• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2000

The International Handbook of Computer Security by Qureshi, Anique A., Shim, Jae, Siegel, Joel G.
Trusted Computing Platforms: Design and Applications by Smith, Sean W.
Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, Pkc 2000, Melbourne, Victoria, Austra by
Selected Areas in Cryptography: 6th Annual International Workshop, Sac'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings by
Information Hiding: Third International Workshop, Ih'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings by
IP Addressing and Subnetting Inc Ipv6: Including Ipv6 by Syngress
Computer Networks and Open Systems: An Application Development Perspective: An Application Development Perspective by Cassel, L. N., Austing, R. H.
Cisco Access Lists Field Guide by Held, Gilbert, Hundley, Kent
Security of Data and Transaction Processing: A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000) by
Towards a Quarter-Century of Public Key Cryptography: A Special Issue of Designs, Codes and Cryptography an International Journal. Volume 19, No. 2/3 by
The Limits of Privacy by Etzioni, Amitai
Information Security and Cryptology - Icisc'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings by
Security Protocols: 7th International Workshop Cambridge, Uk, April 19-21, 1999 Proceedings by
Automated Biometrics: Technologies and Systems by Zhang, David D.
Research Advances in Database and Information Systems Security: Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, by
Information Security and Privacy: 5th Australasian Conference, Acisp 2000, Brisbane, Australia, July 10-12, 2000, Proceedings by
Information Security for Global Information Infrastructures: Ifip Tc11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, by
Building Internet Firewalls by Zwicky, Elizabeth D., Cooper, Simon, Chapman, D. Brent
Advances in Cryptology - Crypto 2000: 20th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 20-24, 2000. Proceedings by
Biometrics: Advanced Identity Verification: The Complete Guide [With CDROM] by Ashbourn, Julian
Smart Card. Research and Applications: Third International Conference, Cardis'98 Louvain-La-Neuve, Belgium, September 14-16, 1998 Proceedings by
Netspionage: The Global Threat to Information by Boni, William C.
Improving Access to and Confidentiality of Research Data: Report of a Workshop by Committee on National Statistics, National Research Council, Commission on Behavioral and Social Sciences and Education
Business Continuity Planning by
Computer Security - Esorics 2000: 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings by
Recent Advances in Intrusion Detection: Third International Workshop, Raid 2000 Toulouse, France, October 2-4, 2000 Proceedings by
Smart Card Research and Advanced Applications: Ifip Tc8 / Wg8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 2 by
Financial Privacy & Electronic Commerce: Who's in My Business by Robinson, Benjamin E., III
Java and Internet Security by Shrader, Theodore
Hacking Exposed: Network Security Secrets & Solutions by
Computer Safety, Reliability, and Security: 19th International Conference, Safecomp 2000, Rotterdam, the Netherlands, October 24-27, 2000 Proceedings by
Security Fundamentals for E-Commerce by Hassler, Vesna
Advances in Cryptology - Asiacrypt 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Jap by
Progress in Cryptology - Indocrypt 2000: First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings by
Information Security: Third International Workshop, Isw 2000, Wollongong, Australia, December 20-21, 2000. Proceedings by
E-mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks by Syngress
Cryptographic Hardware and Embedded Systems - Ches 2000: Second International Workshop Worcester, Ma, Usa, August 17-18, 2000 Proceedings by
FAA Computer Security: Recommenations to Address Continuing Weaknesses by U S General Accounting Office
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures by Johnson, Neil F., Duric, Zoran, Jajodia, Sushil