• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2019

Information Technology - New Generations: 15th International Conference on Information Technology by
Cyber Security: Power and Technology by
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition by Reiber, Lee
Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 1 by
Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 2 by
Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 3 by
Hands-On IoT Solutions with Blockchain by Moura, Enio, Santos, Maximiliano
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems by
Network Security and Its Impact on Business Strategy by
Wireless Internet: 11th Eai International Conference, Wicon 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings by
Protect Your Online Identity Like Your Virginity by Abhishek Singh Rajpurohit
Smart Micro-Grid Systems Security and Privacy by
Auditando Tus Sistemas de Información e Infraestructura de TI: Programas de Auditoría Práctica / Listas de verificación para Auditores Internos by Ohia, Nwabueze
Cognitive Radio Oriented Wireless Networks: 13th Eai International Conference, Crowncom 2018, Ghent, Belgium, September 18-20, 2018, Proceedings by
Trusted Computing and Information Security: 12th Chinese Conference, Ctcis 2018, Wuhan, China, October 18, 2018, Revised Selected Papers by
Situational Privacy and Self-Disclosure: Communication Processes in Online Environments by Masur, Philipp K.
Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace by Fang, Binxing
Fire Doesn't Innovate: The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks by Boyle, Kip
Critical Infrastructure Security and Resilience: Theories, Methods, Tools and Technologies by
How to Talk to Your Kids About Pornography by Alexander, Dina, Educate and Empower Kids
It Convergence and Security 2017: Volume 2 by
Passwort Logbuch: ...inkl. Austrennseiten/Nachlassseiten zum Aufbewahren für Schließfach, Testament, Anwalt... by Sültz, Renate, Sültz, Uwe H.
Selected Areas in Cryptography - Sac 2018: 25th International Conference, Calgary, Ab, Canada, August 15-17, 2018, Revised Selected Papers by
Sacmat '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies by Sacmat
Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology by Graber, Diana
Emerging Technologies in Data Mining and Information Security: Proceedings of Iemis 2018, Volume 1 by
Cryptographic Security Solutions for the Internet of Things by
Passwort Manager - Logbuch - Safe - Internet & Passwort Organizer: ...inkl. Austrennseiten/Nachlassseiten zum Aufbewahren für Schließfach, Testament, by Wardenga, R. G.
Password Keeper: Save Passwords - Wi-Fi Log-Ins - Software Licenses by Simple Start Guides
Trust Management XII: 12th Ifip Wg 11.11 International Conference, Ifiptm 2018, Toronto, On, Canada, July 10-13, 2018, Proceedings by
Recent Trends in Communication, Computing, and Electronics: Select Proceedings of Ic3e 2018 by
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation by Petrenko, Sergei
Multi-Photon Quantum Secure Communication by El Rifai, Mayssaa, Chan, Kam Wai Clifford, Verma, Pramode K.
Cybercryptography: Applicable Cryptography for Cyberspace Security by Yan, Song Y.
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of Honeythings by
Mastering Ethereum: Building Smart Contracts and DApps by Antonopoulos, Andreas, Wood, Gavin
Information Security and Cryptology - Icisc 2018: 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers by
Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui by Evans, Lester
Security in Computing and Communications: 6th International Symposium, Sscc 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers by
Security and Fault Tolerance in Internet of Things by
Digital Forensics and Watermarking: 17th International Workshop, Iwdw 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings by
Information Security: 17th International Conference, Issa 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers by
Securing Office 365: Masterminding MDM and Compliance in the Cloud by Katzer, Matthew
Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach by
Risks and Security of Internet and Systems: 13th International Conference, Crisis 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers by
Exploring Security in Software Architecture and Design by
Artificial Intelligence and Security Challenges in Emerging Networks by
Foundations of Blockchain by Raj, Koshik
Technology and the Intelligence Community: Challenges and Advances for the 21st Century by
Advanced Computing and Systems for Security: Volume Eight by
Computer Vision - Eccv 2018 Workshops: Munich, Germany, September 8-14, 2018, Proceedings, Part II by
Implementing Azure: Putting Modern DevOps to Use by Klein, Markus, Michalski, Oliver, Klaffenbach, Florian
The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime by Augenbaum, Scott
Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection by Salmani, Hassan
Advances in Digital Forensics XIV: 14th Ifip Wg 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers by
Introduction to Security Reduction by Mu, Yi, Susilo, Willy, Guo, Fuchun
Information and Operational Technology Security Systems: First International Workshop, Iosec 2018, Cipsec Project, Heraklion, Crete, Greece, September by
Python Network Programming by Kathiravelu, Pradeeban, Chou, Eric, Ratan, Abhishek
Mastering Kali Linux for Advanced Penetration Testing - Third Edition: Secure your network with Kali Linux 2019.1 - the ultimate white hat hackers' to by Velu, Vijay Kumar, Beggs, Robert
Blockchain for Business 2019 by Lipovyanov, Peter
Hands-On Cybersecurity for Finance by Aslaner, Milad, Ozkaya, Erdal
Hands-On Penetration Testing with Python by Khan, Furqan
Learning Python for Forensics -Second Edition by Miller, Preston, Bryce, Chapin
Advances in Cyber Security: Principles, Techniques, and Applications by
Practical Security Automation by Hsu, Tony
Hash Crack: Password Cracking Manual by Picolet, Joshua
Secure Networked Inference with Unreliable Data Sources by Vempaty, Aditya, Kailkhura, Bhavya, Varshney, Pramod K.
Computer Security: Esorics 2018 International Workshops, Cybericps 2018 and Secpre 2018, Barcelona, Spain, September 6-7, 2018, Revised S by
Building Digital Experience Platforms: A Guide to Developing Next-Generation Enterprise Applications by Sethii, Sourabhh, Shivakumar, Shailesh Kumar
Testbeds and Research Infrastructures for the Development of Networks and Communities: 13th Eai International Conference, Tridentcom 2018, Shanghai, C by
Cyber Threat Intelligence by
Topics in Cryptology - Ct-Rsa 2019: The Cryptographers' Track at the Rsa Conference 2019, San Francisco, Ca, Usa, March 4-8, 2019, Proceedings by
Reinforcement Learning for Cyber-Physical Systems: With Cybersecurity Case Studies by Qiu, Meikang, Li, Chong
On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence: Themes from Iacap 2016 by
Cybersecurity: Current Writings on Threats and Protection by
Training Law Enforcement Officers by Giovengo, Rick D.
Innovative Security Solutions for Information Technology and Communications: 11th International Conference, Secitc 2018, Bucharest, Romania, November by
Ecml Pkdd 2018 Workshops: Midas 2018 and Pap 2018, Dublin, Ireland, September 10-14, 2018, Proceedings by
Resilience of Cyber-Physical Systems: From Risk Modelling to Threat Counteraction by
Protecting Your Assets: A Cybersecurity Guide for Small Businesses by Schaefer, John a.
Developments in Information Security and Cybernetic Wars by
Parallel and Distributed Computing, Applications and Technologies: 19th International Conference, Pdcat 2018, Jeju Island, South Korea, August 20-22, by
Secure Cloud Transformation: The CIO's Journey by Stiennon, Richard
Happy 37th Birthday Shithead: Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large Print Edition) by Designs, Level Up, Douglas, Karlon
Happy 51st Birthday Shithead: Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large Print Edition) by Designs, Level Up, Douglas, Karlon
Financial Cryptography and Data Security: FC 2018 International Workshops, Bitcoin, Voting, and Wtsc, Nieuwpoort, Curaçao, March 2, 2018, Revised Sele by
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-003 by Parker, Jeff T., Gregg, Michael
Hands-On Blockchain for Python Developers by Kok, Arjuna Sky
Applied Cryptography in .Net and Azure Key Vault: A Practical Guide to Encryption in .Net and .Net Core by Haunts, Stephen
PCI DSS, Breve Guía para el Cumplimiento by Ferrini Fonseca, Dante
Biometric Authentication in Online Learning Environments by
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities by
Network Security and Its Impact on Business Strategy by
Ecml Pkdd 2018 Workshops: Nemesis 2018, Urbreas 2018, Sogood 2018, Iwaise 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 20 by
Hacking With Kali Linux: A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, W by Bradley, Peter
Security in IoT-Enabled Spaces by
5g Enabled Secure Wireless Networks by
Intelligent Multimedia Data Analysis by
The Identity Trade: Selling Privacy and Reputation Online by Draper, Nora A.
Cyber Security: 15th International Annual Conference, Cncert 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers by
Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers by
Adversarial Machine Learning by Joseph, Anthony D., Nelson, Blaine, Rubinstein, Benjamin I. P.
It-Sicherheit Und Datenschutz Im Gesundheitswesen: Leitfaden Für Ärzte, Apotheker, Informatiker Und Geschäftsführer in Klinik Und Praxis by Darms, Martin, Haßfeld, Stefan, Fedtke, Stephen
Security and Data Storage Aspect in Cloud Computing by Sharma, Subhash C., Peddoju, Sateesh K., Deshpande, Prachi S.
Cybersecurity Education for Awareness and Compliance by
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems by
The California Consumer Privacy Act (CCPA) & NIST 800-171: The 2019 Guide for Business Owners SECOND EDITION by Russo Cissp-Issap Ciso, Mark a.
Data Security in Cloud Computing, Volume I by D'Agostino, Giulio
Data Security in Cloud Computing, Volume II by D'Agostino, Giulio
Conversations in Cyberspace by D'Agostino, Giulio
Mastering Identity and Access Management with Microsoft Azure - Second Edition: Empower users by managing and protecting identities and data, 2nd Edit by Nickel, Jochen
Digital Forensics Basics: A Practical Guide Using Windows OS by Hassan, Nihad A.
Datenschutzrechtliche Aspekte Und Der Einsatz Biometrischer Systeme in Unternehmen: Eine Exemplarische Betrachtung Von Systemen Auf Der Grundlage Des by Dotzler, Florian
Hands-On Application Penetration Testing with Burp Suite by Shah, Dhruv, Walikar, Riyaz, Lozano, Carlos a.
Hands-On Penetration Testing with Kali NetHunter by Oriyano, Sean-Philip, Singh, Glen D.
Adaptive Middleware for the Internet of Things: The GAMBAS Approach by Handte, Marcus, Schiele, Gregor, Marrón, Pedro José
Trustworthy Email: NIST Special Publication 800-177 by National Institute of Standards and Tech
21st Century Privacy War: Privacy science that saves families hundreds to millions of dollars, their employer's reputation and even their lives by Ctrl, Info
Machine Learning and Cognitive Science Applications in Cyber Security by
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks by O'Leary, Mike
Internet Password Vault: Store all your websites, usernames and passwords, as well as a wealth of other computer-related information in one con by Magraw, Alley
Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics by Yan, Wei Qi
The Truth Machine: The Blockchain and the Future of Everything by Vigna, Paul, Casey, Michael J.
My Personal's Helper, Where's My Password: Password Log Password Reminder Collect Password Into the Same Book by Bora, Jo
Smart Card Research and Advanced Applications: 17th International Conference, Cardis 2018, Montpellier, France, November 12-14, 2018, Revised Selected by
Auditing Vostri Sistemi Informativi e dell'Infrastruttura IT: Programmi di Audit Pratici / Liste di Controllo per i Revisori Interni by Ohia, Nwabueze
EU Personal Data Protection in Policy and Practice by Custers, Bart, Sears, Alan M., Dechesne, Francien
Professional Red Teaming: Conducting Successful Cybersecurity Engagements by Oakley, Jacob G.
Im Spannungsfeld zwischen informationeller Selbstbestimmung und öffentlicher Sicherheit: Die Quellen-Telekommunikationsüberwachung und Online-Durchsuc by Müller, Julian
Cybersecurity Education for Awareness and Compliance by
Happy 21st Birthday: Discreet Website Password Book with Beautiful Lion Design Makes the Perfect Birthday Gift! Way Better Than a Birthday (Large Print Edition) by Designs, Level Up, Douglas, Karlon
Digital Defense: A Cybersecurity Primer by Pelton, Joseph, Singh, Indu B.
Passive and Active Measurement: 20th International Conference, Pam 2019, Puerto Varas, Chile, March 27-29, 2019, Proceedings by
The Global Cyber-Vulnerability Report by Dumitras, Tudor, Subrahmanian, V. S., Ovelgonne, Michael
How China, Huawei, Zte Steal Private Data? by Noah
2016 Annual Report of Top Cyber Security Incidents by Hyslip, Thomas
Architecture for Blockchain Applications by Staples, Mark, Xu, Xiwei, Weber, Ingo
Constructive Side-Channel Analysis and Secure Design: 10th International Workshop, Cosade 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings by
Ransomware life cycle and how to combat it by Ismail, Haitham
Drone de seguridad para pymes by Rodríguez Hernández, Ramón Alexis
E-Citizens: Toward a New Model of (Inter)Active Citizenry by Ronchi, Alfredo M.
Auditing Uw Windows-Infrastructuur, Intranet En Internetbeveiliging: Een Praktisch Auditprogramma Voor It Assurance-Professionals by Ohia, Nwabueze
Auditing van uw BetaalkaartBrocessen, Systemen en Applicaties: Een Stap voor Stap PCIDSS-conform Auditprogramma: Een Praktische Gids voor Betaalkaartm by Ohia, Nwabueze
Spot-On Encryption Suite: Democratization of Multiple & Exponential Encryption: - Handbook and User Manual as practical software guide with intr by Edwards, Scott, Project, Spot-On Sf Net
Medical Data Privacy Handbook by
NIST 800-171 rev. 1: Post-Secondary Education Cyber-Guidebook by Russo Cissp-Issap Ceh, Mark a.
A Socio-Legal Study of Hacking: Breaking and Remaking Law and Technology by Dizon, Michael Anthony C.
Information Technology for Peace and Security: It Applications and Infrastructures in Conflicts, Crises, War, and Peace by
Blockchain Development with Hyperledger by Desrosiers, Luc, Gaur, Nitin, Baset, Salman a.
Securing Network Infrastructure by Jetty, Sairam, Rahalkar, Sagar
Listening in: Cybersecurity in an Insecure Age by Landau, Susan
Practical Security: Simple Practices for Defending Your Systems by Zabicki, Roman
Internet of Things Security and Data Protection by
Security and Safety Interplay of Intelligent Software Systems: Esorics 2018 International Workshops, Issa 2018 and Csits 2018, Barcelona, Spain, Septe by
Kali Linux - An Ethical Hacker's Cookbook - Second Edition: Practical recipes that combine strategies, attacks, and tools for advanced penetration tes by Sharma, Himanshu
Codes, Cryptology and Information Security: Third International Conference, C2si 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Sa by
Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime by Iorliam, Aamo
Advances in Computer Science and Ubiquitous Computing: CSA & Cute by
Powershell and Python Together: Targeting Digital Investigations by Hosmer, Chet
Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools by Jaswal, Nipun
Graphical Models for Security: 5th International Workshop, Gramsec 2018, Oxford, Uk, July 8, 2018, Revised Selected Papers by
A Pragmatic Introduction to Secure Multi-Party Computation by Evans, David, Kolesnikov, Vladimir, Rosulek, Mike
Regulating New Technologies in Uncertain Times by
Current Trends in Cyber Security by Kent and Du Quenoy, Neil And Irina
The Iot Hacker's Handbook: A Practical Guide to Hacking the Internet of Things by Gupta, Aditya
Handbook of Big Data and Iot Security by
The Cyber Path: The Infrastructure Supporting the Internet Data Flow by Giannelli, Lou
Securing the Cloud: Security Strategies for the Ubiquitous Data Center by Franklin Jr, Curtis, Chee, Brian
Principles of Security and Trust: 8th International Conference, Post 2019, Held as Part of the European Joint Conferences on Theory and Practice of So by
Cissp: A Comprehensive Beginners Guide on the Information Systems Security by Schmidt, Walker
Big Data Privacy Preservation for Cyber-Physical Systems by Errapotu, Sai Mounika, Pan, Miao, Wang, Jingyi
Principi Della Sicurezza Informatica: Become an Ethical Hacker by Compare, Giuseppe
Public-Key Cryptography - Pkc 2019: 22nd Iacr International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, by
Public-Key Cryptography - Pkc 2019: 22nd Iacr International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, by
Industrial Automation with SCADA: Concepts, Communications and Security by K. S. Manoj
Fully Homomorphic Encryption in Real World Applications by Chatterjee, Ayantika, Aung, Khin Mi Mi
Report of The Attorney General's Cyber Digital Task Force: 2018 by Department of Justice
Deviance in Social Media and Social Cyber Forensics: Uncovering Hidden Relations Using Open Source Information (Osinf) by Al-Khateeb, Samer, Agarwal, Nitin
Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism by
Domain Specific High-Level Synthesis for Cryptographic Workloads by Chattopadhyay, Anupam, Khalid, Ayesha, Paul, Goutam
Electronic Crime Scene Investigation: A Guide for First Responders by Department of Justice
Handbook of Research on Medical Data Security for Bioengineers by
Information Security Applications: 19th International Conference, Wisa 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers by
Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities by Swain, Gandharba
Architectures and Frameworks for Developing and Applying Blockchain Technology by
Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications by Haas, Roland E., Möller, Dietmar P. F.
Concurrency Control and Recovery in Oltp Systems: High Scalability and Availability by Guo, Jinwei, Zhou, Aoying, Cai, Peng
Foundations and Practice of Security: 11th International Symposium, Fps 2018, Montreal, Qc, Canada, November 13-15, 2018, Revised Selected Papers by
Developments in Information Security and Cybernetic Wars by
Hacker & Virus Protection - The Complete Guide: Stay protected from Viruses, Trojans, Ransomware and other online threats - Super Easy and Effective G by Jain, Nitin
Anonymize Yourself: The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and Reputation by Drake, Derek, Instafo
Scrm 2.0: 21st Century Supply Chain Risk Management Solutions by Russo Cissp-Issap Itilv3, Mark a.
Blockchain for Distributed Systems Security by
Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies by
Core Data Analysis: Summarization, Correlation, and Visualization by Mirkin, Boris
Blockchain and Clinical Trial: Securing Patient Data by
Advances in Cryptology - Eurocrypt 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, G by
Strategic Security: Forward Thinking for Successful Executives by Perois, Jean
Rewired: Cybersecurity Governance by
Policy-Based Autonomic Data Governance by
See More