• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2024

Python Programming for Cybersecurity: A Comprehensive Handbook for Beginners by Bytebazzar Publications
Comptia Security+ Guide to Network Security Fundamentals by Ciampa, Mark
Cybersecurity Incident Management Masters Guide: Volume 3 - The Incident Commander by Clark, Colby A.
IT Risk Management: Introduction to the main concepts and processes of IT Risk Management by Zuccari, Fabrizio
Access Control and Security Monitoring of Multimedia Information Processing and Transmission by
The Cybersecurity Spiral of Failure (and How to Break Out of It): Why large firms still struggle with cybersecurity and how to engineer real change dy by Gaillard, Jean-Christophe
Malware Reverse Engineering: Cracking The Code by Botwright, Rob
Critical Infrastructure Protection XVII: 17th Ifip Wg 11.10 International Conference, Iccip 2023, Arlington, Va, Usa, March 13-14, 2023, Revised Selec by
Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security by Botwright, Rob
Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research by Mannheimer, Sara
Mobile Application Development: Practice and Experience: 12th Industry Symposium in Conjunction with 18th Icdcit 2022 by
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in Us and UK National Cybersecurity by Montasari, Reza
Handbook of Face Recognition by
Frontiers in Cyber Security: 6th International Conference, Fcs 2023, Chengdu, China, August 21-23, 2023, Revised Selected Papers by
Privacy Symposium 2023: Data Protection Law International Convergence and Compliance with Innovative Technologies (Dplicit) by
Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions by
Symmetric Cryptography, Volume 1: Design and Security Proofs by
Cybersecurity for Modern Smart Grid Against Emerging Threats by Chen, Yao, Roomi, Muhammad M., Mashima, Daisuke
Collaborative Approaches for Cyber Security in Cyber-Physical Systems by
Das Ddr-Chiffriergerät T-310: Kryptographie Und Geschichte by Stephan, Winfried, Killmann, Wolfgang
Emerging Information Security and Applications: 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings by
OSINT Cracking Tools: Maltego, Shodan, Aircrack-Ng, Recon-Ng by Botwright, Rob
Ccsp for Dummies: Book + 2 Practice Tests + 100 Flashcards Online by Deane, Arthur J.
Security, Privacy, and Applied Cryptography Engineering: 13th International Conference, Space 2023, Roorkee, India, December 14-17, 2023, Proceedings by
Cognitive Computing - ICCC 2023: 7th International Conference Held as Part of the Services Conference Federation, Scf 2023 Shenzhen, China, December 1 by
Defense In Depth: Network Security And Cyber Resilience by Botwright, Rob
Cyber Security Blueprint: Your Definitive Guide to Launching a Successful Career by Shaik, Afrin
Ultimate Splunk for Cybersecurity by Sinha, Jit
OSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre by Botwright, Rob
Searchable Encryption: From Concepts to Systems by Wang, Cong, Ren, Kui
Social Media Monetization Handbook: Leveraging Your Online Presence to Turn Likes and Followers into Income by Robson, Carl
Mastering Active Directory Attacks: Exploitation and Defense by Álvarez, Gabriel
Kali Linux CLI Boss: Novice To Command Line Maestro by Botwright, Rob
Artificial Intelligence Ethics and International Law -: Practical Approaches to AI Governance by Abhivardhan
Becoming a Computational Thinker: Success in the Digital Age by Wang, Paul S.
Ethisches Hacken: Ein umfassendes Einsteigerbuch Leitfaden zum Erlernen der effektiven Strategien des ethischen Hackings by Lewis, Elijah
Becoming a Computational Thinker: Success in the Digital Age by Wang, Paul S.
Building a Cyber Risk Management Program: Evolving Security for the Digital Age by Bapst, Brandon, Allen, Brian, Hicks, Terry
Azure Security by Magusic, Bojan
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data by Lee, Micah
Information Security Applications: 24th International Conference, Wisa 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers by
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
OWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks by Botwright, Rob
Continuous Biometric Authentication Systems: An Overview by Smith-Creasey, Max
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends by Sharafaldin, Iman, Kaur, Gurdip, Habibi Lashkari, Arash
Comptia Security+ Practice Tests: Exam Sy0-701 by Seidl, David
Comptia Security+ Certification Kit: Exam Sy0-701 by Chapple, Mike, Seidl, David
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Cryptocoding Based on Quasigroups by Popovska-Mitrovikj, Aleksandra, Bakeva, Verica, Mechkaroska, Daniela
PCI DSS Bootcamp The A-Z Information Security Guide by Publications, Book Wave
Cyber Security for Next-Generation Computing Technologies by
Pentesting 101: Cracking Gadgets And Hacking Software by Botwright, Rob
Identifying and Mitigating the Security Risks of Generative AI by Barrett, Clark, Boyd, Brad, Bursztein, Elie
Information Security Planning: A Practical Approach by Lincke, Susan
Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms by
Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms by
Lock Picking Techniques: Mastering the Art of Lock Picking Essentials for Beginners: Techniques, Tools, Advanced Locksmithing Skills, High-Secu by C. Holland, Paul
Internet of Things - Iciot 2023: 8th International Conference, Held as Part of the Services Conference Federation, Scf 2023, Shenzhen, China, December by
Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus by Martínez-Guerra, Rafael, Montesinos-García, Juan Javier, Flores-Flores, Juan Pablo
Security in Smart Home Networks by Shen, Meng, Yan, Zhu, Haojin
Oracle Linux Cookbook: Embrace Oracle Linux and master Linux Server management by Benner, Erik, Thomsen, Erik B., Spindel, Jonathan
Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices by Taylor, Andrew
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses by Montasari, Reza
Advanced OSINT Strategies: Online Investigations And Intelligence Gathering by Botwright, Rob
Guide to Computer Network Security by Kizza, Joseph Migga
Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark by Botwright, Rob
Innovative Security Solutions for Information Technology and Communications: 16th International Conference, Secitc 2023, Bucharest, Romania, November by
NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library by Botwright, Rob
Mastering Nessus: A Comprehensive Guide to Cybersecurity Assessment by Arenson, Avyaan
Enhancing Performance, Efficiency, and Security Through Complex Systems Control by
Rust for Blockchain Developers: A Comprehensive Guide to Build Decentralized Apps with Rust Programming by Krum, Jose
Enhancing Performance, Efficiency, and Security Through Complex Systems Control by
Secure Horizons An Introduction to Cybersecurity: Safeguarding the Digital Realm: A Comprehensive Guide to Cybersecurity by Pansuriya P., Harsh Hasmukbhai, Pansuriya, Pansuriya
Mastering Metasploit: A Comprehensive Guide to Cybersecurity Penetration Testing by Aronowitz, Zusman
Trojan Exposed: Cyber Defense And Security Protocols For Malware Eradication by Botwright, Rob
Click and Connect: The Power of Digital Relationship Building by Sreekumar, V. T.
Cyber Wise: An Insight into the World of Cyber Security by Allure, R.
Der Ultimative Leitfaden Zur Automatisierung Mit Zapier: Verwandeln Sie Ihren Arbeitsalltag, maximieren Sie die Produktivität und nutzen Sie die Zukun by Ramirez, Edward R.
Advanced Golang Networking: Build High-Availability, Fault-Tolerant Networks with GO Programming by Krum, Jose
Cybersecurity Risks and Controls: Fundamentals of Organizational Cybersecurity by Messenger
Infinite Possibilities: A Guide to Manifesting Your Dreams by Sreekumar, V. T.
Futuristic e-Governance Security With Deep Learning Applications by
Futuristic e-Governance Security With Deep Learning Applications by
Cybersecurity Risks and Controls: Fundamentals of Organizational Cybersecurity by Messenger
Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage by Chaput, Bob
Unveiling the Core: A Comprehensive Guide to Operating System Design and Implementation: Unveiling the Core: A Comprehensive Journey into by Pansuriya P., Harsh Hasmukbhai
Mastering OpenVAS: A Comprehensive Guide to Cybersecurity Vulnerability Assessment by Hershkowitz, Yaakov
Blockchain: Das Potenzial von Blockchain erkunden: Industrien und darüber hinaus revolutionieren by Lehmann, Maximilian
Weaponizing Cyberspace: Inside Russia's Hostile Activities by Sambaluk, Nicholas Michael
Dora: A guide to the EU digital operational resilience act by Pattison, Andrew
Hіddеn AI Guіdе fоr Bеgіnnеrѕ: AI uѕеѕ techniques from рrоbа by Lee, Billy
Samsung Galaxy A15 Manual for Beginners and Advanced Users: A Simplified User Guide with Tips & Tricks on How to Master the new Samsung Galaxy A15 by William, Jason
Advanced Smart Computing Technologies in Cybersecurity and Forensics by
The Software Developer's Guide to Linux: A practical, no-nonsense guide to using the Linux command line and utilities as a software developer by Sturm, Christian, Cohen, David
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS by Schmitz, Roland, Duplys, Paul
Deterrence in the 21st Century: Statecraft in the Information Age by
Conquiste sua vaga em segurança da informação by Sobiecki, Fabio
Mastering Cybersecurity Ethics: Mastering Cybersecurity and Ethical Hacking: Defense and Offense in the Digital World by Conrad, Julian
Deterrence in the 21st Century: Statecraft in the Information Age by
Global Digital Data Governance: Polycentric Perspectives by
Global Digital Data Governance: Polycentric Perspectives by
Multilevel Modeling of Secure Systems in Qop-ML by Księżopolski, Bogdan
Anti-Spam Techniques Based on Artificial Immune System by Tan, Ying
Touchless Fingerprint Biometrics by Labati, Ruggero Donida, Piuri, Vincenzo, Scotti, Fabio
Azure Penetration Testing: Advanced Strategies For Cloud Security by Botwright, Rob
A Framework for Securing Migrating Agents Using Artificial Neural Networks by Kumar, Pradeep
Ultimate Cyberwarfare for Evasive Cyber Tactics by Tan, Chang
Kubernetes Secrets Handbook: Design, implement, and maintain production-grade Kubernetes Secrets management solutions by XI, Chen, Adams, Rom, Gkatziouras, Emmanouil
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques by Nomani, Qamar
Improving Security, Privacy, and Trust in Cloud Computing by
Triangle Mesh Watermarking and Steganography by Ma, Zehua, Zhou, Hang, Chen, Kejiang
Cybersecurity Fundamentals Explained by MacKay, Brian
Artificial Intelligence Security and Privacy: First International Conference on Artificial Intelligence Security and Privacy, Ais&p 2023, Guangzhou, C by
Artificial Intelligence Security and Privacy: First International Conference on Artificial Intelligence Security and Privacy, Ais&p 2023, Guangzhou, C by
Safe Path: A Comprehensive Guide to Security Guidance and Counseling by Omale, Alhassan Yakubu
Zero Trust Security Demystified: Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient N by Knowings, L. D.
Zero Trust Security Demystified: Your Roadmap to a Resilient Network and Unparalleled Data Protection by Knowings, L. D.
Cybersecurity for Everyone by Franklin, Edward
Kali Linux, Ethical Hacking And Pen Testing For Beginners by Bharat Nishad
Mastering Windows Security: Unveiling Hacking Techniques and Penetration Strategies by Bleich, Eden
NFT Masterclass: Exploring the Digital Future in Art, Investments, and Creativity. by Digitalis, Lex
Red Team, Blue Team: A White Hacking Reference by Kathy, Black Hat
X86 Software Reverse-Engineering, Cracking, and Counter-Measures by Domas, Stephanie, Domas, Christopher
Social Sector - Check What Awaits You by Gorsky, Patrick
CompTIA Cloud+ (Plus) Certification Practice Questions, Answers and Master the Exam by Mills, Jake T.
The IT Auditor's Playbook: Expert Guidance for Auditing & Consulting in the Digital Era by Cohan, Ofek
Legal Developments on Cybersecurity and Related Fields by
Decoding Threat Intelligence: Unveiling Cybersecurity's Hidden Patterns by Damrosch, Tuvya
Fusion of Machine Learning Paradigms: Theory and Applications by
Cybersecurity for Everyone (Hardcover Edition) by Franklin, Edward
Under Pressure: Empowering Cyber Security Incident Responders by Phair, Nigel
Cyber Security Risk Management Essentials: Safeguarding in the Digital Era by Ehrlich, Yonah
Crypto Fundamentals: Unlocking the world of cryptocurrencies: essential concepts and strategies by Stone, Aiden
Defending APIs: Uncover advanced defense techniques to craft secure application programming interfaces by Domoney, Colin
Power Systems Cybersecurity: Methods, Concepts, and Best Practices by
NIST Cloud Security: Cyber Threats, Policies, And Best Practices by Botwright, Rob
AI Powered Data Privacy & Data Protection For Small Businesses by Arefin, Sabira
Cyber Wargaming: Research and Education for Security in a Dangerous Digital World by
Cyber Wargaming: Research and Education for Security in a Dangerous Digital World by
Privacy Computing: Theory and Technology by Li, Fenghua, Li, Hui, Niu, Ben
AI and the Battlefield: Friend or Foe? by Woldemariam, Abebe-Bard Ai
Proceedings of Fifth International Conference on Computer and Communication Technologies: Ic3t 2023, Volume 1 by
Cybersecurity Measures for Logistics Industry Framework by
Cybersecurity Measures for Logistics Industry Framework by
Strengthening Industrial Cybersecurity to Protect Business Intelligence by
Emerging Technologies and Security in Cloud Computing by
A Secured Framework for Enhanced and Efficient Communication in IoT Ecosystem by Saranya, V. S.
Emerging Technologies and Security in Cloud Computing by
Digital Transformation in African SMEs: Emerging Issues and Trends by
Batch Verification of Digital Signatures in IoT by Kittur, Apurva S.
Trading in Local Energy Markets and Energy Communities: Concepts, Structures and Technologies by
Content Distribution for Mobile Internet: A Cloud-Based Approach by Dai, Yafei, Chen, Guihai, Li, Zhenhua
black hat hacking android; using kali linux by Pawar, Veer
Introduction to SBOM and VEX: Software Bill of Materials and Vulnerability Exploitability Exchange by Alrich, Tom
Dawn of Distrust: Technological Threads Weaving a Trustless Society by Maxwell J Aromano
Ethical Hacking and Network Analysis with Wireshark: Exploration of Network Packets for Detecting Exploits and Malware by Sharma, Manish
Facial Recognition in Airports: The Rise of Facial Recognition in Air Travel by Wilson, David
Hidden Traps of the Internet: Building and Protecting Your Online Platform by Mohr, Judy L.
Survival in a Silicon Dawn: Navigating a Hostile A.I. World Takeover by Intelligence, Artificial
Debugging Playbook: System Testing, Error Localization, And Vulnerability Remediation by Botwright, Rob
Selected Areas in Cryptography - Sac 2023: 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers by
Building a Cyber Risk Management Program: Evolving Security for the Digital Age by Allen, Brian, Hicks, Terry Allan, Bapst, Brandon
Advanced Techniques of Artificial Intelligence in It Security Systems by Korytkowski, Marcin
Building a Cyber Risk Management Program: Evolving Security for the Digital Age by Hicks, Terry Allan, Bapst, Brandon, Allen, Brian
Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware by Tobias, Marc Weber
Bent Functions and Permutation Methods: Binary and Multiple-Valued Bent Functions by Stankovic, Milena, Stankovic, Radomir S., Moraga, Claudio
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Grimes, Roger A.
See Yourself in Cyber: Security Careers Beyond Hacking by Adams, Ed
Multimedia Watermarking: Latest Developments and Trends by
Decision Making and Security Risk Management for Iot Environments by
Tiktok Marketing Mastery: How to Reach, Engage and Sell to 1 Billion TikTok Users by Robson, Carl
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals by Ramakrishnan, Ganesh, Haqanee, Mansoor
Boost Your Business with Instagram: Expert Techniques to Increase Leads, Sales and Revenue with an Optimized Instagram Presence by Robson, Carl
Trustworthy AI: From Theory to Practice by Kuzlu, Murat, Catak, Ferhat Ozgur
Building Cybersecurity Applications with Blockchain and Smart Contracts by
The GPT-4 Crypto Revolution: Pioneering Profit in a Digital Age by Wilder, Zane
Smart Card Research and Advanced Applications: 22nd International Conference, Cardis 2023, Amsterdam, the Netherlands, November 14-16, 2023, Revised S by
Improving Security, Privacy, and Trust in Cloud Computing by
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You by Fagan, Peter
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You by Fagan, Peter
AI-Based Fraud Detection: Safeguarding Your Business Against Cyber Threats by Johnson, Trevor
Cybersecurity for Beginners: A Сomprehensive Guide on Protecting Against Digital Threats in the Modern World by Peterson, Liam
In Zero Trust We Trust by Naduvath, Avinash
Digital Dreams Have Become Nightmares: What We Must Do by Baecker, Ronald M.
Digital Dreams Have Become Nightmares: What We Must Do by Baecker, Ronald M.
Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part by
Secure Coding Practices: Fortifying Applications Against Cyber Threats by Kathy, Black Hat
Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part by
Cybersecurity Issues and Challenges in the Drone Industry by
Txting 2 Talking: Disconnect to Reconnect by Hotte, Kathryn
Security Without Obscurity: A Guide to PKI Operations by Stapleton, Jeff, Epstein, W. Clay
Security Without Obscurity: A Guide to PKI Operations by Epstein, W. Clay, Stapleton, Jeff
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls by Hodson, Christopher J.
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls by Hodson, Christopher J.
PCI DSS Version 4.0: A guide to the payment card industry data security standard by Hancock, Stephen
Web Application Security: Exploitation and Countermeasures for Modern Web Applications by Hoffman, Andrew
Pen Testing from Contract to Report by Anwar, Waqar, Basta, Alfred, Basta, Nadine
Acquiring Publicly Available Information Analytic Tools in a Proprietary Marketplace: Acquisition Recommendations for Army Cyber Command by Marcellino, William, Schwille, Michael, Warren, Kristin
See More