• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2023

The Security & Privacy Acceptance Framework (SPAF) by Das, Sauvik, Faklaris, Cori, Hong, Jason I.
Criptología Digital (Digital Cryptology) by Thomas, Rachael L.
Criptología Digital (Digital Cryptology) by Thomas, Rachael L.
Progress in Cryptology - Indocrypt 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings by
Security Awareness: Applying Practical Cybersecurity in Your World by Ciampa, Mark
Mobile Health Applications: Rechtliche Rahmenbedingungen Von Gesundheits-Apps by Reitebuch, Lukas
Geprüfte Schutz- Und Sicherheitskraft (Ihk): Lehrbuch Für Prüfung Und PRAXIS by Schwarz, Robert
Sachkunde Im Bewachungsgewerbe (Ihk): Lehrbuch Für Prüfung Und PRAXIS by Schwarz, Robert
Algorithmic Bias: Verzerrungen Durch Algorithmen Verstehen Und Verhindern: Ein Leitfaden Für Entscheider Und Data Scientists by Bär, Tobias
Science of Cyber Security - Scisec 2022 Workshops: Ai-Cryptosec, Ta-Bc-Nft, and Mathsci-Qsafe 2022, Matsue, Japan, August 10-12, 2022, Revised Selecte by
Internet of Things - Iciot 2022: 7th International Conference, Held as Part of the Services Conference Federation, Scf 2022, Honolulu, Hi, Usa, Decemb by
Secure It Systems: 27th Nordic Conference, Nordsec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings by
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in Us and UK National Cybersecurity by Montasari, Reza
Cryptography, Codes and Cyber Security: First International Conference, I4cs 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings by
Datenschutz: Einführung in Technischen Datenschutz, Datenschutzrecht Und Angewandte Kryptographie by Ziebarth, Wolfgang, Petrlic, Ronald, Sorge, Christoph
Mobile Application Development: Practice and Experience: 12th Industry Symposium in Conjunction with 18th Icdcit 2022 by
Cybersecurity - Data Protection and Strategies: First Edition by Palmer, Wesley
Cybersecurity - Data Protection and Strategies: First Edition by Palmer, Wesley
Collaborative Approaches for Cyber Security in Cyber-Physical Systems by
Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications by
Emerging Information Security and Applications: Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings by
Space Rogue: How the Hackers Known as L0pht Changed the World by Thomas, Cris
Space Rogue: How the Hackers Known as L0pht Changed the World by Thomas, Cris
Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment by Miller, Richie
Securing Delay-Tolerant Networks with Bpsec by Heiner, Sarah, McKeever, Ken, Birrane, Edward J.
Cybersecurity Design Principles: Building Secure Resilient Architecture by Miller, Richie
CISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance by Miller, Richie
Searchable Encryption: From Concepts to Systems by Ren, Kui, Wang, Cong
CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance by Miller, Richie
Cissp: Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans by Miller, Richie
Archives and Records: Privacy, Personality Rights, and Access by Čtvrtník, Mikulás
Critical Infrastructure Protection XV: 15th Ifip Wg 11.10 International Conference, Iccip 2021, Virtual Event, March 15-16, 2021, Revised Selected Pap by
Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies by Natwick, Dwayne
Archives and Records: Privacy, Personality Rights, and Access by Čtvrtník, Mikulás
Protecting Privacy Through Homomorphic Encryption by
Preference-Based Spatial Co-Location Pattern Mining by Zhou, Lihua, Wang, Lizhen, Fang, Yuan
Wireless Penetration Testing: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and IOS Application Security, and Break Wep by El Fiky, Ahmed Hashem
Connecting the Internet of Things: Iot Connectivity Standards and Solutions by Kumar, Anil, Hussain, Jafer, Chun, Anthony
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World by Simpson, William R., Institute for Defense Analyses, Foltz, Kevin E.
Routledge Companion to Global Cyber-Security Strategy by
Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control by
Security and Organization within IoT and Smart Cities by
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends by Habibi Lashkari, Arash, Sharafaldin, Iman, Kaur, Gurdip
Securing Kubernetes Secrets by Block, Andrew, Bueno, Alex
Asymmetric Cryptography: Primitives and Protocols by Pointcheval, David
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks by Ali, Ikram, Chen, Yong, Faisal, Mohammad
Machine Learning for Cyber Security: 4th International Conference, Ml4cs 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I by
Machine Learning for Cyber Security: 4th International Conference, Ml4cs 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part II by
Machine Learning for Cyber Security: 4th International Conference, Ml4cs 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part III by
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Cambric, Shinesa, Ratemo, Michael
Cybersecurity Jobs: Resume Marketing by Brown, Bruce
Cybersecurity Jobs & Career Paths by Brown, Bruce
Analysis of the BEM Code of Professional Guidelines by Hezam, Bandar
量子通信之殇: 量子通信工程化失败的原因&#21 by Xu, Lingyu
Cybersecurity Essentials Made Easy: A No-Nonsense Guide to Cyber Security For Beginners by Paula, Daniel
Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus by Martínez-Guerra, Rafael, Montesinos-García, Juan Javier, Flores-Flores, Juan Pablo
Security in Smart Home Networks by Zhu, Haojin, Shen, Meng, Yan
Silicon Valley Cybersecurity Conference: Third Conference, Svcc 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers by
Digitale Kompetenz: Grundlagen Der Künstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing Und Deren Anwendungen Für Die Digita by Lang, Volker
The Compliance Formula by Cybersecurity Experts, Leading
Information Technology Law in Australia by Cho, George
Fraud Prevention, Confidentiality, and Data Security for Modern Businesses by
Handbook of Research on Current Trends in Cybersecurity and Educational Technology by
Fraud Prevention, Confidentiality, and Data Security for Modern Businesses by
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio by Hardt, Robert, Pandit, Parth
Secure, Resilient, and Agile Software Development by Merkow, Mark
Cryptoeconomics: Igniting a New Era of Blockchain by Xu, Wei, Gong, Jian
Learn AAVE DeFi Protocol: 100+ Coding Q&A by Cakal, Yasin Hasan
Cryptology: Classical and Modern by Klima, Richard E., Sigmon, Neil P., Klima, Richard
Combinatorics and Number Theory of Counting Sequences by Mezo, Istvan
Secrets of a Cyber Security Architect by Schoenfield, Brook S. E.
Acquiring Card Payments by Dubinsky, Ilya
Cryptography: Theory and Practice by Stinson, Douglas Robert, Paterson, Maura
Introduction to Coding Theory by Bierbrauer, Jurgen
CBAP(R) Certification and BABOK(R) Study Guide by Jonasson, Hans
Windows 11 Datenschutzfibel: Alle Datenschutzeinstellungen finden und optimal einstellen by Gieseke, Wolfram
Compliance Made Easy by Cybersecurity Experts, Leading
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls That Derail Us by Dykstra, Josiah, Spafford, Eugene, Metcalf, Leigh
Así Es Como Me Dicen Que Acabará El Mundo by Perlroth, Nicole
Quantum Computers: A Complete Guide to Explain in Easy Way(Mathematical Principle and Transition to the Classical Discrete) by Price, Carlos
Computer Performance Engineering: 18th European Workshop, Epew 2022, Santa Pola, Spain, September 21-23, 2022, Proceedings by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats to your organization by Rains, Tim
Application Security Program Handbook by Fisher, Derek
Accelerated Linux Core Dump Analysis: Training Course Transcript with GDB and WinDbg Practice Exercises, Third Edition by Software Diagnostics Services, Vostokov
Machine Learning for Cyber Agents: Attack and Defence by Abaimov, Stanislav, Martellini, Maurizio
Trends and Future Directions in Security and Emergency Management by
Social Networking Sites, Body Image and Wellbeing: The Roles of Social by Walker, Mary
Blockchain Beginners: Smart Contracts: A Simple Overview and Guide To Smart Contracts by Lab, Nan00t's
Digital Forensics and Watermarking: 21st International Workshop, Iwdw 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers by
Smart Card Research and Advanced Applications: 21st International Conference, Cardis 2022, Birmingham, Uk, November 7-9, 2022, Revised Selected Papers by
Social Engineering and Digital Defense Survival Guide for the Everyday Person: Tools & Tactics to Protect Your Privacy and Identity from Cybercriminal by Danielson, Henry, Baker, James J.
Netzwerk- Und Datensicherheit: Eine Praktische Einführung by Kappes, Martin
Emerging Technologies for Authorization and Authentication: 5th International Workshop, Etaa 2022, Copenhagen, Denmark, September 30, 2022, Revised Se by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Cyber Security: How to Protect Your Business by Himilsbach, Sven
Handbuch Unternehmenssicherheit: Umfassendes Sicherheits-, Kontinuitäts- Und Risikomanagement Mit System by Müller, Klaus-Rainer
Triangle Mesh Watermarking and Steganography by Chen, Kejiang, Ma, Zehua, Zhou, Hang
Hacking With Kali Linux: The Complete Beginner's Guide about Kali Linux for Beginners (Step by Step Guide to Learn Kali Linux for Hackers) by Lee, Michael
Nordic Artificial Intelligence Research and Development: 4th Symposium of the Norwegian AI Society, Nais 2022, Oslo, Norway, May 31 - June 1, 2022, Re by
Privacy and Safety in Online Learning by
Basics on Public Key Infrastructure (PKI) by Scholtens, A.
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime by Nearchou, Nearchos
Information Security Applications: 23rd International Conference, Wisa 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers by
Security and Privacy in Communication Networks: 18th Eai International Conference, Securecomm 2022, Virtual Event, October 2022, Proceedings by
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies by Parker, Carey
Access Control Models and Architectures for Iot and Cyber Physical Systems by Bhatt, Smriti, Alshehri, Asma Hassan, Gupta, Maanak
Medical Information Processing and Security: Techniques and Applications by
Sicherheit am PC und im Internet: Cyberangriffe erkennen und sich schützen by B, Mark
Fusion of Machine Learning Paradigms: Theory and Applications by
Iapp Cipm Certified Information Privacy Manager Study Guide by Chapple, Mike, Shelley, Joe
Threats: What Every Engineer Should Learn from Star Wars by Shostack, Adam
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back by Schneier, Bruce
Security as Code: Devsecops Patterns with AWS by Chu, Virginia, Das, Bk
Cybersecurity All-In-One for Dummies by Beaver, Kevin, Steinberg, Joseph, Winkler, Ira
The 10 Most Famous Hacks in History (Hardcover Edition) by Kathy, Black Hat
Power Systems Cybersecurity: Methods, Concepts, and Best Practices by
Decision and Game Theory for Security: 13th International Conference, Gamesec 2022, Pittsburgh, Pa, Usa, October 26-28, 2022, Proceedings by
Digital Blood on Their Hands: The Ukraine Cyberwar Attacks by Jenkinson, Andrew
Digital Blood on Their Hands: The Ukraine Cyberwar Attacks by Jenkinson, Andrew
Linux Essentials for Hackers & Pentesters: Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Commands by Advocate Team, Linux
Software Security: Concepts & Practices by Ahmad Khan, Suhel, Kumar, Rajeev, Ahmad Khan, Raees
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures by Windley, Phillip
Trading in Local Energy Markets and Energy Communities: Concepts, Structures and Technologies by
Advanced Communication and Intelligent Systems: First International Conference, Icacis 2022, Virtual Event, October 20-21, 2022, Revised Selected Pape by
Content Distribution for Mobile Internet: A Cloud-Based Approach by Chen, Guihai, Li, Zhenhua, Dai, Yafei
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom by Shoemaker, Tamara, Shoemaker, Daniel, Sigler, Ken
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom by Shoemaker, Tamara, Shoemaker, Daniel, Sigler, Ken
Blockchain for Everyone: A Guide for Absolute Newbies by Herrmann, Noah
Ubiquitous Security: Second International Conference, Ubisec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers by
Metaverse Investing: The Ultimate Guide by Herrmann, Noah
Crypto Investing Guide: The Ultimate Safe and Secure Guide by Herrmann, Noah
Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization by Sehgal, Kunal, Thymianis, Nikolaos
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities by Strout, Benjamin
Computer Security. Esorics 2022 International Workshops: Cybericps 2022, Secpre 2022, Spose 2022, Cps4cip 2022, Cdt&secomane 2022, Eis 2022, and Secas by
Privacy, Security and Forensics in the Internet of Things (Iot) by
Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers by
A Proactive Network Surveillance Framework by Singh, Maninder
IT-Sicherheit by Eckert, Claudia
Privacy in the Digital Age: Digital Communication and Personal Data by
International Conference on Cyber Security, Privacy and Networking (Icspn 2022) by
Certified Information Security Manager Cism Study Guide by Cism
Certified Information Security Manager Cism Study Guide by Cism
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Perlroth, Nicole
Sicheres Homeoffice: Herausforderungen nachhaltiger Sicherheit by Penner, Marco, Karunakumar, Saghana, Keuntje, Jörg-Michael
Countering Domestic Racially and Ethnically Motivated Violent Terrorism on Social Media: Introducing the Racist and Violent Extremist Flock Tool by Tapia, Daniel, Warren, Kristin, Burns, Jacqueline Gardner
Rust for Network Programming and Automation: Learn to Design and Automate Networks, Performance Optimization, and Packet Analysis with low-level Rust by Anderson, Brian
Fundamentals of Physical Memory Analysis: Anniversary Edition by Vostokov, Dmitry, Software Diagnostics Services
Applications of Encryption and Watermarking for Information Security by
Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program by Brown, Jason
Data Privacy Management, Cryptocurrencies and Blockchain Technology: Esorics 2022 International Workshops, Dpm 2022 and CBT 2022, Copenhagen, Denmark, by
Information Retrieval and Natural Language Processing: A Graph Theory Approach by Ghotkar, Archana S., Sonawane, Sheetal S., Mahalle, Parikshit N.
Employee-Centric It: Advancing the Digital Era Through Extraordinary It Experience by Ghibril, Mark
Secure Multimodal Biometric Authentication System Involving Ear, Fingerprint and Voice Recognition in Cloud Computing by Parimala, R.
Parent Handbook for Online Safety: Practical Ideas, Activities, & Information for Your Family by Miller, Dana L. C.
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back by Schneier, Bruce
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide 9th Edition: 9th Edition by Gibson, Darril, Chapple, Mike, Stewart, James Michael
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks by Tevault, Donald a.
Personal Security Data in an Increasingly Digital World by Aldada, Suhaib, Cara, Julia, Mardon, Austin
Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program by Tang, Alan
Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program by Tang, Alan
Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level by Huijbregts, Paul, Anich, Joe, Graves, Justen
Technological Trends in the AI Economy: International Review and Ways of Adaptation by
Cybersecurity for Main Street: Cyber Fit in 21 Days by Westerheim, Ann
Adversarial Machine Learning: Attack Surfaces, Defence Mechanisms, Learning Theories in Artificial Intelligence by Liu, Bo, Sreevallabh Chivukula, Aneesh, Yang, Xinghao
Blockchain for Real World Applications by Garg, Rishabh
Transformations Through Blockchain Technology: The New Digital Revolution by
Cyber Deception: Techniques, Strategies, and Human Aspects by
Behavior-based Authentication to Protect System Services From Malicious Attacks by Muthumanickam, K.
Windows APT Warfare: Identify and prevent Windows APT attacks effectively by Ma, Sheng-Hao
Behavioral Game Theory Analysis of Cybersecurity With Deception and Ids by Aggarwal, Palvi
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs by Torres, Nestor N., Almoailu, Ahmed, Soper, Ryan
Passive and Active Measurement: 24th International Conference, Pam 2023, Virtual Event, March 21-23, 2023, Proceedings by
Recent Innovations in Computing: Proceedings of Icric 2021, Volume 1 by
Security and Privacy in Federated Learning by Yu, Shui, Cui, Lei
Mastering C++ Network Automation: Run Automation across Configuration Management, Container Orchestration, Kubernetes, and Cloud Networking by Barbara, Justin
Mastering Go Network Automation: Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter by Taylor, Ian
Personality and Data Protection Rights on the Internet: Brazilian and German Approaches by
Hardening Windows 11 by Nomer Cissp, Russell D.
The Phantom CISO: Time to step out of the shadow by Zahid, Hisham, Khan, Mishaal
The Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness by Lapointe, Lise
The Technology Doesn't Matter: Prioritizing the People in It Business Alignment by Lockett, Rachel
The Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness by Lapointe, Lise
A-Z Password Book: Individual Letter Tabs to Quickly Access Login Information by Zeitgeist
Cost Estimating Framework for U.S. Marine Corps Joint Cyber Weapons by Wilson, Bradley, Goughnour, Thomas, McKernan, Megan
Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems: Iccces 2022 by
PKI Implementation and Infrastructures by Ashbourn, Julian
PKI Implementation and Infrastructures by Ashbourn, Julian
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family by Claypoole, Ted, Payton, Theresa
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender by Sandbu, Marius
The Book on Testing: For a World that Runs on Software by Rodov, Alex
Privacy and Data Protection in Law Israel by Birnhack, Michael, Rachum-Twaig, Omri
Information Technology Law in India by Fatima, Talat
Privacy and Data Protection Law in Brazil by Pinheiro, Patricia Peck
Mastering Python Network Automation: Automating Container Orchestration, Configuration, and Networking with Terraform, Calico, HAProxy, and Istio by Peters, Tim
Threats: What Every Engineer Should Learn from Star Wars by Shostack, Adam
Establish an Insider Threat Program under NISPOM: What the ITPSO, FSO and NISP Contractors Need to Know by Bennett, Jeffrey W.
Advanced Network Technologies and Intelligent Computing: Second International Conference, Antic 2022, Varanasi, India, December 22-24, 2022, Proceedin by
See More