• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2021

Machine Learning Approaches in Cyber Security Analytics by P. Vijayaraghavan, Athira, Emmanuel, Sabu, Thomas, Tony
SSL/TLS Under Lock and Key: A Guide to Understanding SSL/TLS Cryptography by Schatten, Jeremy, Baka, Paul
Computational Data and Social Networks: 9th International Conference, Csonet 2020, Dallas, Tx, Usa, December 11-13, 2020, Proceedings by
Mastering Python for Networking and Security - Second Edition: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome network by Ortega, José Manuel
Cryptography in the Information Society by Fionov, Andrey, Ryabko, Boris
Mike Meyers' Comptia Security+ Certification Passport, Sixth Edition (Exam Sy0-601) by Dunkerley, Dawn
Comptia Security+ Certification Practice Exams, Fourth Edition (Exam Sy0-601) by Clarke, Glen E., LaChance, Daniel
Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction by Shakarian, Paulo, Alvari, Hamidreza, Shaabani, Elham
It-Prüfung, Datenschutzaudit Und Kennzahlen Für Die Sicherheit: Neue Ansätze Für Die It-Revision by
Chatbots: Aufbau Und Anwendungsmöglichkeiten Von Autonomen Sprachassistenten by Rolf, Christian, Kohne, Andreas, Kleinmanns, Philipp
Technology-Augmented Perception and Cognition by
Fog/Edge Computing for Security, Privacy, and Applications by
Building Decentralized Trust: Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers by
Quantum Cryptography: From Key Distribution to Conference Key Agreement by Grasselli, Federico
The Truth about Social Media by Gulshan, Priyanka
Cybsersecurity Fundamentals 1 by Jony, Tapon Mahamud
Gdpr and Biobanking: Individual Rights, Public Interest and Research Regulation Across Europe by
Machine Learning in Cyber Security: Network Traffic Classification based on Class Weight-based K-NN Classifier (CWK-NN) by Khalife, Jawad, Hijazi, Mohamad Osama
Artificial Intelligence controlling Cyber Security by Odayan, Kershlin
Boolean Functions for Cryptography and Coding Theory by Carlet, Claude
Unhackable: Workbook by Mansour, George
Blockchains for Network Security: Principles, Technologies and Applications by
Mastering Linux Device Driver Development: Write custom device drivers to support computer peripherals in Linux operating systems by Madieu, John
Research Anthology on Artificial Intelligence Applications in Security, VOL 1 by
Research Anthology on Artificial Intelligence Applications in Security, VOL 3 by
Research Anthology on Artificial Intelligence Applications in Security, VOL 4 by
Research Anthology on Artificial Intelligence Applications in Security, VOL 2 by
Combating the Exploitation of Children in Cyberspace: Emerging Research and Opportunities by
Multimedia Security: Algorithm Development, Analysis and Applications by
Information Security and Optimization by
Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de by Kiser, Quinn
Cybersecurity and Legal-Regulatory Aspects by
Viral Bs: Medical Myths and Why We Fall for Them by Yasmin, Seema
How To Crack Bitcoin Wallets For Million Dollar Bounty by Raman, Venkata
Security of Ubiquitous Computing Systems: Selected Topics by
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Espinosa, Christian
Cyberspace Mimic Defense: Generalized Robust Control and Endogenous Security by Wu, Jiangxing
Privacy in Dynamical Systems by
Cyber Security: 17th China Annual Conference, Cncert 2020, Beijing, China, August 12, 2020, Revised Selected Papers by
Introduction to the Darknet: Darknet 101 by Hoffer, Martin
Tor Anonymity Network 101: An Introduction to The Most Private Part of The Internet by Gates, Steven
Business Process Management Workshops: BPM 2020 International Workshops, Seville, Spain, September 13-18, 2020, Revised Selected Papers by
Senior Cyber: Best Security Practices for Your Golden Years by Schober, Craig W., Schober, Scott N.
Senior Cyber: Best Security Practices for Your Golden Years by Schober, Scott N.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) by Freeman, Sarah, Bochman, Andrew A.
How to Destroy Surveillance Capitalism by Doctorow, Cory
Security and Privacy in New Computing Environments: Third Eai International Conference, Spnce 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings by
Blockchain Technology and Application: Third Ccf China Blockchain Conference, Cbcc 2020, Jinan, China, December 18-20, 2020, Revised Selected Papers by
Adversary-Aware Learning Techniques and Trends in Cybersecurity by
Digital Transformation for a Sustainable Society in the 21st Century: I3e 2019 Ifip Wg 6.11 International Workshops, Trondheim, Norway, September 18-2 by
Machine Learning and Intelligent Communications: 5th International Conference, Mlicom 2020, Shenzhen, China, September 26-27, 2020, Proceedings by
Enterprise Information Security Risk Assessment: Practical Guide, Techniques and Tools by Ntemngwa, Celestin
Practical Network Security Monitoring: Using Free Software by Graham, Elizabeth
Intrusion Detection: A Data Mining Approach by Sil, Jaya, SenGupta, Nandita
Smart Blockchain: Third International Conference, Smartblock 2020, Zhengzhou, China, October 23-25, 2020, Proceedings by
Sustainable Communication Networks and Application: Proceedings of Icscn 2020 by
CompTIA Pentest+ (Practice Exams) by Karamagi, Robert
Comptia Security+ Study Guide: Exam Sy0-601 by Chapple, Mike, Seidl, David
AWS Certified Security Study Guide: Specialty (Scs-C01) Exam by Santana, Gustavo A. a., Sapata, Fernando, Neto, Marcello Zillo
Design and Cryptanalysis of Zuc: A Stream Cipher in Mobile Telephony by Roy, Dibyendu, Maitra, Subhamoy, Mukherjee, Chandra Sekhar
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Pro by Grid, Alan
Internet of Things Security: Principles and Practice by Tang, Qinghao, Du, Fan
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Pro by Grid, Alan
Smart Card Research and Advanced Applications: 19th International Conference, Cardis 2020, Virtual Event, November 18-19, 2020, Revised Selected Paper by
Poc or Gtfo, Volume 3 by Laphroaig, Manul
Routledge Companion to Global Cyber-Security Strategy by
Consumer Identity & Access Management: Design Fundamentals by Moffatt, Simon
Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed and Trusted Industry Environment by
Echtzeit 2020: Kommunikationssicherheit Im Internet Der Dinge (Iot) by
Fortigate Security Pocket Guide by Shmueli, Ofer
Game Theory for Cyber Deception: From Theory to Applications by Pawlick, Jeffrey, Zhu, Quanyan
Cryptography Arithmetic: Algorithms and Hardware Architectures by Omondi, Amos R.
Practical Paranoia macOS 11 Security Essentials by Mintz, Marc Louis
Penetration Testing Step By Step Guide by Shatob, Radhi
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Espinosa, Christian
Comptia Security+ Review Guide: Exam Sy0-601 by Stewart, James Michael
Comptia Security+ Practice Tests: Exam Sy0-601 by Seidl, David
Quantum Communication Networks by Boche, Holger, Deppe, Christian, Bassoli, Riccardo
Innovative Security Solutions for Information Technology and Communications: 13th International Conference, Secitc 2020, Bucharest, Romania, November by
Advances in Cyber Security: Second International Conference, Aces 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers by
Adaptive Autonomous Secure Cyber Systems by
Security, Privacy, and Anonymity in Computation, Communication, and Storage: 13th International Conference, Spaccs 2020, Nanjing, China, December 18-2 by
Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm: Trends, Advances, and Future Prospects by Sniatala, Pawel, Amini, M. Hadi, Boroojeni, Kianoosh G.
Constructive Side-Channel Analysis and Secure Design: 11th International Workshop, Cosade 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected by
Practical Paranoia iOS 14 Security Essentials by Mintz, Marc Louis
Security, Privacy, and Anonymity in Computation, Communication, and Storage: Spaccs 2020 International Workshops, Nanjing, China, December 18-20, 2020 by
Information Security and Cryptology - Icisc 2020: 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings by
Digital Forensics and Cyber Crime: 11th Eai International Conference, Icdf2c 2020, Boston, Ma, Usa, October 15-16, 2020, Proceedings by
CMOS Analog IC Design for 5g and Beyond by
Limitations and Future Applications of Quantum Cryptography by
Fault-Tolerant Distributed Transactions on Blockchain by Gupta, Suyash, Hellings, Jelle, Sadoghi, Mohammad
Comptia Security+ Certification Kit: Exam Sy0-601 by Seidl, David, Chapple, Mike
Security in Computing and Communications: 8th International Symposium, Sscc 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers by
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography by Mittelbach, Arno, Fischlin, Marc
Security Essentials by Lavender, Linda K.
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Pro by Grid, Alan
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Pro by Grid, Alan
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK(TM) Framework and open source tools by Costa-Gazcón, Valentina
Digital Forensics and Watermarking: 19th International Workshop, Iwdw 2020, Melbourne, Vic, Australia, November 25-27, 2020, Revised Selected Papers by
Cybersecurity: Learn Information Technology Security: How to Protect Your Data From Hacker Attacks While You are Browsing the Interne by Grid, Alan
Cybersecurity: Learn Information Technology Security: How to Protect Your Data From Hacker Attacks While You are Browsing the Interne by Grid, Alan
Cyber Criminal Profiling by Ravarini, Michela
Ich hacke Technik: Ein Lei[td]faden durch die [hochsichere] Technik des 21. Jahrhunderts by Faithful, Stacey
Data Protection Officer by Johnssén, Filip, Edvardsen, Sofia
Network Penetration Testing by Shatob, Radhi
Cybersecurity ABCs: Delivering awareness, behaviours and culture change by Barker, Jessica, Davis, Adrian, Hallas, Bruce
Cookie Policy. Rechtliche Grundlagen und Bedeutung im Marketing by Anonym
Ocp Oracle Certified Professional Java Se 11 Developer Practice Tests: Exam 1z0-819 and Upgrade Exam 1z0-817 by Selikoff, Scott, Boyarsky, Jeanne
Mastering Veeam Backup & Replication 10: Protect your virtual environment and implement cloud backup using Veeam technology by Childerhose, Chris
Phishing Attacks: Advanced Attack Techniques 2 by Atkins, Christopher
Crafting Test-Driven Software with Python: Write test suites that scale with your applications' needs and complexity using Python and PyTest by Molina, Alessandro
The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks by Calder, Alan
Introduction to Cyber Forensic Psychology: Understanding the Mind of the Cyber Deviant Perpetrators by
Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, Cps4cip 2020, Guildford, Uk, September 18, 2020, Revise by
Guide to Cybersecurity - Part 1: A complete book for Ethical Hackers by Dey, Prashant Kumar
Handbook of Research on Digital Transformation and Challenges to Data Security and Privacy by
Hacking with Kali-Linux: Quick start for beginners by B, Mark
Cryptocurrency: A Beginner's Guide To Understanding And Winning With Fintech by Reznor, Eliot P.
Assembly Language Laboratory Work by Silaghi, Marius
Arithmetic and Algebraic Circuits by Lloris Ruiz, Antonio, Castillo Morales, Encarnación, Parrilla Roure, Luis
Ransomware Revolution: The Rise of a Prodigious Cyber Threat by Ryan, Matthew
Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents by Ozkaya, Erdal
Big Breaches: Cybersecurity Lessons for Everyone by Daswani, Neil, Elbayadi, Moudy
Practical AI for Cybersecurity by Das, Ravi
Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives by Gupta, Brij B., Sahoo, Somya Ranjan
Practical AI for Cybersecurity by Das, Ravi
Foundations and Practice of Security: 13th International Symposium, Fps 2020, Montreal, Qc, Canada, December 1-3, 2020, Revised Selected Papers by
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications by Mehta, Deep
Zero Trust Security: An Enterprise Guide by Chapman, Jerry W., Garbis, Jason
Qos Routing Algorithms for Wireless Sensor Networks by Kumaraswamy, M., Venugopal, K. R., T, Shiv Prakash
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting by Alrabaee, Saed, Debbabi, Mourad, Shirani, Paria
Heterogeneous Cyber Physical Systems of Systems by
Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures by Dahiya, Amrita, Gupta, Brij B.
Cybersecurity Now by Hughes, Fred, McCracken, George, Sachs, Amir
Book of Anonymity by Collective, Anon
Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector by
Practical Paranoia Chromebook Security Essentials by Mintz, Marc Louis
Blockchain Cybersecurity, Trust and Privacy by
Secure It Systems: 25th Nordic Conference, Nordsec 2020, Virtual Event, November 23-24, 2020, Proceedings by
Cybersecurity Lessons from CoVID-19 by Slade, Robert
Data Visualization: Trends and Challenges Toward Multidisciplinary Perception by
Jump-Start Your Soc Analyst Career: A Roadmap to Cybersecurity Success by Rodrick, Jarrett, Wall, Tyler
Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, C by Kiser, Quinn
Network Security and Cryptography by Karamagi, Robert
Hack1ng stories: [Volume 1] by DuBois, Julien
Challenging Online Propaganda and Disinformation in the 21st Century by
Data Protection and Privacy in Healthcare: Research and Innovations by
Cybersecurity Readiness: A Holistic and High-Performance Approach by Chatterjee, Dave
Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Windi by
Password Book With Alphabetical Tabs: Email Address Book with Tabs Alphabetical Password Book Organizer Internet Password Logbook Password Journal by Harrlez, Iris Lorry
Information Security and Cryptology: 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers by
Redes de ordenadores y ciberseguridad: Una guía sobre los sistemas de comunicación, las conexiones a Internet, la seguridad de las redes, protección c by Kiser, Quinn
The Secure Board: How To Be Confident That Your Organisation Is Cyber Safe by Pales, Claire, Leibel, Anna
Sicherheit in vernetzten Systemen: 28. DFN-Konferenz by
Revolutionary Applications of Blockchain-Enabled Privacy and Access Control by
Intelligent Technologies and Applications: Third International Conference, Intap 2020, Gjøvik, Norway, September 28-30, 2020, Revised Selected Papers by
Exclusive M1 Macbook Pro User Guide: An Exhaustive Step By Step Guide in Mastering the New Apple M1 Chip with MacOS Big Sur by Eleazar, Michael
Palo Alto Cortex XSOAR: A Practical Guide by Alex, Jithin
Secure Searchable Encryption and Data Management by Mamta, Gupta, Brij B.
The Cyber-Elephant in the Boardroom: Cyber-Accountability with the Five Pillars of Security Framework by Gorge, Mathieu
Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, C by Kiser, Quinn
Blockchain Technology for Iot Applications by
Cybersecurity in the COVID-19 Pandemic by Okereafor, Kenneth
Cyber Security in India: Education, Research and Training by
Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector by
Handbook of Big Data Privacy by
Security by Design: Security Engineering Informationstechnischer Systeme by Lunkeit, Armin, Zimmer, Wolf
Blockchain Technology for Data Privacy Management by
AI and Deep Learning in Biometric Security: Trends, Potential, and Challenges by
Equity of Cybersecurity in the Education System: High Schools, Undergraduate, Graduate and Post-Graduate Studies. by Esin, Joseph O.
Real Fake by Haque, Farid, Watts, Clint
The Doctor's In: Treating America's Greatest Cyber Security Threat by Weinberger, Alan D.
Beginners Guide to Cybersecurity for Senior Citizens: A comprehensive guide to protecting yourself cyber attacks and identity theft in 2021 by Tindall, Mason
Blockchain Technology and Innovations in Business Processes by
Network Programming with Go: Code Secure and Reliable Network Services from Scratch by Woodbeck, Adam
Redes de ordenadores y ciberseguridad: Una guía sobre los sistemas de comunicación, las conexiones a Internet, la seguridad de las redes, protección c by Kiser, Quinn
Computer Vision and Image Processing: 5th International Conference, Cvip 2020, Prayagraj, India, December 4-6, 2020, Revised Selected Papers, Part I by
Concise Encyclopedia of Coding Theory by
Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining by Koshiba, Takeshi, Zolfaghari, Behrouz, Bibak, Khodakhast
Guide To Hacking: Give You Few Of The Most Important Steps Essential To Be A Hacker: How To Hack Smartphones by Deloe, Keeley
Risk Management Framework 2.0 Workbook by Broad, James
Modern Cryptography with Proof Techniques and Implementations by Oun Hwang, Seong, Kim, Intae, Lee, Wai Kong
Hacking Book: Learning A Bit Of Hacking Can Be The Way To Keep Your Network Safe: Basic Concepts Of Hacking by Bainter, Gerri
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition by Kernighan, Brian W.
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition by Kernighan, Brian W.
Steps By Step To Hacker: Focus On Skills And Attitude That Is Required To Become A Hacker: The Basic Of Hacking by Purtlebaugh, Charlie
Cryptographic Methods by Alajlan, Abrar, Razaque, Abdul, Amsaad, Fathi
Cryptographic Methods by Alajlan, Abrar, Razaque, Abdul, Amsaad, Fathi
Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics by Wyant, R. T., Burns, Thomas
Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program by Lyons, Sean
Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard by Susanto, Heru, Almunawar, Mohammad Nabil
Counter Terrorism Issues: Case Studies in the Courtroom by Castagnera, James Ottavio
Digital Forensics for Handheld Devices by Doherty, Eamon P.
Extremist Propaganda in Social Media: A Threat to Homeland Security by Erbschloe, Michael
Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection, Second Edition by Lee, Elsa
Informants, Cooperating Witnesses, and Undercover Investigations: A Practical Guide to Law, Policy, and Procedure, Second Edition by Fitzgerald, Dennis G.
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition by Sachowski, Jason
Routledge Handbook of South Asian Criminology by
Strategic Security: Forward Thinking for Successful Executives by Perois, Jean
Private Investigation and Homeland Security by Benny, Daniel J.
See More