• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2015

The Mind of the Black Hat: Understanding Today's Cyber Criminal by Sanchez, Dennis Paul Nino S.
Journal of Cyber Security and Mobility 4-1: Resilient and Trustworthy IoT Systems by
Physically Unclonable Functions (Pufs): Applications, Models, and Future Directions by Sadeghi, Ahmad-Reza, Wachsmann, Christian
Transactions on Large-Scale Data- And Knowledge-Centered Systems XVI: Selected Papers from Acomp 2013 by
Don't Fall Victim to Identity Theft: How to Protect Your Name from Being Used Without Your Consent by Lewis, Brian
Oracle Database 12c Security by Knox, David, Maroulis, William, Gaetjen, Scott
Healthcare Information Security and Privacy by Murphy, Sean P.
Applications of Cryptography and Network Security by
Game Theoretic Analysis of Congestion, Safety and Security: Traffic and Transportation Theory by
Digital Forensics and Cyber Crime: Fifth International Conference, Icdf2c 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers by
Trustworthy Global Computing: 9th International Symposium, Tgc 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers by
The Hash Function Blake by Aumasson, Jean-Philippe, Meier, Willi, Phan, Raphael C. -W
Complete Guide to Internet Privacy, Anonymity & Security by Bailey, Matthew
Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day: Simple Steps to Help You Create Better Security Habits to Reduce the Risk of Bec by Fischer, Boaz
Managing Information Security Breaches by Krausz, Michael
Attribute-Based Credentials for Trust: Identity in the Information Society by
Detecting Peripheral-Based Attacks on the Host Memory by Stewin, Patrick
Game Theoretic Analysis of Congestion, Safety and Security: Networks, Air Traffic and Emergency Departments by
Assessing Information Security by Vladimirov, Andrew, Gavrilenko, Konstantin, Michajlowski, Andrei
Cyber Defense and Situational Awareness by
Trusted Computing Platforms: Tpm2.0 in Context by Chen, Liqun, Proudler, Graeme, Dalton, Chris
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security by Arthur, Will, Challener, David
Construction and Analysis of Cryptographic Functions by Budaghyan, Lilya
Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers by
From Police to Security Professional: A Guide to a Successful Career Transition by D'Angelo, Michael S.
Vowel Inherent Spectral Change by
Assessing Security and Privacy Controls in Federal Information Systems and Organ: NIST SP 800-53A Revision 4 - Building Effective Assessment Plans by Standards, National Instituteof
NIST SP 800-163 Vetting the Security of Mobile Applications: NiST SP 800-163 by National Institute of Standards and Tech
Wireless Ad-Hoc Networks by
Python Penetration Testing Essentials by Mohit
Fundamentals of Sketch-Based Passwords: A General Framework by Riggan, Benjamin S., Snyder, Wesley E., Wang, Cliff
Once More Unto the Breach, second edition by Simmpns, Andrea C.
Smartdata: Privacy Meets Evolutionary Robotics by
Data Protection and the Cloud: Are the risks too great? by Ticher, Paul
Integrated Research in Steganography by
Engineering Secure Software and Systems: 7th International Symposium, Essos 2015, Milan, Italy, March 4-6, 2015, Proceedings by
Boys Password Journal by Speedy Publishing LLC
The Business Immunity System: The Pitfalls & Side Effects of Data Handling, Privacy Issues, & Background Checks by Zahidi, Rachid
Dad's & Mom's Internet Safety Do's & Don'ts: Second Edition by Russell, Kevin
Web Application Security is a Stack (Large Print Edition) by Mac Vittie, Lori
Remember!: Your Simple Solution to Keeping & Organizing Passwords by Schultz, V. J.
Mastering the Nmap Scripting Engine by Calderón Pale, Paulino
A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm: A Model To Enhance The Performance Of Cloud by Manisekaran, Pradheep
The Mobile Application Hacker's Handbook by Colley, Shaun, Chell, Dominic, Erasmus, Tyrone
The CISO Handbook: A Practical Guide to Securing Your Company by Gentile, Michael, Collette, Ron, August, Thomas D.
Transactions on Large-Scale Data- And Knowledge-Centered Systems XVII: Selected Papers from Dawak 2013 by
Getting Started with Windows Server Security by Sivarajan, Santhosh
Learning iOS Security by Banks, Allister, Edge, Charles S.
Information Security: Principles and New Concepts (Volume I) by
Information Security: Principles and New Concepts (Volume II) by
Information Security: Principles and New Concepts (Volume III) by
Information Security: Principles and New Concepts (Volume IV) by
Online Advertising and Hidden Hazards to Consumer Security and Data Privacy by Permanent Subcommittee on Investigations
Cyber Warfare: A Reference Handbook by Springer, Paul J.
Cybersecurity in Our Digital Lives by
Candidate Multilinear Maps by Garg, Sanjam
Web Security: A WhiteHat Perspective by Zhao, Liz, Wu, Hanqing
Requirements for The Control of Electromagnetic Interference Characteristics of Subsystems and Equipment: MiL-STD-461G by Department of Defense
Information Security Risk Management: Risikomanagement Mit Iso/Iec 27001, 27005 Und 31010 by Klipper, Sebastian
Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide by Crawley, Don R.
Computing Security & Cryptography Handbook by
Hacking Wireless Networks - The ultimate hands-on guide by Kolokithas, Andreas
Remember!: Your Simple Solution to Keeping & Organizing Passwords (medium size edition) by Schultz, V. J.
Blockchain: Blueprint for a New Economy by Swan, Melanie
Build a Security Culture by Roer, Kai
Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I by
Introduction to Social Media Investigation: A Hands-On Approach by Golbeck, Jennifer
Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Cache, Johnny, Wright, Joshua
Scfm: Secure Coding Field Manual: A Programmer's Guide to OWASP Top 10 and CWE/SANS Top 25 by Wear, Sunny
Cyber Law in the Czech Republic by Čermák, Jiří, Loebl, Zbyněk, Polčák, Radim
Security Issues in Mobile Nfc Devices by Roland, Michael
Transactions on Large-Scale Data- And Knowledge-Centered Systems XIX: Special Issue on Big Data and Open Data by
Advances in Information Retrieval: 37th European Conference on IR Research, Ecir 2015, Vienna, Austria, March 29 - April 2, 2015. Proceedings by
Arithmetic of Finite Fields: 5th International Workshop, Waifi 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers by
Public-Key Cryptography -- Pkc 2015: 18th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, Usa, Marc by
Transactions on Large-Scale Data- And Knowledge-Centered Systems XVIII: Special Issue on Database- And Expert-Systems Applications by
Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II by
Recent Progress in Biometrics by
Zabbix Cookbook by Uytterhoeven, Patrik
Secrets and Lies: Digital Security in a Networked World by Schneier, Bruce
Providing Assurance to Cloud Computing through ISO 27001 Certification: How Much Cloud is Secured After Implementing Information Security Standards by Tariq, Muhammad Imran
Passive and Active Measurement: 16th International Conference, Pam 2015, New York, Ny, Usa, March 19-20, 2015, Proceedings by
Violence in Nigeria: Patterns and Trends by Taft, Patricia, Haken, Nate
Topics in Cryptology -- Ct-Rsa 2015: The Cryptographer's Track at the Rsa Conference 2015, San Francisco, Ca, Usa, April 20-24, 2015. Proceedings by
Lightweight Cryptography for Security and Privacy: Third International Workshop, Lightsec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selecte by
Smart Card Research and Advanced Applications: 13th International Conference, Cardis 2014, Paris, France, November 5-7, 2014. Revised Selected Papers by
Information Security and Cryptology - Icisc 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers by
Protocols and Procedures of Cryptography and Network Security by
How Data Mining Threatens Student Privacy by Committee on Homeland Security House of
Kali Linux Wireless Penetration Testing Beginner's Guide: Master wireless testing techniques to survey and attack wireless networks with Kali Linux by Buchanan, Cameron, Ramachandran, Vivek
NISTIR 7823 Advanced Metering Infrastructure Smart Meter Upgradeability Test Fra: nistir 7823 by National Institute of Standards and Tech
Transactions on Large-Scale Data- And Knowledge-Centered Systems XX: Special Issue on Advanced Techniques for Big Data Management by
Learning AirWatch by Dunkerley, Mark
Learning Puppet Security by Slagle, Jason
Elastix Unified Communications Server Cookbook by Barajas Puente, Gerardo
Advances in Cryptology - Eurocrypt 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulga by
Security Technology Convergence Insights by Bernard, Ray
Measuring and Communicating Security's Value: A Compendium of Metrics for Enterprise Protection by Campbell, George
Python Hacking Essentials by Wish, Earnest
Seguridad en Bases de Datos y Aplicaciones Web by Gallardo Aviles, Gabriel
Advances in Cryptology - Eurocrypt 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulga by
Group Theoretic Cryptography by Steinwandt, Rainer, González Vasco, Maria Isabel
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails by Hadnagy, Christopher, Fincher, Michele
The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and our Democratic Process by Burnham, David
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain by
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, Dpm 2014, 7th International Workshop, Se by
Progress in Cryptology - Latincrypt 2014: Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil by
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers by
Principles of Security and Trust: 4th International Conference, Post 2015, Held as Part of the European Joint Conferences on Theory and Practice of So by
Information Theoretic Security: 8th International Conference, Icits 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings by
Proactive Botnet Detection: Through Characterization of Distributed Denial of Service Attacks by Hyslip, Thomas S.
One Creepy Street: The Spider on the Web by Jordan, Lee
Advances in Audio Watermarking Based on Singular Value Decomposition by Dhar, Pranab Kumar, Shimamura, Tetsuya
Enterprise Identity Management: Towards an Investment Decision Support Approach by Royer, Denis
Foundations of Information Security Based on ISO27001 and ISO27002 - 3rd revised edition by Hintzbergen, Kees, Smulders, André, Hintzbergen, Jule
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family by Claypoole, Ted, Payton, Theresa
Intelligence and Security Informatics: Pacific Asia Workshop, Paisi 2015, Ho CHI Minh City, Vietnam, May 19, 2015. Proceedings by
Foundations and Practice of Security: 7th International Symposium, Fps 2014, Montreal, Qc, Canada, November 3-5, 2014. Revised Selected Papers by
Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare by
Agile Information Security: Using Scrum to Survive in and Secure a Rapidly Changing Environment by Fitzer, James R.
Hacking: Hacking Essentials, What You Must Know About Hacking by Boy, Hacking
Counterterrorism and Cybersecurity: Total Information Awareness by Lee, Newton
Information Security Practice and Experience: 11th International Conference, Ispec 2015, Beijing, China, May 5-8, 2015, Proceedings by
Cyber Warfare: Building the Scientific Foundation by
What Happens on Campus Stays on YouTube: The NEW rules for your reputation on campus, online, and beyond. by Brown, Paul Gordon, Meriwether, Jason L., O'Connell, Courtney
Aspect-Oriented Security Hardening of UML Design Models by Debbabi, Mourad, Mouheb, Djedjiga, Pourzandi, Makan
Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field by O'Gara, Adrian
Securing SQL Server: Protecting Your Database from Attackers by Cherry, Denny
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques by Chauhan, Sudhanshu, Panda, Nutan Kumar
The Tao of Open Source Intelligence by Bertram, Stewart
My Password Vault: All Your Passwords In One Place by Sargent, Sans
Password Keeper by Speedy Publishing LLC
Password Journal by Speedy Publishing LLC
My Password Journal by Speedy Publishing LLC
Cybersecurity Information Sharing Act of 2015 by Select Committee on Intelligence
Transactions on Data Hiding and Multimedia Security X by
Beyond Cybersecurity: Protecting Your Digital Business by O'Halloran, Derek, Kaplan, James M., Bailey, Tucker
Pattern and Security Requirements: Engineering-Based Establishment of Security Standards by Beckers, Kristian
Secret Password Journal by Speedy Publishing LLC
Cyber Attack Information System: Erfahrungen Und Erkenntnisse Aus Der Ikt-Sicherheitsforschung by
Learning Android Forensics by Tindall, Donnie, Tamma, Rohit
New Threats and Countermeasures in Digital Crime and Cyber Terrorism by
Encyclopedia of Biometrics by
Remember!: Your Simple Solution to Keeping & Organizing Passwords (small size edition) by Schultz, V. J.
Spam Nation: The Inside Story of Organized Cybercrime--From Global Epidemic to Your Front Door by Krebs, Brian
Password Journal and Website Keeper by Speedy Publishing LLC
Website Address Book by Speedy Publishing LLC
Codes, Cryptology, and Information Security: First International Conference, C2si 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thi by
JIRA Essentials - Third Edition by Li, Patrick
Two-Factor Authentication by Stanislav, Mark
Fast Software Encryption: 21st International Workshop, Fse 2014, London, Uk, March 3-5, 2014. Revised Selected Papers by
A Guide to Enterprise Networking Technology: Volume 1 by Devaraj, Manju
Risks and Security of Internet and Systems: 9th International Conference, Crisis 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers by
Smart Grid Security by Hong, Yuan, Papakonstantinou, Vagelis, Goel, Sanjay
Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger by Lawrence, Eric
Leakage Resilient Password Systems by Deng, Robert H., Li, Yingjiu, Yan, Qiang
Official (ISC)2(R) Guide to the CISSP(R)-ISSMP(R) CBK(R) by Steinberg, Joseph
Self- And Co-Regulation in Cybercrime, Cybersecurity and National Security by Callanan, Cormac, Tropina, Tatiana
Data Security: Examining Efforts to Protect Americans' Financial Information by Subcommittee on Financial Institutions a.
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying by Henderson, Lance
Trust Management IX: 9th Ifip Wg 11.11 International Conference, Ifiptm 2015, Hamburg, Germany, May 26-28, 2015, Proceedings by
Advanced Dpa Theory and Practice: Towards the Security Limits of Secure Embedded Circuits by Peeters, Eric
Digital and Software Piracy: A Selective Annotated Bibliography of Dissertations and Theses by Angelini, Zander
Quantum Attacks on Public-Key Cryptosystems by Yan, Song Y.
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats by Williams, Chris K., Donaldson, Scott, Siegel, Stanley
Securing Systems: Applied Security Architecture and Threat Models by Schoenfield, Brook S. E.
Information Security Education Across the Curriculum: 9th Ifip Wg 11.8 World Conference, Wise 9, Hamburg, Germany, May 26-28, 2015, Proceedings by
Hacking: Basic Security, Penetration Testing and How to Hack by Sharpe, Isaac
ICT Systems Security and Privacy Protection: 30th Ifip Tc 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings by
Policies and Research in Identity Management: Third Ifip Wg 11.6 Working Conference, Idman 2013, London, Uk, April 8-9, 2013, Proceedings by
Hacking: Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide by Spivak, Walter
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis by Morana, Marco M., Ucedavelez, Tony
Hacking: Ultimate Hacking for Beginners, How to Hack by McKinnon, Andrew
Nmap Essentials by Shaw, David
VMware vSphere Essentials by Kumar, Kunal
Datensicherheit und Datenschutz im Cloud Computing. Fallstudie und kritische Analyse: Dropbox und JiffyBox by Michl, Johannes
Future Network Systems and Security: First International Conference, Fnss 2015, Paris, France, June 11-13, 2015, Proceedings by
Protecting Privacy in Data Release by Livraga, Giovanni
The Theory and Reality of Wireless LAN Security: Final Year project by Halapacz, Tomasz
Cyber-Physical Attacks: A Growing Invisible Threat by Loukas, George
Hacking Into Thinking Machines by Sawarkar, Yash Mahesh
Intelligent Mechanisms for Network Configuration and Security: 9th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and by
Information Security and Privacy: 20th Australasian Conference, Acisp 2015, Brisbane, Qld, Australia, June 29 -- July 1, 2015, Proceedings by
Digital-Forensics and Watermarking: 13th International Workshop, Iwdw 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers by
Cyber Security: Analytics, Technology and Automation by
The Book on Healthcare IT Volume 2: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology by Scott, James
Forensische Analyse von Flash-Speichern: Bachelorarbeit by Scherer, Daniel
Learning Python Network Programming: Utilize Python 3 to get network applications up and running quickly and easily by Washington, Sam, Sarker, M. Omar Faruque
Malware: Black Book of the Israeli Mossad by Noah, Noah
The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues by Choo, Raymond, Ko, Ryan
Trust Management VII: 7th Ifip Wg 11.11 International Conference, Ifiptm 2013, Malaga, Spain, June 3-7, 2013, Proceedings by
Python Web Penetration Testing Cookbook by Buchanan, Cameron, Mound, Dave, May, Benjamin
Microsoft Dynamics AX 2012 R3 Security by Moustafa, Ahmed Mohamed Rafik
Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan by Bollinger, Jeff, Enright, Brandon, Valites, Matthew
Hacking Secrets: What Hackers don't Want You to Know? by Anonymous
Safe Computing is Like Safe Sex: You have to practice it to avoid infection by Lowe, Richard, Jr.
Data and Applications Security and Privacy XXIX: 29th Annual Ifip Wg 11.3 Working Conference, Dbsec 2015, Fairfax, Va, Usa, July 13-15, 2015, Proceedi by
Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution by Teti, Antonio
Troubleshooting CentOS by Hobson, Jonathan
Managing Online Accounts: Creating, managing, and tracking Internet online accounts by Forlanda, Juancho
See More