• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2020

oh Merde je ne me souviens pas: un organisateur pour tous vos mots de passe by Slipy
Handbook of Computer Networks and Cyber Security: Principles and Paradigms by
Criptomoneda: La guía definitiva para el comercio en criptomonedas (Aprendizaje sistemático acerca de invertir y comerciar en cripto by Rael, Ade
Machine Learning Approaches in Cyber Security Analytics by Thomas, Tony, P. Vijayaraghavan, Athira, Emmanuel, Sabu
Quantum Cryptography and the Future of Cyber Security by
Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part I by
Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part II by
Digital Video and Audio Broadcasting Technology: A Practical Engineering Guide by Fischer, Walter
Administer and Secure Enterprise Linux: Red Hat and CentOS versions 7 and 8 by Technical Academy, Janus, Overton, Russell
Advances in Cyber Security Analytics and Decision Systems by
Security+: A Practitioners Study Guide by Proehl, Lauren, Evenden, David
Darknet Secrets: A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online by Bogachev, Yuri a.
Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe by Rubinoff, Shira
Shit I Can't Remember: Keep track of usernames, passwords, web addresses in one easy & organized location by Books, Family's
Selected Areas in Cryptography - Sac 2019: 26th International Conference, Waterloo, On, Canada, August 12-16, 2019, Revised Selected Papers by
CompTIA Security+ Practice Tests SY0-501: Practice tests in 4 different formats and 6 cheat sheets to help you pass the CompTIA Security+ exam by Neil, Ian
Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social En by Evans, Lester
Cybersecurity: A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z by Lewis, Elijah
Ethical Hacking: A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking by Lewis, Elijah
Unmasking the hacker: demystifying cybercrime by Turner, Amanda-Jane
Unmasking the Hacker: Demystifying Cybercrime by Turner, Amanda-Jane
Cybersecurity For Beginners: Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism by Bogachev, Yuri a.
Hacking For Beginners: Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe by Bogachev, Yuri a.
Protektion 4.0: Das Digitalisierungsdilemma by Müller, Günter
Quality, Reliability, Security and Robustness in Heterogeneous Systems: 15th Eai International Conference, Qshine 2019, Shenzhen, China, November 22-2 by
Cyber Law in Japan by Yanaga, Masao
Cyber Law in Italy by Ziccardi, Giovanni
Hacking With Kali Linux: The Ultimate Guide For Beginners To Hack With Kali Linux. Learn About Basics Of Hacking, Cybersecurity, Wireless Netwo by Solow, Frank
Principles for Cyber Security Operations by Hettema, Hinne
Cybersecurity Engineer I'm Not Arguing I'm Just Explaining Why I'm Right by Quotes, Cybersecurity
Advances in Cyber Security: First International Conference, Aces 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers by
PC Computer Security & Backup Guide: How to Secure & Backup Your PC with Antivirus & Malware Software by Albert, Jon
Certified Cyber Security Operations Manager: Exam Prep Guide by Kaplan, Michael I.
Red Team Development and Operations: A practical guide by Vest, Joe, Tubberville, James
Sicherheit in vernetzten Systemen: 27. DFN-Konferenz by
Digital Transformation for a Sustainable Society in the 21st Century: I3e 2019 Ifip Wg 6.11 International Workshops, Trondheim, Norway, September 18-2 by
Cybersecurity: Essential Guide for Beginners to Learn Basic Methods of Cybersecurity by George, Henry
Black Hat Go: Go Programming for Hackers and Pentesters by Patten, Chris, Kottmann, Dan, Steele, Tom
Blockchain and Trustworthy Systems: First International Conference, Blocksys 2019, Guangzhou, China, December 7-8, 2019, Proceedings by
Emerging Technologies for Authorization and Authentication: Second International Workshop, Etaa 2019, Luxembourg City, Luxembourg, September 27, 2019, by
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und P by Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von Zugangsdaten und PINs by Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von persönlichen Zugangsdaten und PINs by Schutz, Thorsten
Information Security Applications: 20th International Conference, Wisa 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers by
Intrusion Detection: A Data Mining Approach by SenGupta, Nandita, Sil, Jaya
Image and Video Technology: Psivt 2019 International Workshops, Sydney, Nsw, Australia, November 18-22, 2019, Revised Selected Papers by
Quantum Computing for beginners: A Complete beginner's guide to Explain in Easy Way, History, Features, Developments and Applications of New Quantum C by Edwards, Simon
Damn! Login I Forgot!!: Damn! Login I Forgot!! by Publications, Jh
Deep Biometrics by
Risk and the Theory of Security Risk Assessment by Young, Carl S.
Digital Forensics and Incident Response - Second Edition by Johansen, Gerard
Applied Incident Response by Anson, Steve
Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed and Trusted Industry Environment by
Fourth International Congress on Information and Communication Technology: Icict 2019, London, Volume 2 by
Hacking: Fundamentals for Absolute Beginners by Bell, Alexander
I'm Dead, But My Password Is Not by Howard, Josh K.
Informationssicherheit Und Datenschutz Systematisch Und Nachhaltig Gestalten: Eine Kompakte Einführung in Die PRAXIS by Hanschke, Inge
Topics in Cryptology - Ct-Rsa 2020: The Cryptographers' Track at the Rsa Conference 2020, San Francisco, Ca, Usa, February 24-28, 2020, Proceedings by
I'll Never Forget You: Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral Motif by Secure, Sam
Blockchain Development for Finance Projects by Roy, Ishan
Information Security Management Principles: Third edition by Alexander, David, Finch, Amanda
Cryptography Arithmetic: Algorithms and Hardware Architectures by Omondi, Amos R.
Iso/Iec 27701: 2019: An introduction to privacy information management by Shipman, Alan, Watkins, Steve
Shield Your Privacy: 15 Ways To Protect Your Personal Information by Nickerson, Heather
Seguridad en Redes y Sistemas de Comunicación. Teoría y Práctica by Maciá Fernández, Gabriel, García Teodoro, Pedro
Learn to hack from scratch: A hands-on lab based penetration testing experience for beginners to experts with step by step instructions by Anon, A.
What the Heck Is My Password? by Casey, Beth
Quantum Cryptography and the Future of Cyber Security by
Linux Command: A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z by Vance, William
Das große Buch der Passwörter: Vergessen Sie nie wieder ein Passwort. by Journals, Dream Big
Linux for Hackers: A Comprehensive Beginners Guide to the World of Hacking Using Linux by Vance, William
Linux for Hackers: A Comprehensive Beginners Guide to the World of Hacking Using Linux by Vance, William
Linux Command: A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z by Vance, William
Protect Your Identity: Step-by-Step Guide and Workbook by Kerskie, Carrie
Adaptive Autonomous Secure Cyber Systems by
Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm: Trends, Advances, and Future Prospects by Boroojeni, Kianoosh G., Sniatala, Pawel, Amini, M. Hadi
Handbook of Research on Intrusion Detection Systems by
Passwort Manager: Nie wieder Passwort vergessen - Ordne deine Zugangsdaten sicher - Offline auf Papier und immer greifbar by D, Abc by
Cyberwarfare: Targeting America, Our Infrastructure and Our Future by Bell, Larry
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques by Troia, Vinny
The Ethics of Cybersecurity by
J'ai une mémoire de Poisson Rouge carnet de mots de passe pour internautes et informaticiens: Index répertoire - Format pratique - Grande taille de ca by Alphabétique, Répertoire
Cryptocurrencies: An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin Basics Including M by Jones, Herbert
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit dekorativen Blum by Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Narwal Illus by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Eulen Illust by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs - by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von Internet Zugangsdaten und PINs - Mit süßer by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Alpaka Illus by Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von Internet Zugangsdaten und PINs - Mit dek by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs - by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Lama Illustr by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs - by Schutz, Thorsten
Kali Linux: Advanced Methods and Strategies to Learn Kali Linux by Thorpe, Ethan
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Elefanten Il by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Fuchs Illust by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Einhorn Illu by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs - by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten Mit süßer Faultier Illus by Schutz, Thorsten
Implementing Computational Intelligence Techniques for Security Systems Design by
Criptomonedas: Cómo lucrar del bitcoin, ethereum para aprendices (Guía para entender el litecoin, bitcoin y más.) by Mota, Peer
Criptomoneda: Consejos exitosos sobre el comercio en criptomoneda (Una guía completa para invertir e intercambiar en blockchains) by Soliz, Bart
Criptomonedas: Comercio e inversión en bitcoin litecoin y otras más (Métodos de comercio e inversión en bitcoin) by Mora, Pablo
Criptomoneda: Un curso completo de intercambio e inversiones digitales (Aprendizaje sistemático acerca de invertir y comerciar en cr by Baez, Elido
Criptomoneda: La guía definitiva para el comercio en criptomonedas (Haga una gran cantidad de dinero con criptomonedas) by Luna, Jair
The Essential Guide to Cybersecurity for SMBs by Hayslip, Gary
SNMP Mastery by Lucas, Michael W.
SNMP Mastery by Lucas, Michael W.
Information Security and Cryptology - Icisc 2019: 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers by
The Networknomicon, or SNMP Mastery by Alhazred, Abdul, Lucas, Michael W.
Networking Hacking: 2 books in 1: Networking for Beginners, Hacking with Kali Linux: Easy Guide to Learn Cybersecurity, Wireless, LTE, Net by Mach, Dylan
Penetration Testing: Penetration Testing: A Hands-On Guide For Beginners by Wallace, Connor
Information and Communications Security: 21st International Conference, Icics 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers by
Writing a Cybersecurity Accreditation Package: A 21st Century NIST-based & CMMC Roadmap by Russo Cissp-Issap, Mark a.
Spatial Computing by Shekhar, Shashi, Vold, Pamela
Smart Card Research and Advanced Applications: 18th International Conference, Cardis 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selec by
Trusted Computing and Information Security: 13th Chinese Conference, Ctcis 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers by
The World of Hacking: Meet The Digital World by Goyal, Parth
Home-Office und die Bedeutung des arbeitsrechtlichen Datenschutzes für Unternehmen by Hebing, Madlen
Cyber Security of Industrial Control Systems in the Future Internet Environment by
Mastering Linux Security and Hardening by Tevault, Donald a.
Computer Security: Esorics 2019 International Workshops, Iosec, Mstec, and Finsec, Luxembourg City, Luxembourg, September 26-27, 2019, Re by
Computer Security: Esorics 2019 International Workshops, Cybericps, Secpre, Spose, and Adiot, Luxembourg City, Luxembourg, September 26-2 by
Information Security Theory and Practice: 13th Ifip Wg 11.2 International Conference, Wistp 2019, Paris, France, December 11-12, 2019, Proceedings by
Cyber Security of Industrial Control Systems in the Future Internet Environment by
Cyber Warfare - Truth, Tactics, and Strategies by Cunningham, Chase
Game of hacking with terminal: The only way to stop a hacker is to think like one. by Mr N. Ravi Kiran
Ciso Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers by Fitzgerald, Todd
Cross-Cultural Design by Akpem, Senongo
Designing a Hipaa-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events by Thompson, Eric C.
AWS Security Cookbook by Kanikathottu, Heartin
Innovative Security Solutions for Information Technology and Communications: 12th International Conference, Secitc 2019, Bucharest, Romania, November by
Implementing Computational Intelligence Techniques for Security Systems Design by
Qos Routing Algorithms for Wireless Sensor Networks by Kumaraswamy, M., Venugopal, K. R., T, Shiv Prakash
Security Operations in Practice by Sheward, Mike
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting by Debbabi, Mourad, Alrabaee, Saed, Shirani, Paria
Blockchain Cybersecurity, Trust and Privacy by
Data Visualization: Trends and Challenges Toward Multidisciplinary Perception by
Testbeds and Research Infrastructures for the Development of Networks and Communications: 14th Eai International Conference, Tridentcom 2019, Changsha by
Time Override: Prophetic Images from the Future Decoded by Clearfield, Dylan
Comando de Linux: Una guía completa para principiantes para aprender los reinos del comando Linux desde A-Z by Vance, William
Secure Knowledge Management in Artificial Intelligence Era: 8th International Conference, Skm 2019, Goa, India, December 21-22, 2019, Proceedings by
Linux para hackers: Una guía completa para principiantes para el mundo del hackeo utilizando Linux by Vance, William
Cyberkriminalität. Bedeutung, Auswirkungen auf digitalisierte Produktions- und Logistikprozesse und Abwehrmaßnahmen by Danner, Sofie
Notebook: A cute and discrete password book to keep your log in details safe and close at hand at all times (Large Print Edition) by Summers, Faith V.
Cyber Security Practitioner's Guide by
Cyber Security: Essential principles to secure your organisation by Calder, Alan
Cybersecurity Law, Standards and Regulations: 2nd Edition by Schreider, Tari
Coding Theory by
Wsdm'19: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining by Wsdm'19
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), by
Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Windi by
WordPress Security for Webmaster 2020: How to Stop Hackers Breaking into Your Website by Williams, Andy
Digital Forensics and Watermarking: 18th International Workshop, Iwdw 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers by
21st Century Prometheus: Managing Cbrn Safety and Security Affected by Cutting-Edge Technologies by
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, VOL 1 by
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, VOL 2 by
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, VOL 3 by
Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments by Dall'acqua, Luisa, Gironacci, Irene M.
Cyber Security Guide: "Art of Hacking" by Security, The Hard
Wasec: Web Application Security for the everyday software engineer: Everything a web developer should know about application by Nadalin, Alessandro
Kali Linux: 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux by Thorpe, Ethan
Conoce todo sobre Hacking y seguridad de páginas Web by Barbero Muñoz, Carlos a., Ramos Varón, Antonio Ángel
Design and Analysis of Security Protocol for Communication by
Hacking Connected Cars: Tactics, Techniques, and Procedures by Knight, Alissa
The Implant by Ivey, Robert L.
Conoce todo sobre Kali Linux by Santo Orcero, David
Rethinking InfoSec: Thoughts on why today's Information Security doesn't work, and how we can do better. by Van Der Gaast, Greg
Conoce todo sobre Seguridad Digital e Informática by Maíllo Fernández, Juan Andres
Cyber Security in India: Education, Research and Training by
Handbook of Big Data Privacy by
Cyber Law in Bangladesh by Karim, Mohammad Ershadul
Cyber Law in Czech Republic by Čermák, Jiří, Donát, Josef, Polcák, Radim
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), by
Impact of Digital Transformation on Security Policies and Standards by
Codaspy'19: Proceedings of the 2019 International Symposium on Data and Application Security and Privacy by Codaspy'19
Conoce todo sobre Seguridad Informática. Básico by Gómez Vieites, Álvaro
Gray Day Gray Day: My Undercover Mission to Expose America's First Cyber Spy My Undercover Mission to Expose America's First Cyber Spy by O'Neill, Eric
CISSP Guide d'examen tout-en-un -Nouvelle édition- Version Française: Questions pratiques n ° 1 du CISSP - TOUS les domaines du CISSP by Education, G.
Differential Privacy for Dynamic Data by Le Ny, Jerome
Ispd'19: Proceedings of the 2019 International Symposium on Physical Design by Ispd'19
Securing Cloud Services: A pragmatic guide by Newcombe, Lee
Post-Quantum Cryptography: 11th International Conference, Pqcrypto 2020, Paris, France, April 15-17, 2020, Proceedings by
Seguridad Informática - Manual Principiantes: Un excelente manual para acercarse al mundo de la ciberseguridad personal by Ruggero, Placido
Hack Proof Your Business, Volume 2: Featuring 14 IT Experts Nationwide by Tomlinson, Chuck, Brown, Chuck, Bunnell, Bill
Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! by Dodson, Adam
Cybersecurity Attacks - Red Team Strategies by Rehberger, Johann
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership by Carey, Marcus J., Jin, Jennifer
Visual Communication for Cybersecurity by Van Deursen, Nicole
CyberGuardian: A SecureTheVillage Guide for Residents by Krantz, Steve
Cybersecurity for Space: Protecting the Final Frontier by Oakley, Jacob G.
21 oppituntia: Mitä olen oppinut pudottuani Bitcoinin kaninkoloon by
Web Penetration Testing: Step-By-Step Guide by Shatob, Radhi
Handbook of Research on Multimedia Cyber Security by
Foundations and Practice of Security: 12th International Symposium, Fps 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers by
Cryptology for Engineers: An Application-Oriented Mathematical Introduction by Schmied, Robert
Information Security and Cryptology: 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers by
Learn Azure Sentinel: Integrate Azure security with artificial intelligence to build secure cloud systems by Diver, Richard, Bushey, Gary
Cyber Crisis Management: Das Praxishandbuch Zu Krisenmanagement Und Krisenkommunikation by Kaschner, Holger
See More