• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2016

Information Systems Security and Privacy: First International Conference, Icissp 2015, Angers, France, February 9-11, 2015, Revised Selected Papers by
The Way of the White Hat: Cyber Security Through Penetration Testing by Sanchez, Dennis Paul Nino S.
Bring Your Own Device - Ein Praxisratgeber: Hmd Best Paper Award 2014 by Walter, Thorsten
Security Controls Evaluation, Testing, and Assessment Handbook by Johnson, Leighton
Quantum Computational Number Theory by Yan, Song Y.
Cybersecurity 101: What You Absolutely Must Know! - Volume 1: Learn How Not to be Pwned, Thwart Spear Phishing and Zero Day Exploits, Clo by Scott, James
Cybersecurity 101: What You Absolutely Must Know! - Volume 2: Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Strong Cybersecu by Scott, James
Learning iOS Penetration Testing by Yermalkar, Swaroop
Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare by Ferrari, John H.
Evolution of Cyber Technologies and Operations to 2035 by
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-Based Inter-Model Connections by Domingo-Ferrer, Josep, Sánchez, David, Soria-Comas, Jordi
Absolute Security: Theory and Principles of Socially Secure Communication by Radley, Alan Stuart
Cryptography & Hacking by Tech, Solis
Cryptography & Malware by Tech, Solis
Circuit Engineering & Cryptography by Tech, Solis
Cryptography & CompTIA A+ by Tech, Solis
Circuit Engineering & Malware by Tech, Solis
Innovative Security Solutions for Information Technology and Communications: 8th International Conference, Secitc 2015, Bucharest, Romania, June 11-12 by
Network Security Attacks and Countermeasures by
Hacking & Quality Assurance by Tech, Solis
Hacking & Raspberry Pi 2 by Tech, Solis
Hacking & Comptia A+ by Tech, Solis
Hacking & Malware by Tech, Solis
Cryptography & Raspberry Pi 2 by Tech, Solis
Cryptography & Human-Computer Interaction by Tech, Solis
Cryptography & Robotics by Tech, Solis
Securing an IT Organization through Governance, Risk Management, and Audit by Rainey, James L., III, Sigler, Ken E.
Cryptography & Open Source by Tech, Solis
Cryptography & CompTIA A+ by Tech, Solis
Lightweight Cryptography for Security and Privacy: 4th International Workshop, Lightsec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected by
Malware: Malware Detection & Threats Made Easy! by Tech, Solis
Cyber Security: Second International Symposium, CSS 2015, Coeur d'Alene, Id, Usa, April 7-8, 2015, Revised Selected Papers by
Trustworthy Global Computing: 10th International Symposium, Tgc 2015 Madrid, Spain, August 31 - September 1, 2015 Revised Selected Papers by
Social Engineering: Advanced Topics in Computer Security by Pechar, Virgil
Scareware: Advanced Topics in Computer Security by Halgas, Zachary
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems by Dykstra, Josiah
Cryptography and Information Security in the Balkans: Second International Conference, Balkancryptsec 2015, Koper, Slovenia, September 3-4, 2015, Revi by
The Psychology of Information Security by Zinatullin, Leron
Small Business Cyber Security: Your Customers Can Trust You...Right? by Gilkeson, Tom, Anderson, Adam
Managing Cyber Risk in the Financial Sector: Lessons from Asia, Europe and the USA by
Computational Intelligence, Cyber Security and Computational Models: Proceedings of Icc3 2015 by
Digitale Fernseh- Und Hörfunktechnik in Theorie Und PRAXIS: Mpeg-Quellcodierung Und Multiplexbildung, Analoge Und Digitale Hörfunk- Und Fernsehstandar by Fischer, Walter
The Hacker Ethos: The Beginner's Guide to Ethical Hacking and Penetration Testing by True Demon
IOS Forensics Cookbook by Birani, Bhanu, Birani, Mayank
Collaborative Computing: Networking, Applications, and Worksharing: 11th International Conference, Collaboratecom 2015, Wuhan, November 10-11, 2015, C by
Transactions on Computational Science XXVI: Special Issue on Cyberworlds and Cybersecurity by
Trusted Systems: 6th International Conference, Intrust 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers by
Security and Privacy in Communication Networks: 11th International Conference, Securecomm 2015, Dallas, Tx, Usa, October 26-29, 2015, Revised Selected by
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program by Kovacich, Gerald L.
Malware Diffusion Models for Modern Complex Networks: Theory and Applications by Karyotis, Vasileios, Khouzani, M. H. R.
Cryptography: Cryptography Theory & Practice Made Easy! by Tech, Solis
Secure Your Node.Js Web Application: Keep Attackers Out and Users Happy by Duuna, Karl
Sharing Big Data Safely: Managing Data Security by Dunning, Ted, Friedman, Ellen
Computer Access Control: Federated Identity by Urlanza, Marcellus
Hacking: Hacking For Beginners and Basic Security: How To Hack by Hatcher, Jacob
Malware & Raspberry Pi 2 by Tech, Solis
Malware & Quality Assurance by Tech, Solis
Malware & Open Source by Tech, Solis
Circuit Engineering & Cryptography & Hacking by Tech, Solis
Theory of Cryptography: 13th International Conference, Tcc 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I by
Theory of Cryptography: 13th International Conference, Tcc 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II by
Applied Cryptography and Network Security: 13th International Conference, Acns 2015, New York, Ny, Usa, June 2-5, 2015, Revised Selected Papers by
Topics in Cryptology - Ct-Rsa 2016: The Cryptographers' Track at the Rsa Conference 2016, San Francisco, Ca, Usa, February 29 - March 4, 2016, Proceed by
Malware & Robotics by Tech, Solis
Data Privacy Management, and Security Assurance: 10th International Workshop, Dpm 2015, and 4th International Workshop, Qasa 2015, Vienna, Austria, Se by
Apoc@lypse: O Fim do Antivirus by Winter, Rogerio, Park, Kil, Amatte, Fernando
My Personal Computer Database by Nelson, Sandra
Complete Password Manager by Blank Books, Lazaros'
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Schneier, Bruce
MPLS in the Sdn Era: Interoperable Scenarios to Make Networks Scale to New Services by Monge, Antonio, Szarkowicz, Krzysztof
D/DoS: Denial of Service Attacks by Aquilina, Antonio
Cryptographic Attacks: Computer Security Exploits by Krzewinski, Basil
scam.con by Law, Tom
Preserving Electronic Evidence for Trial: A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation by Rojas, Ernesto F., Zeigler, Ann D.
Injection Exploits: Computer Security Exploits by Barill, Rueben
Industrial Espionage and Technical Surveillance Counter Measurers by Androulidakis, I. I., Kioupakis
Graphical Models for Security: Second International Workshop, Gramsec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers by
Post-Quantum Cryptography: 7th International Workshop, Pqcrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings by
Public-Key Cryptography - Pkc 2016: 19th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2 by
Transactions on Large-Scale Data- And Knowledge-Centered Systems XXIII: Selected Papers from Fdse 2014 by
Transactions on Large-Scale Data- And Knowledge-Centered Systems XXIV: Special Issue on Database- And Expert-Systems Applications by
Robotics + Human-Computer Interaction + Open Source by Fraser, Kenneth
Robotics + Human-Computer Interaction + Raspberry Pi 2 by Fraser, Kenneth
Robotics + Human-Computer Interaction + Cryptography by Fraser, Kenneth
Robotics + Human-Computer Interaction + Hacking by Fraser, Kenneth
Circuit Engineering + Cryptography + Raspberry Pi 2 by Tech, Solis
Hacking + Malware + Comptia A+ by Tech, Solis
Android Application Pentesting Handbook by Huntley, Samuel
Hacking + Malware + Quality Assurance by Tech, Solis
Hacking + Malware + Raspberry Pi 2 by Tech, Solis
Malware + Robotics + Human-Computer Interaction by Tech, Solis
Quality Assurance + Cryptography + Human-Computer Interaction by Tech, Solis
Malware + Robotics + Cryptography by Tech, Solis
Quality Assurance + Cryptography + Raspberry Pi 2 by Tech, Solis
Introduction to Secure Outsourcing Computation by Chen, Xiaofeng
Robotics + Human-Computer Interaction + Malware by Fraser, Kenneth
Robotics + Human-Computer Interaction + Quality Assurance by Fraser, Kenneth
Online Health and Safety: From Cyberbullying to Internet Addiction by Schell, Bernadette H.
Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century by Marion, Nancy E., Hill, Joshua B.
Mastering Kali Linux Wireless Pentesting by Sak, Brian, Reddy, Raghu
Bitcoin Essentials by Szmigielski, Albert
Public-Key Cryptography - Pkc 2016: 19th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2 by
Cryptography and Network Security: Principles and Practice by Stallings, William
Foundations and Practice of Security: 8th International Symposium, Fps 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers by
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters by Weston, J. D. Stephen W., Calhoun, Frederick S.
Implementing Digital Forensic Readiness: From Reactive to Proactive Process by Sachowski, Jason
Security of Block Ciphers: From Algorithm Design to Hardware Implementation by Sasaki, Yu, Li, Yang, Sakiyama, Kazuo
Kali Linux Web Penetration Testing Cookbook by Najera-Gutierrez, Gilberto
Learning Network Forensics by Datt, Samir
The Car Hacker's Handbook: A Guide for the Penetration Tester by Smith, Craig
E-Business and Telecommunications: 12th International Joint Conference, Icete 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers by
Transactions on Large-Scale Data- And Knowledge-Centered Systems XXV by
Federal Cybersecurity Research and Development Strategic Plan: 2016 by National Science and Technology Council
Boolean Functions and Their Applications in Cryptography by Wu, Chuan-Kun, Feng, Dengguo
Information Security Auditor: Careers in Information Security by Goucher, Wendy
A Decade of Lattice Cryptography by Peikert, Chris
Information and Communications Security: 17th International Conference, Icics 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers by
Access Control: Understanding Information Sensitivity by Greening, Marcus R.
Cybersecurity Investments: Decision Support Under Economic Aspects by Beissel, Stefan
Technology and Practice of Passwords: 9th International Conference, Passwords 2015, Cambridge, Uk, December 7-9, 2015, Proceedings by
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools by Chapman, Chris
Privacy Technologies and Policy: Third Annual Privacy Forum, Apf 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers by
Information Security and Cryptology - Icisc 2015: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers by
Smart Card Research and Advanced Applications: 14th International Conference, Cardis 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Paper by
Wirtschaftsspionage: Phänomenologie - Erklärungsansätze - Handlungsoptionen by Fleischer, Dirk
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis by Bair, John, Shavers, Brett
Beobachtungsmöglichkeiten Im Domain Name System: Angriffe Auf Die Privatsphäre Und Techniken Zum Selbstdatenschutz by Herrmann, Dominik
Cisa Certified Information Systems Auditor Study Guide by Cannon, David L.
Big Data Concepts, Theories, and Applications by
Selected Areas in Cryptography - Sac 2015: 22nd International Conference, Sackville, Nb, Canada, August 12-14, 2015, Revised Selected Papers by
The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday by
Guide to Security Assurance for Cloud Computing by
Hacking: Basic Hacking Fundamental Secrets by Dunlop, Steven
Tor and The Dark Net: Remain Anonymous and Evade NSA Spying by Smith, James
Principles of Security and Trust: 5th International Conference, Post 2016, Held as Part of the European Joint Conferences on Theory and Practice of So by
Advances in Cryptology -- Asiacrypt 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland by
Trusted Systems: 7th International Conference, Intrust 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers by
Making Passwords Secure: Fixing the Weakest Link in Cybersecurity by Bonnett, Dovell
Information Security Applications: 16th International Workshop, Wisa 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers by
Critical Information Infrastructures Security: 9th International Conference, Critis 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Pape by
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry by Carvey, Harlan
Is the OPM Data Breach the Tip of the Iceberg? by Subcommittee on Oversight &. Subcommittee
Mastering Wireshark by Mishra, Charit
Intelligence and Security Informatics: 11th Pacific Asia Workshop. Paisi 2016, Auckland, New Zealand, April 19, 2016, Proceedings by
Transactions on Large-Scale Data- And Knowledge-Centered Systems XXVI: Special Issue on Data Warehousing and Knowledge Discovery by
Engineering Secure Software and Systems: 8th International Symposium, Essos 2016, London, Uk, April 6-8, 2016. Proceedings by
Tradecraft Primer: A Framework for Aspiring Interrogators by Topalian, Paul Charles
They Will Do Anything: Identity Theft and Internet Fraud by Staley, Wayne L.
Dynamic Networks and Cyber-Security by
Advanced Penetration Testing for Highly-Secured Environments, Second Edition by Cardwell, Kevin, Allen, Terry Lee
Selling Information Security to the Board, second edtion by Calder, Alan
Digital-Forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers by
Mobile Phone Security and Forensics: A Practical Approach by Androulidakis, Iosif I.
Cyber Threat: The Rise of Information Geopolitics in U.S. National Security by Bronk, Chris
Risks and Security of Internet and Systems: 10th International Conference, Crisis 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Sel by
Cyber-Physical System Design with Sensor Networking Technologies by
The Complete Guide to Cybersecurity Risks and Controls by Shoemaker, Dan, Sigler, Ken E., Kohnke, Anne
Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control by Cerrato, Paul
Progress in Cryptology - Africacrypt 2016: 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings by
Fundamentals of Information Risk Management Auditing by Wright, Christopher
Hacking by Spivak, Walter
Social Media Investigation for Law Enforcement by Brunty, Joshua, Helenek, Katherine
Transactions on Computational Science XXVII by
Decision to Attack: Military and Intelligence Cyber Decision-Making by Brantly, Aaron Franklin
Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats? by Subcommittee on Crime and Terrorism of T.
Password Log by Log, My Password
Securing Transactions and Payment Systems for M-Commerce by
Oracle Database 12c Security cookbook by Veselica, Maja, Pavlovic, Zoran
Learning Python for Forensics: Learn the art of designing, developing, and deploying innovative forensic solutions through Python by Miller, Preston, Bryce, Chapin
Information Security: Policy, Processes, and Practices by Goodman, Seymour, Straub, Detmar W., Baskerville, Richard
Hacking Made Easy: Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st Century by Robot, University, Hacking
Einführung in Die Kryptographie by Buchmann, Johannes
Enforcing Privacy: Regulatory, Legal and Technological Approaches by
Software Quality Assurance: Integrating Testing, Security, and Audit by Mahfuz, Abu Sayed
SUSE Linux Enterprise Server 12 - Security Guide by Contributors, Sec Guide
SUSE Linux Enterprise Desktop 12 - Security Guide by Contributors, Sec Guide
Advances in Cryptology - Eurocrypt 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Aust by
Moving Target Defense for Distributed Systems by Shetty, Sachin, Song, Min, Yuchi, Xuebiao
Hacked!: A warning for small business by Lee, Mike, Hitchen, Brian
Pond of Scams by Ayoade, Tolu
Hacking SCADA/Industrial Control Systems: The Pentest Guide by Atkins, Christopher
Practical Linux Security Cookbook by Kalsi, Tajinder
Burners & Black Markets - How to Be Invisible by Henderson, Lance
Open Problems in Network Security: Ifip Wg 11.4 International Workshop, Inetsec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers by
Physical-Layer Security for Cooperative Relay Networks by Zhu, Jia, Zou, Yulong
Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing by Butera, Ann
Information Security and Cryptology: 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers by
OS X Incident Response: Scripting and Analysis by Bradley, Jaron
Mobile and Wireless Technologies 2016 by
Voip and Pbx Security and Forensics: A Practical Approach by Androulidakis, Iosif I.
Handbook of SCADA/Control Systems Security by
Computer Security for The Every Day User: Every day computer security by Magara, Michael E.
IBM i Security Administration and Compliance by Woodbury, Carol
ICT Systems Security and Privacy Protection: 31st Ifip Tc 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings by
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security by
Linux Server Security: Hack and Defend by Binnie, Chris
Innovative Solutions for Access Control Management by
Threat Forecasting: Leveraging Big Data for Predictive Analysis by Pirc, John, Desanto, David, Davison, Iain
Nine Steps to Success: An ISO 27001 Implementation Overview by Clader, Alan
Critical Information Infrastructures Security: 10th International Conference, Critis 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers by
See More