• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2018

Critical Infrastructure Protection XI: 11th Ifip Wg 11.10 International Conference, Iccip 2017, Arlington, Va, Usa, March 13-15, 2017, Revised Selecte by
Practical Network Scanning by Singh, Ajay
CEH v10: EC-Council Certified Ethical Hacker Complete Training Guide with Practice Labs: Exam: 312-50 by Specialist, Ip
Physical-Layer Security for Cooperative Relay Networks by Zhu, Jia, Zou, Yulong
Mobile and Wireless Technologies 2016 by
ICT Systems Security and Privacy Protection: 31st Ifip Tc 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings by
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation by Petrenko, Sergei
Mastering Metasploit - Third Edition by Jaswal, Nipun
Reconfigurable Cryptographic Processor by Wei, Shaojun, Liu, Leibo, Wang, Bo
Cyber Wars: Hacks That Shocked the Business World by Arthur, Charles
Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities by
Recent Advances in Systems Safety and Security by
Security in Network Coding by Zhang, Peng, Lin, Chuang
Advanced Technologies of Quantum Key Distribution by
Mastering Wireshark 2 by Crouthamel, Andrew
Geometry, Algebra and Applications: From Mechanics to Cryptography by
Privacy-Enhancing Aggregation Techniques for Smart Grid Communications by Lu, Rongxing
Privacy and Identity Management. Time for a Revolution?: 10th Ifip Wg 9.2, 9.5, 9.6/11.7, 11.4, 11.6/Sig 9.2.2 International Summer School, Edinburgh, by
Python Penetration Testing Essentials by Raj, Mohit
Cyber Deception: Building the Scientific Foundation by
Security and Resiliency Analytics for Smart Grids: Static and Dynamic Approaches by Al-Shaer, Ehab, Rahman, Mohammad Ashiqur
Sicherheitsgerichtete Echtzeitsysteme by Konakovsky, Rudolf M., Halang, Wolfgang a.
The Pro-hacker's Guide to Hacking: hacking the right way, the smart way by Mishra, Anuj
Online Hacker Survival Guide: Achieving Online Invisibility for Asset and Reputation Protection by Johnson, Naven
Distributed Applications and Interoperable Systems: 18th Ifip Wg 6.1 International Conference, Dais 2018, Held as Part of the 13th International Feder by
Advanced Computing and Systems for Security: Volume Six by
Advanced Monitoring in P2P Botnets: A Dual Perspective by Karuppayah, Shankar
Cryptology Transmitted Message Protection: From Deterministic Chaos Up to Optical Vortices by Izmailov, Igor, Poizner, Boris, Romanov, Ilia
Trust Management X: 10th Ifip Wg 11.11 International Conference, Ifiptm 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings by
Some Tutorials In Computer Hacking by Alassouli, Hidaia Mahmood
Forgotten Passwords Here: Internet passwords, addresses and usernames, humorous cover with A-Z index by Johnson, Kay D.
Information Security: Foundations, Technologies and Applications by
Glossary of Cyber Warfare, Cyber Crime and Cyber Security by Wilson, Richard L., Remenyi, Dan
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, Dimva 2018, Saclay, France, June 28-29, 2018, Procee by
Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, Ngct 2017, Dehradun, India, October 30-31, 2017 by
Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, Ngct 2017, Dehradun, India, October 30-31, 2017 by
Information Systems Security and Privacy: Third International Conference, Icissp 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers by
Understanding Social Engineering Based Scams by
Please be the Right Password: Internet passwords, addresses and usernames, humorous cover with A-Z index by Johnson, Kay D.
Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace by Fang, Binxing
Cyber Resilience of Systems and Networks by
Medical Image Watermarking: Techniques and Applications by
Applied Cryptography and Network Security: 16th International Conference, Acns 2018, Leuven, Belgium, July 2-4, 2018, Proceedings by
Cyber-Security of Scada and Other Industrial Control Systems by
Student Data Privacy: Building a School Compliance Program by Attai, Linnette
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence by Furneaux, Nick
Information Security and Privacy: 23rd Australasian Conference, Acisp 2018, Wollongong, Nsw, Australia, July 11-13, 2018, Proceedings by
On Privacy-Preserving Protocols for Smart Metering Systems: Security and Privacy in Smart Grids by Borges de Oliveira, Fábio
Vehicular Cyber Physical Systems: Adaptive Connectivity and Security by Bajracharya, Chandra, Rawat, Danda B.
CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) by Anandh, Vijay, Singh, Glen D., Vinod, Michael
Student Data Privacy: Building a School Compliance Program by Attai, Linnette
Advances in Digital Forensics XII: 12th Ifip Wg 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers by
Digital Watermarking: Techniques and Trends by Vorakulpipat, Chalee, Rosales, Hamurabi Gamboa, Nematollahi, Mohammad Ali
Information Fusion for Cyber-Security Analytics by
Critical Infrastructure Protection X: 10th Ifip Wg 11.10 International Conference, Iccip 2016, Arlington, Va, Usa, March 14-16, 2016, Revised Selected by
Group-Target Tracking by Dong, Zheng-Hong, Geng, Wen-Dong, Wang, Yuan-Qin
Future Network Systems and Security: 4th International Conference, Fnss 2018, Paris, France, July 9-11, 2018, Proceedings by
Social Network Analysis in Predictive Policing: Concepts, Models and Methods by Tayebi, Mohammad A., Glässer, Uwe
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations by Haber, Morey J., Hibbert, Brad
Edge Computing - Edge 2018: Second International Conference, Held as Part of the Services Conference Federation, Scf 2018, Seattle, Wa, Usa, June by
Advances in Knowledge Discovery and Data Mining: 22nd Pacific-Asia Conference, Pakdd 2018, Melbourne, Vic, Australia, June 3-6, 2018, Proceedings, Par by
Cyber Security Cryptography and Machine Learning: Second International Symposium, Cscml 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings by
Valuing Data: An Open Framework by Ray, Dewey E.
Smart Innovations in Communication and Computational Sciences: Proceedings of Icsiccs 2017, Volume 1 by
Web Services - Icws 2018: 25th International Conference, Held as Part of the Services Conference Federation, Scf 2018, Seattle, Wa, Usa, June 25 by
NIST Special Publication 800-37 (rev 1): Guide for Applying the Risk Management Framework to Federal Information Systems by National Institute of Standards and Tech
Advances in Knowledge Discovery and Data Mining: 22nd Pacific-Asia Conference, Pakdd 2018, Melbourne, Vic, Australia, June 3-6, 2018, Proceedings, Par by
The 2016 Dyn DDOS Cyber Attack Analysis: The Attack that Broke the Internet for a Day by Egbo, Sam
Advances in Knowledge Discovery and Data Mining: 22nd Pacific-Asia Conference, Pakdd 2018, Melbourne, Vic, Australia, June 3-6, 2018, Proceedings, Par by
Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence by Choo, Kim-Kwang Raymond, Quick, Darren
Engineering Secure Software and Systems: 10th International Symposium, Essos 2018, Paris, France, June 26-27, 2018, Proceedings by
The pros and cons of modern web application security flaws and possible solutions by Hossain, Shahriat, Mahmud, Kh Ashique
Hands-on Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer by Gaur, Nitin, Desrosiers, Luc, Novotny, Petr
Ethical Hacking: A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking by Smith, Hein, Morrison, Hilary
Privacy and Identity Management. the Smart Revolution: 12th Ifip Wg 9.2, 9.5, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Ispra, Italy, Sept by
Information Security Theory and Practice: 11th Ifip Wg 11.2 International Conference, Wistp 2017, Heraklion, Crete, Greece, September 28-29, 2017, Pro by
Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution by
Practical Web Penetration Testing by Khawaja, Gus
Blockchain - Icbc 2018: First International Conference, Held as Part of the Services Conference Federation, Scf 2018, Seattle, Wa, Usa, June 2 by
Subjective Logic: A Formalism for Reasoning Under Uncertainty by Jøsang, Audun
Information Security Applications: 18th International Conference, Wisa 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers by
Secure Data Deletion by Reardon, Joel
Digital Fingerprinting by
Advances in Human Factors in Cybersecurity: Proceedings of the Ahfe 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, by
The Pro-hacker's Guide to Hacking: hacking the right way, the smart way by Mishra, Anuj
Wireshark 2 Quick Start Guide by Mishra, Charit
Blockchain: 3 Books - The Complete Edition on Bitcoin, Blockchain, Cryptocurrency and How It All Works Together In Bitcoin Mining, by Sebastian, Lee
Big Data Processing Using Spark in Cloud by
Learning Python Web Penetration Testing by Martorella, Christian
Mastering Machine Learning for Penetration Testing by Chebbi, Chiheb
The Science of Biometrics: Security Technology for Identity Verification by Das, Ravindra
CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs: Exam SY0-501 by Specialist, Ip
Multimedia Forensics and Security: Foundations, Innovations, and Applications by
Smart Grids: Security and Privacy Issues by Boroojeni, Kianoosh G., Amini, M. Hadi, Iyengar, S. S.
Etude Approfondie sur l'Usage des Protocoles SSH et Open SSH dans un Man by Kalonji, Roland Nathan
Guidelines for the Use of PIV Credentials in Facility Access: NiST SP 800-116 by National Institute of Standards and Tech
Hands-On Cryptography with Python by Bowne, Samuel
Hands-On Cybersecurity with Blockchain by Gupta, Rajneesh
Extremist Propaganda in Social Media: A Threat to Homeland Security by Erbschloe, Michael
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware by K. a., Monnappa
Trust Management XII: 12th Ifip Wg 11.11 International Conference, Ifiptm 2018, Toronto, On, Canada, July 10-13, 2018, Proceedings by
Mastering Your Introduction to Cyber Security by Redmond, Michael C.
Galois Fields, Linear Feedback Shift Registers and Their Applications by Jetzek, Ulrich
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence by Hassan, Nihad A., Hijazi, Rami
Mastering Your Introduction to Cyber Security by Redmond, Michael C.
Recommendation for Key Establishment Using Symmetric Block Ciphers: NiST SP 800-71 by National Institute of Standards and Tech
Python Scapy Dot11: Python Programming for Wi-Fi pentesters by Hansen, Yago
The Robust Urban Transportation Network Design Problem by Naimi, Alireza
Defending Iot Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time by Hosmer, Chet
What is the Dark Web?: The truth about the hidden part of the internet by Rodgers, Evan J.
High-Performance and Time-Predictable Embedded Computing by
Kryptographie: Grundlagen, Algorithmen, Protokolle by Wätjen, Dietmar
Fundamental Computing Forensics for Africa: A Case Study of the Science in Nigeria by Iorliam, Aamo
Open Source Intelligence Investigation: From Strategy to Implementation by
Smart Grid and Innovative Frontiers in Telecommunications: Third International Conference, Smartgift 2018, Auckland, New Zealand, April 23-24, 2018, P by
Hardware Protection Through Obfuscation by
Hardware IP Security and Trust by
Introduction to Security Reduction by Guo, Fuchun, Susilo, Willy, Mu, Yi
Identity and Access Management for Electric Utilities NIST SP 1800-2a + 2b by National Institute of Standards and Tech
Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography: NiST SP 800-56B Rev 2 by National Institute of Standards and Tech
The Science of Biometrics: Security Technology for Identity Verification by Das, Ravindra
Data and Applications Security and Privacy XXXII: 32nd Annual Ifip Wg 11.3 Conference, Dbsec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings by
Homeland Security and Critical Infrastructure Protection by Baggett, Ryan K., Simpkins, Brian K.
Smart Innovations in Communication and Computational Sciences: Proceedings of Icsiccs 2017, Volume 2 by
Situational Privacy and Self-Disclosure: Communication Processes in Online Environments by Masur, Philipp K.
Hands-On Incident Response and Digital Forensics by Sheward, Mike
Feistel Ciphers: Security Proofs and Cryptanalysis by Nachef, Valerie, Patarin, Jacques, Volte, Emmanuel
CyberSafe: How To Protect Your Online Life - A Simple Guide For Individuals and SME's by Acheampong, Patrick
Security in Computer and Information Sciences: First International Iscis Security Workshop 2018, Euro-Cybersec 2018, London, Uk, February 26-27, 2018, by
The Language of Cybersecurity by
Information Security Practices: Emerging Threats and Perspectives by
Advanced Penetration Testing: Hacking AWS by Knowell, Richard
Game Theory for Security and Risk Management: From Theory to Practice by
Emerging Technologies in Computing: First International Conference, Icetic 2018, London, Uk, August 23-24, 2018, Proceedings by
Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain by Tsirigotis, Anthimos Alexandros
The Human Firewall: Cybersecurity is not just an IT problem by May, Rob
Interoperability, Safety and Security in Iot: Third International Conference, Interiot 2017, and Fourth International Conference, Saseiot 2017, Valenc by
Hybride Testumgebungen Für Kritische Infrastrukturen: Effiziente Implementierung Für It-Sicherheitsanalysen Von Kritis-Betreibern by Leps, Olof
Information Science and Applications 2018: Icisa 2018 by
Advances in Cryptology - Crypto 2018: 38th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2018, Proceedings, Part I by
Information Security Education for a Global Digital Society: 10th Ifip Wg 11.8 World Conference, Wise 10, Rome, Italy, May 29-31, 2017, Proceedings by
It-Risikomanagement Von Cloud-Services in Kritischen Infrastrukturen: Hmd Best Paper Award 2017 by Petrick, Christopher, Teuteberg, Frank, Adelmeyer, Michael
Privacy, Data Protection and Cybersecurity in Europe by
Advances in Cryptology - Crypto 2018: 38th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2018, Proceedings, Part I by
Advances in Cryptology - Crypto 2018: 38th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2018, Proceedings, Part I by
ICT Systems Security and Privacy Protection: 32nd Ifip Tc 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings by
Enabling Technologies for the Internet of Things: Wireless Circuits, Systems and Networks by
Privacy and Identity Management. Facing Up to Next Steps: 11th Ifip Wg 9.2, 9.5, 9.6/11.7, 11.4, 11.6/Sig 9.2.2 International Summer School, Karlstad, by
Threshold Schemes for Cryptographic Primitives: NiSTIR 8214 by National Institute of Standards and Tech
Das Peter Hase Passwortbuch / Passwort Logbuch: Passwort, Passwortbuch, Passwort Logbuch, Account, Login, Zugang, Password keeper and Password reminde by Potter, Elizabeth M., Potter, Beatrix
Advances in Information and Computer Security: 13th International Workshop on Security, Iwsec 2018, Sendai, Japan, September 3-5, 2018, Proceedings by
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time by Saydjari, O. Sami
Practical Industrial Internet of Things Security by Bhattacharjee, Sravani
Engineering Applications of Neural Networks: 19th International Conference, Eann 2018, Bristol, Uk, September 3-5, 2018, Proceedings by
Trust, Privacy and Security in Digital Business: 15th International Conference, Trustbus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings by
Cyberspace: Risks and Benefits for Society, Security and Development by
Reactor Core Monitoring: Background, Theory and Practical Applications by Makai, Mihály, Végh, János
Trust Management XI: 11th Ifip Wg 11.11 International Conference, Ifiptm 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings by
Smart Cards, Tokens, Security and Applications by
Computer Communication, Networking and Internet Security: Proceedings of Ic3t 2016 by
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps by Hsu, Tony
The Peter Rabbit Passwordbook / Password Logbook: Account, Login, Password keeper and Password reminder book, login data, access data, Password file, by Potter, Beatrix, Potter, Elizabeth M.
Learn PfSense - Fundamentals of PfSense 2.4 by Zientara, David
Hands-On Spring Security 5 for Reactive Applications by John, Tomcy
Pro IOS Security and Forensics: Enterprise iPhone and iPad Safety by Butow, Eric
Network Security with pfSense by Aggarwal, Manuj
Hands-On Penetration Testing on Windows by Bramwell, Phil
The Manga Guide to Cryptography by Sato, Shinichi, Mitani, Masaaki, Hinoki, Idero
Social Engineering: The Science of Human Hacking by Hadnagy, Christopher
Internet of Things: Technology, Applications and Standardization by
Data Science and Big Data Analytics: Acm-Wir 2018 by
Security and Privacy in Smart Grid by Abdallah, Asmaa, Shen, Xuemin
Let's Learn Palo Alto NGFW: A Case Study of Checkpoint, Juniper, Cisco, Hacking and Knowing Thyself by John Francis, Joe Antony Sebastin
Security and Cryptography for Networks: 11th International Conference, Scn 2018, Amalfi, Italy, September 5-7, 2018, Proceedings by
Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications by
Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security by
Cybersecurity in Germany by Schallbruch, Martin, Skierka, Isabel
Cybersecurity Best Practices: Lösungen Zur Erhöhung Der Cyberresilienz Für Unternehmen Und Behörden by
Information Technology Control and Audit, Fifth Edition by Otero, Angel R.
Computer Security: 23rd European Symposium on Research in Computer Security, Esorics 2018, Barcelona, Spain, September 3-7, 2018, Proceed by
Advances in User Authentication by Roy, Arunava, Nag, Abhijit, Dasgupta, Dipankar
Blockchain Quick Reference by Chopra, Samanyu, Valencourt, Paul, Hill, Brenn
Fundamentals of Secure System Modelling by Matulevičius, Raimundas
Secondary Liability of Internet Service Providers by
Hackers Exposed: Discover the secret world of cybercrime by Barbosa de Azevedo, Fernando Uilherme
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools by Bhattacharyya, Dhruba K., Kalita, Jugal K., Bhuyan, Monowar H.
Computer Security: 23rd European Symposium on Research in Computer Security, Esorics 2018, Barcelona, Spain, September 3-7, 2018, Proceed by
Information Technology - New Generations: 14th International Conference on Information Technology by
Humans and Machines at Work: Monitoring, Surveillance and Automation in Contemporary Capitalism by
Information Security: 21st International Conference, Isc 2018, Guildford, Uk, September 9-12, 2018, Proceedings by
Advances in Digital Forensics XIII: 13th Ifip Wg 11.9 International Conference, Orlando, Fl, Usa, January 30 - February 1, 2017, Revised Selected Pape by
Internet of Things Security: Fundamentals, Techniques and Applications by
Datenschutz - Konzepte, Algorithmen Und Anwendung: Werkzeuge Zum Datenschutz Im Alltag by Von Rimscha, Markus
Transactions on Large-Scale Data- And Knowledge-Centered Systems XXXVII by
GDPR and Cyber Security for Business Information Systems by Buchanan, William J., Gobeo, Antoni, Fowler, Connor
Agile Security Development Life Cycle (ASDLC): Integrating Security into the System Development Life Cycle by Russo, Mark a.
Framing Privacy in Digital Collections with Ethical Decision Making by Dressler, Virginia
Quantum Computing for High School Students by Billig, Yuly
Cryptography: Theory and Practice by Stinson, Douglas Robert, Paterson, Maura
Quantum Computing for High School Students by Billig, Yuly
See More