• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2014

Guide to Biometrics for Large-Scale Systems: Technological, Operational, and User-Related Factors by Ashbourn, Julian
Research in Attacks, Intrusions and Defenses: 17th International Symposium, Raid 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings by
Security Architect: Careers in Information Security by Collins, Jon
Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, Cosade 2014, Paris, France, April 13-15, 2014. Revised Selected Pape by
Code Breaking in the Pacific by Donovan, Peter, Mack, John
The Secret World of WikiLeaks: A History of the Organization, Its Leaders, and How It Gets Its Information by Lance, Dan
Slandered and Helpless: In Defense of Your Reputation Online & Offline by Preston, Treat
Cryptography and Security Systems: Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings by
The Audacity to Spy: How Government, Business, and Hackers Rob Us of Privacy by Wilson, Ashley, Nolan, Catherine
The Infosec Handbook: An Introduction to Information Security by Nayak, Umesha, Rao, Umesh Hodeghatta
Case Studies in Secure Computing: Achievements and Trends by
The Partnership Between the NIST and the Private Sector: Improving Cybersecurity by Committee on Commerce, Science And Tran
Transparent User Authentication: Biometrics, RFID and Behavioural Profiling by Clarke, Nathan
Control Systems Cyber Security: Defense in Depth Strategies by Department of Homeland Security
Writing Common Criteria Documentation by Higaki, Wesley Hisao
Communications and Multimedia Security: 15th Ifip Tc 6/Tc 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings by
Securing Wireless Communications at the Physical Layer by
Privacy vs. Security by Ryan, Mark D., Stalla-Bourdillon, Sophie, Phillips, Joshua
Iron-Clad Java: Building Secure Web Applications by Manico, Jim, Detlefsen, August
An Introduction to Mathematical Cryptography by Hoffstein, Jeffrey, Pipher, Jill, Silverman, Joseph H.
Security in Computing and Communications: Second International Symposium, Sscc 2014, Delhi, India, September 24-27, 2014. Proceedings by
Network and System Security: 8th International Conference, Nss 2014, Xi'an, China, October 15-17, 2014. Proceedings by
Technocreep: The Surrender of Privacy and the Capitalization of Intimacy by Keenan, Thomas P.
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies by Schou, Corey, Hernandez, Steven
Trusted Computing Platforms: Design and Applications by Smith, Sean W.
Oracle Privacy Security Auditing: Includes HIPAA Regulatory Compliance by Burleson, Donald K., Nanda, Arup
Security and Privacy in Social Networks by
Your Privacy & Security by Minges, John
Your Privacy & Security by Minges, John
Information Technology Convergence, Secure and Trust Computing, and Data Management: Itcs 2012 & Sta 2012 by
Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies by U. S. Department of Homeland Security
Beaglebone for Secret Agents by Datko, Josh
Information Governance and Security: Protecting and Managing Your Company's Proprietary Information by O'Shaughnessy, Michael, Iannarelli, John G.
Cryptographic Hardware and Embedded Systems -- Ches 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings by
Security and Cryptography for Networks: 9th International Conference, Scn 2014, Amalfi, Italy, September 3-5, 2014. Proceedings by
Service-Oriented and Cloud Computing: Third European Conference, Esocc 2014, Manchester, Uk, September 2-4, 2014, Proceedings by
Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings by
Post-Quantum Cryptography: 6th International Workshop, Pqcrypto 2014, Waterloo, On, Canada, October 1-3, 2014. Proceedings by
Computer Security - Esorics 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I by
Computer Security - Esorics 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I by
E-Business and Telecommunications: International Joint Conference, Icete 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers by
Advances in Digital Forensics X: 10th Ifip Wg 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers by
Secure It Systems: 19th Nordic Conference, Nordsec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings by
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, Space 2014, Pune, India, October 18-22, 2014. Proceedings by
Usable Security: History, Themes, and Challenges by Richter Lipford, Heather, Garfinkel, Simson
Touchless Palmprint Recognition Systems by Scotti, Fabio, Genovese, Angelo, Piuri, Vincenzo
Principles of Memory Dump Analysis: The Collected Seminars by Software Diagnostics Institute, Vostokov Dmitry
Cryptology and Network Security: 13th International Conference, Cans 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings by
NISTIR 7628 Revision 1 Vol 2 Guidelines for Smart Grid Cybersecurity: Volume 2 by National Institute of Standards and Tech
Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying by Moore, Alexis, Edwards, Laurie
Identity-Based Encryption by Chatterjee, Sanjit, Sarkar, Palash
The Savvy Cyber Kids at Home: The Family Gets a Computer by Halpert, Ben
The Book of PF, 3rd Edition: A No-Nonsense Guide to the OpenBSD Firewall by Hansteen, Peter N. M.
Cybercrime and Cyberwarfare by Bernik, Igor
Mommy! There's a Monster in our Computer: The book every parent should read to their child before they go on the Internet by McCarthy, N. K.
Mommy! There's a Monster in our Computer: The book every parent should read to their child before they go on the Internet by McCarthy, N. K.
Die digitale Signatur. Das Äquivalent zur eigenhändigen Unterschrift by Bernotti, Michelle
Automated Firewall Analytics: Design, Configuration and Optimization by Al-Shaer, Ehab
Schwachstellenanalyse & Reverse Engineering von Android Apps by Szameitat, Daniel
Provable Security: 8th International Conference, Provsec 2014, Hong Kong, China, October 9-10, 2014. Proceedings by
Transnational Security by Maras, Marie-Helen
Privacy and Identity Management for Life by
Deep Witchcraft In The 419 Fraud: The Mystery Behind by Jules Fonba
E-Business and Telecommunications: International Joint Conference, Icete 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers by
Decision and Game Theory for Security: 5th International Conference, Gamesec 2014, Los Angeles, Ca, Usa, November 6-7, 2014, Proceedings by
Beherrschbarkeit Von Cyber Security, Big Data Und Cloud Computing: Tagungsband Zur Dritten EIT ICT Labs-Konferenz Zur It-Sicherheit by
Future Data and Security Engineering: 1st International Conference, Fdse 2014, Ho CHI Minh City, Vietnam, November 19-21, 2014, Proceedings by
Economics of Information Security and Privacy III by
Trustworthy Ubiquitous Computing by
Detecting and Combating Malicious Email by Ryan, Julie Jch, Kamachi, Cade
ICT Critical Infrastructures and Society: 10th Ifip Tc 9 International Conference on Human Choice and Computers, Hcc10 2012, Amsterdam, the Netherland by
Moving Target Defense II: Application of Game Theory and Adversarial Modeling by
Advances in Digital Forensics VIII: 8th Ifip Wg 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised by
Handbook of FPGA Design Security by Irvine, Cynthia, Nguyen, Thuy D., Huffmire, Ted
Security Trends for FPGAs: From Secured to Secure Reconfigurable Systems by
E-Democracy, Security, Privacy and Trust in a Digital World: 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revis by
Computer Networks and Distributed Systems: International Symposium, Cnds 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers by
Economics of Information Security and Privacy by
Financial Cryptography and Data Security: FC 2014 Workshops, Bitcoin and Wahc 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers by
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy by Bachrach, Daniel, Rzeszut, Eric
Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements by McWilliams, Brian
Critical Infrastructure Protection VIII: 8th Ifip Wg 11.10 International Conference, Iccip 2014, Arlington, Va, Usa, March 17-19, 2014, Revised Select by
Code of Practice for Cyber Security in the Built Environment by The Institution of Engineering and Technology
Der Cyber-Versicherungsmarkt in Deutschland: Eine Einführung by Choudhry, Umar
Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action by Executive Office of the President
Comptia Security+: Get Certified Get Ahead by Gibson, Darril
ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference by
Hardware Security: Design, Threats, and Safeguards by Chakraborty, Rajat Subhra, Mukhopadhyay, Debdeep
Integer Algorithms in Cryptology and Information Assurance by Verkhovsky, Boris S.
Wireshark Essentials by H. Baxter, James
An Easy Introduction to Cryptography by Zia, M.
Information Security and Cryptology: 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers by
Cybersecurity Systems for Human Cognition Augmentation by
Journal of Cyber Security and Mobility 3-4 by
Handbook of Research on Securing Cloud-Based Databases with Biometric Applications by
Handbook of Research on Threat Detection and Countermeasures in Network Security by
Cybersecurity: Authoritative Reports and Resources, by Topic by Tehan, Rita
Information Security and Cryptology -- Icisc 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers by
Policies and Research in Identity Management: Second Ifip Wg 11.6 Working Conference, Idman 2010, Oslo, Norway, November 18-19, 2010, Proceedings by
Leading Issues in Information Warfare Research by
The Next Generation of Video Surveillance And Video Analytics: The Unified Intelligent Video Analytics Suite by Ye, Liping, Yang, Ye, Xue, Jingyu
Principles of Computer Security Lab Manual, Fourth Edition by Nestler, Vincent J., Hirsch, Matthew P., Harrison, Keith
Wired/Wireless Internet Communications: 12th International Conference, Wwic 2014, Paris, France, May 26-28, 2014, Revised Selected Papers by
Augmented Vision Perception in Infrared: Algorithms and Applied Systems by
Cloud Computing: Challenges, Limitations and R&d Solutions by
Untangle Network Security by El-Bawab, Abd El-Monem a.
Hands-on: OpenVPN: Installing and configuring an OpenVPN server and gateway, and setting up OpenVPN clients on Linux and Android by Offerman, Adrian
Informants, Cooperating Witnesses, and Undercover Investigations: A Practical Guide to Law, Policy, and Procedure, Second Edition by Fitzgerald, Dennis G.
Designing and Building Security Operations Center by Nathans, David
Security and Privacy - Silver Linings in the Cloud: 25th Ifip Tc 11 International Information Security Conference, SEC 2010, Held as Part of Wcc 2010, by
Understanding Cryptography: A Textbook for Students and Practitioners by Paar, Christof, Pelzl, Jan
Progress in Cryptology -- Indocrypt 2014: 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings by
Security Protocols XXII: 22nd International Workshop, Cambridge, Uk, March 19-21, 2014, Revised Selected Papers by
Applications and Techniques in Information Security: International Conference, Atis 2014, Melbourne, Australia, November 26-28, 2014. Proceedings by
Kryptographische Systeme by Pfitzmann, Andreas, Baumann, Ulrike, Franz, Elke
Advances in Digital Forensics VI: Sixth Ifip Wg 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec by
Trust Management IV: 4th Ifip Wg 11.11 International Conference, Ifiptm 2010, Morioka, Japan, June 16-18, 2010, Proceedings by
Model-Driven Risk Analysis: The Coras Approach by Stølen, Ketil, Lund, Mass Soldal, Solhaug, Bjørnar
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes) by Shoniregun, Charles A.
Formal Models and Techniques for Analyzing Security Protocols: A Tutorial by Kremer, Steve, Cortier, Véronique
Advances in Cryptology -- Asiacrypt 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiun by
Advances in Cryptology -- Asiacrypt 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiun by
Managing Information Systems Security and Privacy by Trcek, Denis
Privacy and Identity Management for Life: 5th Ifip Wg 9.2, 9.6/11.4, 11.6, 11.7/Primelife International Summer School, Nice, France, September 7-11, 2 by
Securing Voip: Keeping Your Voip Network Safe by (Bud) Bates, Regis J. Jr.
Network Security by Pérez, André
Cyber Law in Sweden by Kirchberger, Christine
Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers by
Open Source Software for Digital Forensics by
Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devices by Naraei, Parisa, Amiri, Iraj Sadegh, Saberi, Iman
Information Systems Security: 10th International Conference, Iciss 2014, Hyderabad, India, December 16-20, 2014. Proceedings by
Homomorphic Encryption and Applications by Yi, Xun, Paulet, Russell, Bertino, Elisa
Information Security: 17th International Conference, Isc 2014, Hong Kong, China, October 12-14, 2014, Proceedings by
Computers, Privacy and Data Protection: An Element of Choice by
Certification and Security in Inter-Organizational E-Services: Ifip 18th World Computer Congress, August 22-27, 2004, Toulouse, France by
Secure Data Management in Decentralized Systems by
Electronic Postage Systems: Technology, Security, Economics by Bleumer, Gerrit
Handbook of Information and Communication Security by
The Social Engineer's Playbook: A Practical Guide to Pretexting by Talamantes, Jeremiah
No-Body Homicide Cases: A Practical Guide to Investigating, Prosecuting, and Winning Cases When the Victim Is Missing by Dibiase, Thomas A. (Tad)
Security Standardisation Research: First International Conference, Ssr 2014, London, Uk, December 16-17, 2014. Proceedings by
Trust Management for Service-Oriented Environments by Bouguettaya, Athman, Malik, Zaki
Computational Methods for Counterterrorism by
Security for Web Services and Service-Oriented Architectures by Bertino, Elisa, Martino, Lorenzo, Paci, Federica
vSphere Security Cookbook by Greer, Michael
Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, Rfidsec 2014, Oxford, Uk, July 21-23, 2014, Revised Selected by
Burp Suite Essentials by Mahajan, Akash
Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition by Adcock, James M., Stein, Sarah L.
Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L by
Trusted Cloud Computing by
Network Control and Engineering for Qos, Security and Mobility, III: Ifip Tc6 / Wg6.2, 6.6, 6.7 and 6.8. Third International Conference on Network Con by
Surviving The Zombie Apocalypse: Safer Computing Tips for Small Business Managers and Everyday People by Nomad, Max
Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers by
Sequences and Their Applications - Seta 2014: 8th International Conference, Melbourne, Vic, Australia, November 24-28, 2014, Proceedings by
Building an Intelligence-Led Security Program by Liska, Allan
Transactions on Large-Scale Data- And Knowledge-Centered Systems XIV by
Primer on Client-Side Web Security by De Ryck, Philippe, Desmet, Lieven, Piessens, Frank
Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace by Mazanec, Brian M., Thayer, B.
Security Protocols XVIII: 18th International Workshop, Cambridge, Uk, March 24-26, 2010, Revised Selected Papers by
Secure and Trustworthy Service Composition: The Aniketos Approach by
Practical Hadoop Security by Lakhe, Bhushan
A Machine-Learning Approach to Phishing Detection and Defense by Akanbi, O. a., Fazeldehkordi, E., Amiri, Iraj Sadegh
Selected Areas in Cryptography -- Sac 2014: 21st International Conference, Montreal, Qc, Canada, August 14-15, 2014, Revised Selected Papers by
The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003-2014, Second Edition by Nance, Malcolm W.
Iris Biometrics: From Segmentation to Template Security by Wild, Peter, Rathgeb, Christian, Uhl, Andreas
Structured Peer-To-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security by Gurtov, Andrei, Korzun, Dmitry
E-Government, E-Services and Global Processes: Joint Ifip Tc 8 and Tc 6 International Conferences, Eges 2010 and Gisp 2010, Held as Part of Wcc 2010, by
Critical Infrastructure Protection VI: 6th Ifip Wg 11.10 International Conference, Iccip 2012, Washington, DC, Usa, March 19-21, 2012, Revised Selecte by
The Complete Guide to Personal Computer Password Security by Felteau, Doug, Hosein, Khalid J.
Cybersecurity for Everyone: Securing your home or small business network by Sadler, Terence L.
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Wrightson, Tyler
Cyber Insurance Roundtable Readout Report: Enhanced with Text Analytics by PageKicker Robot Grotius by Pagekicker Robot Grotius, Department of Homeland Security
The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web by Lepofsky, Ron
Modernes It-Management: Methodische Kombination Von It-Strategie Und It-Reifegradmodell by Mangiapane, Markus, Büchler, Roman P.
Beginning SQL Server for Developers by Dewson, Robin
Hyper-V Security by Syrewicze, Andy, Siron, Eric
Trusted Computing for Embedded Systems by
Juniper Qfx5100 Series: A Comprehensive Guide to Building Next-Generation Networks by Hanks, Douglas
Transactions on Large-Scale Data- And Knowledge-Centered Systems XV: Selected Papers from Adbis 2013 Satellite Events by
Handbook of Research on Emerging Developments in Data Privacy by
Computer Security: Quickstudy Laminated Reference Guide by Cyborski, Shannon