Shades of Gray by Brooks, Richard R.
Hacking the Human 2 by Mann, Ian
Official (Isc)2 Guide to the Csslp Cbk by Paul, Mano
Computer Security -- Esorics 2013: 18th European Symposium on Research in Computer Security, Egham, Uk, September 9-13, 2013, Proceedings by
Availability, Reliability, and Security in Information Systems and Hci: Ifip Wg 8.4, 8.9, Tc 5 International Cross-Domain Conference, CD-Ares 2013, Re by
Service-Oriented and Cloud Computing: Second European Conference, Esocc 2013, Málaga, Spain, September 11-13, 2013, Proceedings by
Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models by Rehman, Rafeeq U.
Communications and Multimedia Security: 14th Ifip Tc 6/Tc 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceeding by
Computer Safety, Reliability, and Security: 32nd International Conference, Safecomp 2013, Toulouse, France, September 14-27, 2013, Proceedings by
X-Ways Forensics Practitioner's Guide by Zimmerman, Eric, Shavers, Brett
Online File Sharing: Innovations in Media Consumption by Andersson Schwarz, Jonas
Information Security Management Handbook, Volume 7 by
Official (ISC)2(R) Guide to the ISSAP(R) CBK by
Secure Information Management Using Linguistic Threshold Approach by Ogiela, Urszula, Ogiela, Marek R.
Basic Politics of Movement Security: A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks by Sakai, J., Hiscocks, Mandy
Selinux Policy Administration by Vermeulen, Sven
The CEO's Manual on Cyber Security by Scott, James
Malware Narratives: An Introduction by Vostokov, Dmitry, Software Diagnostics Services
Cisco a Beginner's Guide, Fifth Edition by Velte, Toby, Velte, Anthony
Conduite et Maîtrise de l'Audit Informatique: La méthode CMAI by Hallepee, Didier
Managing Information Security by
Network and System Security by
Cyber Security and It Infrastructure Protection by Vacca, John R.
Complete Internet Privacy: The Quickest Guide to Being Anonymous Online by Cox, Craig
Microsoft Directaccess Best Practices and Troubleshooting by Krause, Jordan
What They Didn't Teach at the Academy: Topics, Stories, and Reality beyond the Classroom by
Secure IP Mobility Management for Vanet by Taha, Sanaa, Shen, Xuemin
Security in Computing and Communications: International Symposium, Sscc 2013, Mysore, India, August 22-24, 2013. Proceedings by
Sichere Web-Anwendungen by Szameitat, Daniel
Sicherheit von Android-Betriebssystemen by Szameitat, Daniel, Haug, Martin
Security and Trust Management: 9th International Workshop, STM 2013, Egham, Uk, September 12-13, 2013, Proceedings by
Trustworthy Global Computing: 7th International Symposium, Tgc 2012, Newcastle Upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers by
Secure Smart Embedded Devices, Platforms and Applications by
Kali Linux Cookbook by Pritchett, Willie
Security, Privacy and Trust in Cloud Systems by
Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements by Jones, Andrew, Watson, David Lilburn
Security, Privacy, and Applied Cryptography Engineering: Third International Conference, Space 2013, Kharagpur, India, October 19-23, 2013, Proceeding by
Provable Security: 7th International Conference, Provsec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings by
Private Information Retrieval by Paulet, Russell, Bertino, Elisa, Yi, Xun
Cuckoo Malware Analysis by Muhardianto, Iqbal, Oktavianto, Digit
Research in Attacks, Intrusions, and Defenses: 16th International Symposium, Raid 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings by
The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice by Castrillo, Ileana, Rountree, Derrick
Business Continuity and Disaster Recovery Planning for IT Professionals by Snedaker, Susan, Rima, Chris
Advances in Digital Forensics IX: 9th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 28-30, 2013, Revised Selec by
Vmware Vcloud Security by Sarkar, Prasenjit
Cyber-Physical Systems: Integrated Computing and Engineering Design by Hu, Fei
Intrusion Detection for Ip-Based Multimedia Communications Over Wireless Networks by Tang, Jin, Cheng, Yu
Architectures and Protocols for Secure Information Technology Infrastructures by
Organizational, Legal, and Technological Dimensions of Information System Administration by
IBM Mainframe Security by Dattani, Dinesh D.
Hardware Malware by Weippl, Edgar, Krieg, Christian, Dabrowski, Adrian
Critical Information Infrastructure Security: 6th International Workshop, Critis 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Pap by
Security Basics for Computer Architects by Lee, Ruby B.
Practical Biometrics: From Aspiration to Implementation by Ashbourn, Julian
How to Secure Your Computer by Perry, William G.
An Introduction to Information Security and ISO27001: 2013: A Pocket Guide by Watkins, Steve G.
Cryptographic Applications of Analytic Number Theory: Complexity Lower Bounds and Pseudorandomness by Shparlinski, Igor
ISO27001/ISO27002 a Pocket Guide - Second Edition: 2013 by Calder, Alan
Instant Windows PowerShell by Menon, Vinith
Digital Forensics and Cyber Crime: 4th International Conference, Icdf2c 2012, Lafayette, In, Usa, October 25-26, 2012, Revised Selected Papers by
Financial Cryptography and Data Security: FC 2013 Workshops, Usec and Wahc 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers by
Transactions on Large-Scale Data- And Knowledge-Centered Systems X: Special Issue on Database- And Expert-Systems Applications by
Internet and Distributed Computing Systems: 6th International Conference, Idcs 2013, Hangzhou, China, October 28-30, 2013, Proceedings by
Decision and Game Theory for Security: 4th International Conference, Gamesec 2013, Fort Worth, Tx, Usa, November 11-12, 2013, Proceedings by
Secure It Systems: 18th Nordic Conference, Nordsec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings by
Advances in Information and Computer Security: 8th International Workshop on Security, Iwsec 2013, Okinawa, Japan, November 18-20, 2013, Proceedings by
Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems by Lan, Pang-Chang, Kuo, C. -C Jay, Hong, Y. -W Peter
Cybercrime: Eine Gefährdung der Sicherheit im Informationszeitalter? by Hübert, Alexander
Cyber Security: Deterrence and It Protection for Critical Infrastructures by
Femtocells: Secure Communication and Networking by Wong, Marcus
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by Andress, Jason, Winterfeld, Steve
Information and Communications Security: 15th International Conference, Icics 2013, Beijing, China, November 20-22, 2013, Proceedings by
Location Privacy Protection in Mobile Networks by Liu, Xinxin, Li, Xiaolin
Managing Intelligence: A Guide for Law Enforcement Professionals by Buckley, John
WordPress Security Fundamentals: Protect Your Website from Hackers and Identify WordPress Security Issues by Webster, Blake
Cryptology and Network Security: 12th International Conference, Cans 2013, Paraty, Brazil, November 20-22, 2013, Proceedings by
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats by
Automated Security Management by
Gns3 Network Simulation Guide by Welsh, Chris
When Technocultures Collide: Innovation from Below and the Struggle for Autonomy by Genosko, Gary
ISSE 2013 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2013 Conference by
Security Assessment in Vehicular Networks by Zhu, Haojin, Du, Suguo
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications by
Journal of Cyber Security and Mobility 2-3/4 by
Security and Privacy Preserving in Social Networks by
Advances in Cryptology - Asiacrypt 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, by
Advances in Cryptology -- Asiacrypt 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, by
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions by Mowbray, Thomas J.
Distributed Denial of Service Attack and Defense by Yu, Shui
Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Select by
Progress in Cryptology - Indocrypt 2013: 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings by
Introdução à Análise Forense em Redes de Computadores: Conceitos, Técnicas e Ferramentas para "Grampos Digitais" by Galvão, Ricardo Kléber Martins
Security and the Networked Society by Gregory, Mark A., Glance, David
Information and Network Security Management: Strategic Concept Applications by Adebiaye, Richmond S.
Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings by
Advances in Digital Forensics VII: 7th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 31 - February 2, 2011, Re by
Trusted Systems: 5th International Conference, Intrust 2013, Graz, Austria, December 4-5, 2013, Proceedings by
Assessment of Access Control Systems by Nist
Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures by Hyppönen, Konstantin, Pasanen, Sanna, Haataja, Keijo
Computer Security Division 2010 Annual Report by Nist
Computer Security Division 2011 Annual Report by Nist
Security Protocols: 21st International Workshop, Cambridge, Uk, March 19-20, 2013, Revised Selected Papers by
Social Media Security: Leveraging Social Networking While Mitigating Risk by Cross, Michael
Introduction to Information Security by Shimeall, Timothy, Spring, Jonathan
Black Code: Surveillance, Privacy, and the Dark Side of the Internet by Deibert, Ronald J.
Primality and Cryptography by
Cyberspace and International Relations: Theory, Prospects and Challenges by
Critical Information Infrastructures Security: 7th International Workshop, Critis 2012, Lillehammer, Norway, September 17-18, 2012. Revised Selected P by
Information Systems Security: 9th International Conference, Iciss 2013, Kolkata, India, December 16-20, 2013. Proceedings by
Policing Transnational Organized Crime and Corruption: Exploring the Role of Communication Interception Technology by Bell, P., Loparo, Kenneth A., Congram, M.
Spring Security 3.X Cookbook by Mankale, Anjana
Implementing Appfog by Nohr, Matthew
Computer Incident Response and Forensics Team Management by Johnson, Leighton
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters by Greene, James, Futral, William
Seitenkanalangriffe: Power Analysis by Hoffmann, Thomas
Getting Started with Fortigate by Rosato, Fabbri, Volpe, Fabrizio
The Evolution of Policing: Worldwide Innovations and Insights by
Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime by
The Case for the ISO27001: 2013 (Large Print Edition) by It Governance, Calder, Alan
Advances in Information Technology: 6th International Conference, Iait 2013, Bangkok, Thailand, December 12-13, 2013. Proceedings by
Applied Information Security: A Hands-On Approach by Basin, David, Schaller, Patrick, Schläpfer, Michael
Cryptography and Coding: 14th Ima International Conference, Imacc 2013, Oxford, Uk, December 17-19, 2013, Proceedings by
Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa, by
Network Security Technologies: Design and Applications by
An Investigation Into the Detection and Mitigation of Denial of Service (Dos) Attacks: Critical Information Infrastructure Protection by
Vorratsdatenspeicherung: Zwischen Überwachungsstaat Und Terrorabwehr by Moser-Knierim, Antonie
Modern Cryptography Primer: Theoretical Foundations and Practical Applications by Kurkowski, Miroslaw, Srebrny, Marian, Kościelny, Czeslaw
Introduction to Public Key Infrastructures by Karatsiolis, Evangelos, Wiesmaier, Alexander, Buchmann, Johannes A.
Hacking with Kali: Practical Penetration Testing Techniques by Broad, James, Bindner, Andrew
Measuring Itsm: Measuring, Reporting, and Modeling the It Service Management Metrics That Matter Most to It Senior Executives by Steinberg, Randy A.
Security and Privacy for Implantable Medical Devices by
Security Management: A Critical Thinking Approach by Land, Michael, Ricks, Truett, Ricks, Bobby E.
Instant Java Password and Authentication Security by Mayoral, Fernando
Applied Network Security Monitoring: Collection, Detection, and Analysis by Sanders, Chris, Smith, Jason
Transactions on Large-Scale Data- And Knowledge-Centered Systems XII by
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud by Siepmann, Frank
Core Software Security: Security at the Source by Ransome, James, Misra, Anmol
Transactions on Large-Scale Data- And Knowledge-Centered Systems XI: Special Issue on Advanced Data Stream Management and Continuous Query Processing by
A Framework for Designing Cryptographic Key Management Systems by Nist
Computational Intelligence, Cyber Security and Computational Models: Proceedings of Icc3, 2013 by
Cloud Storage Forensics by Choo, Raymond, Quick, Darren, Martini, Ben
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS) by Nist
The Economics of Information Security and Privacy by
Critical Infrastructure Protection VII: 7th Ifip Wg 11.10 International Conference, Iccip 2013, Washington, DC, Usa, March 18-20, 2013, Revised Select by
Border Gateway Protocol Security by Nist
Complete Guide to Anonymous Torrent Downloading and File-Sharing: A Practical, Step-By-Step Guide on How to Protect Your Internet Privacy and Anonymit by Bailey, Matthew
Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War by
What Happens in Vegas Stays on YouTube: Privacy Is Dead. The New Rules of Reputation. by Qualman, Erik
Security and Trust in Online Social Networks by Carminati, Barbara, Ferrari, Elena, Viviani, Marco
Monitoring with Opsview by Wijntje, Alan
Spaßguerilla 2.0 oder globale Revolution?: Eine motivorientierte Analyse von Struktur, Kultur und Methoden der Anonymous-Bewegung by Knab, Julian
Security Management of Next Generation Telecommunications Networks and Services by Jacobs, Stuart
Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition by Collier, Mark, Endler, David
Computer Security Incident Handling Guide by Nist
Creating a Patch and Vulnerability Management Program by Nist
Building a Home Security System with Beaglebone by Pretty, Bill
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides by Aquilina, James M., Malin, Cameron H., Casey, Eoghan
Hackers and Crackers: Cyber-Criminal Have YOU Targeted! by Preston, Treat
RFID Security and Privacy by Deng, Robert, Bertino, Elisa, Li, Yingjiu
Protecting Our Future, Volume 1: Educating a Cybersecurity Workforce by
Analyzing Security, Trust, and Crime in the Digital World by
Research Developments in Biometrics and Video Processing Techniques by
Advances in Secure Computing, Internet Services, and Applications by