• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2018

Cybertwists: Hacking and Cyberattacks Explained by Hudson, Richard Paul
Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far by Demopoulos, Ted
Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (Ibac) by Almehmadi Phd, Abdulaziz M.
Digital Forensics and Cyber Crime: 9th International Conference, Icdf2c 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings by
Smart Trends in Systems, Security and Sustainability: Proceedings of Ws4 2017 by
Selected Areas in Cryptography - Sac 2017: 24th International Conference, Ottawa, On, Canada, August 16-18, 2017, Revised Selected Papers by
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats by Tevault, Donald a.
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 1 by
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 2 by
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 3 by
Dokumentationsmanagement - Basis Für It-Governance: 11 Schritte Zur It-Dokumentation by Reiss, Manuela
Managing Cyber Risk in the Financial Sector: Lessons from Asia, Europe and the USA by
Advanced Penetration Testing: Red Team by Knowell, Richard
Ethical Hacking For Beginners: #hack_ethically #hack_smartly by Rai, Deepanshu
Mobile Internet Security: First International Symposium, Mobisec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers by
CCNA Security Study Guide: Exam 210-260 by McMillan, Troy
Security Content Automation Protocol (SCAP) V 1.3 Validation Program: NiSTIR 7511 R5 by National Institute of Standards and Tech
Smart Computing and Communication: Second International Conference, Smartcom 2017, Shenzhen, China, December 10-12, 2017, Proceedings by
Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities by Tripathy, B. K., Baktha, Kiran
Hacking: Le Guide Complet du Débutant àordinateur Piratage et Tests Pénétration by Price, Miles
Hacking: Der Anfänger Leitfaden für Computer Hacking und Penetration Testen by Price, Miles
Hacking: Guía Completa Del Principiante a la Piratería Informática y Pruebas De Penetración by Price, Miles
AD Hoc Networks: 9th International Conference, Adhocnets 2017, Niagara Falls, On, Canada, September 28-29, 2017, Proceedings by
La sicurezza delle informazioni nel contesto evolutivo del binomio comunicazione-informatica by Amato, Nicola
Phishing Attacks: Advanced Attack Techniques by Atkins, Christopher
Lessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure by Viira, Toomas
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers by Sweigart, Al
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms by Tamma, Rohit, Skulkin, Oleg, Mahalik, Heather
Remove Malware, Spyware and Viruses From Your PC: Guide to increase your computer's security and speed by removing malicious viruses, malware, and spy by Mendoza, Hugh
Anomaly Detection Principles and Algorithms by Mehrotra, Kishan G., Mohan, Chilukuri K., Huang, Huaming
Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities by Ng, Alex Chi Keung
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics by Diogenes, Yuri, Ozkaya, Erdal
Smart Card Research and Advanced Applications: 16th International Conference, Cardis 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected by
String Analysis for Software Verification and Security by Bultan, Tevfik, Yu, Fang, Alkhalaf, Muath
Research Advances in Cloud Computing by
An Introduction to Number Theory with Cryptography by Kraft, James, Washington, Lawrence
Security with Go by Leon, John Daniel
Information Security and Cryptology: 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers by
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys by Lucas, Michael W.
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys by Lucas, Michael W.
Surveillance Valley: The Secret Military History of the Internet by Levine, Yasha
Practical Information Security: A Competency-Based Education Course by Alsmadi, Izzat, Burdwell, Robert, Aleroud, Ahmed
Neutralización del ransomware criptográfico mediante un sistema de almacenamiento sincrónico versionado by Martínez García, Holzen Atocha
Deterring Cybertrespass And Securing Cyberspace: Lessons From United States Border Control Strategies by Manjikian, Mary
The Cyber Conundrum: How Do We Fix Cybersecurity? by Chronis, Peter K.
The Beast: a.k.a. IT Security by Cakir, Murat
Fundamental Cyber, Computing and Telephone Security by Uwaya, John
The GnuTLS 3.6.1 Manual by Mavrogiannopoulos, Nikos, Josefsson, Simon
GNU SASL 1.8 Reference Manual by Josefsson, Simon
Romance Scam Survivor: The Whole Sordid Story by Marshall, Jan
Auf Der Spur Der Hacker: Wie Man Die Täter Hinter Der Computer-Spionage Enttarnt by Steffens, Timo
Multidisciplinary Perspectives on Human Capital and Information Technology Professionals by
Foundations and Practice of Security: 10th International Symposium, Fps 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers by
It-Grc-Management - Governance, Risk Und Compliance: Grundlagen Und Anwendungen by
Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet by Cole, Eric
Methoden der Hacker erkennen. Schritt für Schritt erklärt: ... erkennen, abwehren sich schützen by Franke, Swen
Graphical Models for Security: 4th International Workshop, Gramsec 2017, Santa Barbara, Ca, Usa, August 21, 2017, Revised Selected Papers by
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy by White, Kevin
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity by Mukhopadhyay, Mayukh
Advanced Infrastructure Penetration Testing by Chebbi, Chiheb
Metasploit Penetration Testing Cookbook - Third Edition by Agarwal, Monika, Teixeira, Daniel, Singh, Abhinav
Risks and Security of Internet and Systems: 12th International Conference, Crisis 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers by
Blockchain: The Beginners Guide To Understanding The Technology Behind Bitcoin & Cryptocurrency by Caro, Artemis
Passwords: Philology, Security, Authentication by Lennon, Brian
Artificial Intelligence Tools for Cyber Attribution by Shakarian, Paulo, Simari, Gerardo I., Nunes, Eric
Web Penetration Testing with Kali Linux - Third Edition by Najera-Gutierrez, Gilberto
Number-Theoretic Methods in Cryptology: First International Conference, Nutmic 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers by
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors Be Verified? Can an Untrusted Vendor Build Trust Into Electronic Equ by Lysne, Olav
Public-Key Cryptography - Pkc 2018: 21st Iacr International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, Marc by
Public-Key Cryptography - Pkc 2018: 21st Iacr International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, Marc by
Passive and Active Measurement: 19th International Conference, Pam 2018, Berlin, Germany, March 26-27, 2018, Proceedings by
Tor And The Deep Web: The Complete Guide To Stay Anonymous In The Dark Net by Eddison, Leonard
Topics in Cryptology - Ct-Rsa 2018: The Cryptographers' Track at the Rsa Conference 2018, San Francisco, Ca, Usa, April 16-20, 2018, Proceedings by
Dynamic Games for Network Security by He, Xiaofan, Dai, Huaiyu
Sustainable Interdependent Networks: From Theory to Application by
Understanding Your Responsibilities to Meet DOD NIST 800-171 (Gray Version): The Definitive Cybersecurity Contract Guide by Russo, Cissp-Issap Mark a.
Hands-On Networking with Azure by Waly, Mohamed
Psychological and Behavioral Examinations in Cyber Security by
System Security Plan (SSP) Template & Workbook - NIST-based: A Supplement to Blueprint: Understanding Your Responsibilities to Meet NIST 800-171 by Cissp-Issap, Mark a. Russo
Machine Learning and Security: Protecting Systems with Data and Algorithms by Chio, Clarence, Freeman, David
Safety and Security Studies by
Adversary Detection for Cognitive Radio Networks by He, Xiaofan, Dai, Huaiyu
The Secure CIO: How to Hire and retain Great Cyber Security Talent to Protect Your Organisation by Pales, Claire
The Decision to Attack: Military and Intelligence Cyber Decision-Making by Brantly, Aaron Franklin
Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server by Alassouli, Hidaia Mahmooa
Privacy and Data Protection Seals by
Joint Security Management: Organisationsübergreifend Handeln: Mehr Sicherheit Im Zeitalter Von Cloud-Computing, It-Dienstleistungen Und Industrialisie by Von Faber, Eberhard, Behnsen, Wolfgang
Cism Certified Information Security Manager All-In-One Exam Guide [With CD (Audio)] by Gregory, Peter H.
A Comprehensive Guide to 5g Security by
Information Security and Cryptology - Icisc 2017: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected by
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats by Williams, Chris K., Donaldson, Scott E., Siegel, Stanley G.
Animal Biometrics: Techniques and Applications by Singh, Rishav, Kumar, Santosh, Singh, Sanjay Kumar
Privatheit Und Selbstbestimmtes Leben in Der Digitalen Welt: Interdisziplinäre Perspektiven Auf Aktuelle Herausforderungen Des Datenschutzes by
Learn Social Engineering by Ozkaya, Erdal
Inside Radio: An Attack and Defense Guide by Huang, Lin, Yang, Qing
Mobile Ad-Hoc and Sensor Networks: 13th International Conference, Msn 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers by
VMware NSX Cookbook by Wibowo, Bayu, Sangha, Tony
Security with Intelligent Computing and Big-Data Services by
Facebook and Other Looming Privacy Scandals by Uwaya, John
Network Analysis Using Wireshark 2 Cookbook - Second Edition: Practical recipes to analyze and secure your network using Wireshark 2 by Nainar, Nagendra Kumar, Ramdoss, Yogesh, Orzach, Yoram
Cloud Security Automation by Priyam, Prashant
Quantum Computational Number Theory by Yan, Song Y.
Evolution of Cyber Technologies and Operations to 2035 by
Industrial Espionage and Technical Surveillance Counter Measurers by Kioupakis, Androulidakis, I. I.
Information Security For The Rest Of Us by Concepts LLC, Cr3
Security, Privacy and Trust in the Internet of Things by Xiao, Hannan
ABCD of Hacking: The Beginner's Guide by K, Shashank Pai
Methods for Location Privacy: A Comparative Overview by Palamidessi, Catuscia, Chatzikokolakis, Kostantinos, Elsalamouny, Ehab
Advances in Cryptology - Eurocrypt 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Is by
Advances in Cryptology - Eurocrypt 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Is by
Advances in Cryptology - Eurocrypt 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Is by
Technology and the Intelligence Community: Challenges and Advances for the 21st Century by
Post-Quantum Cryptography: 9th International Conference, Pqcrypto 2018, Fort Lauderdale, Fl, Usa, April 9-11, 2018, Proceedings by
Security and Data Reliability in Cooperative Wireless Networks by Hassan, Emad
Automation Support for Security Control Assessments: NISTIR 8011 Vol 3 by National Institute of Standards and Tech
Virtual Private Networks in Theory and Practice by Ashraf, Zeeshan
Comprehensive Security for Data Centers and Mission Critical Facilities: (Including EMP Protection) by Ayala, Luis
Handbook of Research on Network Forensics and Analysis Techniques by
Security and Privacy Management, Techniques, and Protocols by
Progress in Cryptology - Africacrypt 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings by
Blockchain: How Bitcoin and Blockchain Are Reshaping the World of Finance by Connors, K.
Sicherheit Von Webanwendungen in Der Praxis: Wie Sich Unternehmen Schützen Können - Hintergründe, Maßnahmen, Prüfverfahren Und Prozesse by Rohr, Matthias
Boolean Functions and Their Applications in Cryptography by Wu, Chuan-Kun, Feng, Dengguo
Privacy's Blueprint: The Battle to Control the Design of New Technologies by Hartzog, Woodrow
The Science Of Cybersecurity: A Treatise On Communications Security by Radley, Alan
Information and Communications Security: 19th International Conference, Icics 2017, Beijing, China, December 6-8, 2017, Proceedings by
Lattices Applied to Coding for Reliable and Secure Communications by Costa, Sueli I. R., Oggier, Frédérique, Campello, Antonio
Salasanamuistikirja: Muistikirja internetosoitteille ja salasanoille by Mainiot Muistikirjat
Steganography, The World of Secret Communications by Hegarty, Michael T.
Constructive Side-Channel Analysis and Secure Design: 9th International Workshop, Cosade 2018, Singapore, April 23-24, 2018, Proceedings by
Security and Privacy in Communication Networks: 13th International Conference, Securecomm 2017, Niagara Falls, On, Canada, October 22-25, 2017, Procee by
Cyber Weaponry: Issues and Implications of Digital Arms by
Information Technology - New Generations: 15th International Conference on Information Technology by
Handbook of Research on Information Security in Biomedical Signal Processing by
Random Numbers and Computers by Kneusel, Ronald T.
Mathematics and Computing: 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers by
Principles of Security and Trust: 7th International Conference, Post 2018, Held as Part of the European Joint Conferences on Theory and Practice of So by
Réseau Anonyme Tor 101: Une Introduction à la Partie la Plus Privée de l'Internet by Gates, Steven
Hacking Healthcare: Understanding Real World Threats by Konschak, Colin
Cloud Security: Introduction to cloud security and data protection by Jenner, Nate
Windows Security Monitoring: Scenarios and Patterns by Miroshnikov, Andrei
Guide to Computer Forensics and Investigations by Nelson, Bill
Fault Tolerant Architectures for Cryptography and Hardware Security by
Information Operations Army, Navy, Air Force, Marines: FM 3-13, NWP 3-13 and JP 3-13 by Department of Defense
Virtual Private Networks in Theory and Practice by Ashraf, Zeeshan
Solidity Programming Essentials: A beginner's guide to build smart contracts for Ethereum and blockchain by Modi, Ritesh
CPTED and Traditional Security Countermeasures: 150 Things You Should Know by Perry, Marianna, Fennelly, Lawrence
Wireless Sensor Networks: Security, Coverage, and Localization by Selmic, Rastko R., Phoha, Vir V., Serwadda, Abdul
Intelligent Techniques in Signal Processing for Multimedia Security by
Moving Target Defense for Distributed Systems by Shetty, Sachin, Yuchi, Xuebiao, Song, Min
The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies by Kshetri, Nir
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications by Wang, Lingyu, Liu, Wen Ming
Enforcing Privacy: Regulatory, Legal and Technological Approaches by
Algebra for Cryptologists by Meijer, Alko R.
Flexible Network Architectures Security: Principles and Issues by Rudra, Bhawana
Managing Threats of Cyber-Attacks on Mobile Devices by Kithome, Anthony
Guide to Security Assurance for Cloud Computing by
Security and Privacy in Communication Networks: Securecomm 2017 International Workshops, Atcs and Sepriot, Niagara Falls, On, Canada, October 22-25, 2 by
Big Data Concepts, Theories, and Applications by
Mobile Phone Security and Forensics: A Practical Approach by Androulidakis, Iosif I.
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python by Khrais, Hussam
Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection by Salmani, Hassan
Administrator Firewall Solutions: Admin instruction for security engineer by Sangwan, Narender
Windows Server 2016 Security, Certificates, and Remote Access Cookbook by Krause, Jordan
Fundamentals of Network Forensics: A Research Perspective by Pilli, Emmanuel S., Joshi, R. C.
Cyber Security: Proceedings of Csi 2015 by
Ten Laws for Security by Diehl, Eric
Security-Aware Design for Cyber-Physical Systems: A Platform-Based Approach by Lin, Chung-Wei, Sangiovanni-Vincentelli, Alberto
Cloud Computing Service Metrics Descriptions: NiST SP 500-307 by National Institute of Standards and Tech
Guide to Industrial Wireless Systems Deployments: NiST AMS 300-4 by National Institute of Standards and Tech
Introduction to Cyberdeception by Rrushi, Julian, Rowe, Neil C.
Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World by Peters, Mark T.
Online Security: protecting your personal information by Skyline
The Hacker Playbook 3: Practical Guide to Penetration Testing by Kim, Peter
Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging by Quick, Darren, Choo, Kim-Kwang Raymond
Hacking: Hacking Essentials, Learn the basics of Cyber Security and Hacking by Nastase, Ramon
Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing by
Wireless Network Security: Second Edition by Osterhage, Wolfgang
Cybersecurity Program Development for Business: The Essential Planning Guide by Moschovitis, Chris
Security and Privacy in Smart Sensor Networks by
Mastering pfSense - Second Edition: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 by Zientara, David
Mobile Networks and Management: 9th International Conference, Monami 2017, Melbourne, Australia, December 13-15, 2017, Proceedings by
Management of Information Security, Loose-Leaf Version by Whitman, Michael E., Mattord, Herbert J.
Physical Layer Security in Wireless Cooperative Networks by Wang, Li
Guíaburros Ciberseguridad: Consejos para tener vidas digitales más seguras by Valle, Mónica
Nist 800-171: "beyond Dod: Helfen Bei Der Neuen Bundesweiten Cyber Security Requirements by Russo Cissp-Issap, Mark a.
Cyber Threat Intelligence by
Hacking: 2 Livres En 1: Le Guide Complet Du Débutant Pour Apprendre Le Hacking Éthique Avec Python Avec Des Exemples Pratiques by Price, Miles
Hacking: 2 Bücher in 1: Der Vollständige Anfängerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen Beispielen by Price, Miles
Hacking: 2 Libros En 1: La Guía Completa Para Principiantes De Aprendizaje De Hacking Ético Con Python Junto Con Ejemplos Práct by Price, Miles
Cybercrime and Digital Forensics by
Modern Cryptography and Computational Number Theory by
Der Grundsatz Der Verfügbarkeit: Ziel, Rechtsstand Und Perspektiven Des Strafrechtlichen Informationsaustauschs in Der Europäischen Union by Schmidt, Magdalena
Hacking: 3 Books in 1: The Beginner's Complete Guide to Computer Hacking and Penetration Testing & The Complete Beginner's Guid by Price, Miles
Advanced Computing and Systems for Security: Volume Five by
Honeypot Frameworks and Their Applications: A New Framework by Xiang, Yang, Ng, Chee Keong, Pan, Lei
Learn Red - Fundamentals of Red by Balbaert, Ivo
Designing Usable and Secure Software with Iris and Cairis by Faily, Shamal
Cyber Security: Power and Technology by
Critical Infrastructure Protection XI: 11th Ifip Wg 11.10 International Conference, Iccip 2017, Arlington, Va, Usa, March 13-15, 2017, Revised Selecte by
See More