• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2003

Cisco Security Specialist's Guide to Pix Firewall by Callisma, Inc
Fundamentals of Information Theory and Coding Design by Togneri, Roberto, Desilva, Christopher J. S.
The Weakest Security Link Series: 1st Edition by Medina, Luis F.
Fundamentals of Computer Security by Seberry, Jennifer, Pieprzyk, Josef, Hardjono, Thomas
802.11 Security by Potter, Bruce, Fleck, Bob
Security in Communication Networks: Third International Conference, Scn 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers by
Information Hiding: 5th International Workshop, Ih 2002, Noordwijkerhout, the Netherlands, October 7-9, 2002, Revised Papers by
Wi-Fi Security by
Cryptographic Hardware and Embedded Systems - Ches 2002: 4th International Workshop, Redwood Shores, Ca, Usa, August 13-15, 2002, Revised Papers by
Privacy Enhancing Technologies: Second International Workshop, Pet 2002, San Francisco, Ca, Usa, April 14-15, 2002, Revised Papers by
Web Services Security by O'Neill, Mark
Information Security and Cryptology - Icisc 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers by
Selected Areas in Cryptography: 9th Annual International Workshop, Sac 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers by
Reshaping National Intelligence for an Age of Information by Treverton, Gregory F.
Computer and Intrusion Forensics by Collie, Byron, Vel, Olivier, Mohay, George
Internet Security: A Jumpstart for Systems Administrators and It Managers by Ellis, Juanita, Speed, Tim
Practical Unix and Internet Security by Schwartz, Alan, Garfinkel, Simson, Spafford, Gene
Check Point VPN-1/Fire Wall-1 NG Administration by Shah, Inti
The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet by Jennings, Charles, Fena, Lori
Symmetrische Verschlüsselungsverfahren: Design, Entwicklung Und Kryptoanalyse Klassischer Und Moderner Chiffren by Miller, Michael
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 15th International Symposium, Aaecc-15, Toulouse, France, May 12-16, 2003, Proceedin by
Security Companion CD [With CDROM] by Spafford, Gene
Comprehensive VB .Net Debugging by Pearce, Mark
Stealing the Network: How to Own the Box by Syngress
Data Privacy and Security by Salomon, David
Intelligence and Security Informatics: First Nsf/Nij Symposium, Isi 2003, Tucson, Az, Usa, June 2-3, 2003, Proceedings by
Security Education and Critical Infrastructures: Ifip Tc11 / Wg11.8 Third Annual World Conference on Information Security Education (Wise3) June 26-28 by
Information Security and Privacy: 8th Australasian Conference, Acisp 2003, Wollongong, Australia, July 9-11, 2003, Proceedings by
Certification and Security in E-Services: From E-Government to E-Business by
Cisco Security Professional's Guide to Secure Intrusion Detection Systems by Sweeney, Mike, Syngress
Information Security Policies and Actions in Modern Integrated Systems by
E-Commerce Security: Advice from Experts by
Linux Security Cookbook by Barrett, Daniel J., Silverman, Richard E., Byrnes, Robert G.
Digital Rights Management: ACM Ccs-9 Workshop, Drm 2002, Washington, DC, Usa, November 18, 2002, Revised Papers by
PDA Security by
The Center for Democracy and Technology and Internet Privacy in the U.S.: Lessons of the First Five Years by H-S Li, Joyce
Programming .Net Security: Writing Secure Applications Using C# or Visual Basic .Net by Freeman, Adam, Jones, Allen
Protocols for Authentication and Key Establishment by Boyd, Colin, Mathuria, Anish
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications by Schumacher, Markus
Secure Programming Cookbook for C and C++ by Viega, John, Messier, Matt
Verschlüsselung Und Innere Sicherheit: Die Verfassungsrechtliche Zulässigkeit Eines Verschlüsselungsverbots Bei Elektronischer Datenkommunikation by Meyn, Christian
Cryptographic Hardware and Embedded Systems -- Ches 2003: 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings by
Recent Advances in Intrusion Detection: 6th International Symposium, Raid 2003, Pittsburgh, Pa, Usa, September 8-10, 2003, Proceedings by
Composition of Secure Multi-Party Protocols: A Comprehensive Study by Lindell, Yehuda
Codierungstheorie: Eine Einführung by Schulz, Ralph-Hardo
HP Nonstop Server Security: A Practical Handbook by Xypro Technology Corp, Xypro Technology
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th Ifip Tc-6 Tc-11 International Conference, CMS 2003, T by
Critical Incident Management by Sterneckert, Alan B.
Information and Communications Security: 5th International Conference, Icics 2003, Huhehaote, China, October 10-13, 2003, Proceedings by
Mission Critical Network Planning by Liotine, Matthew
Kerberos: The Definitive Guide by Garman, Jason
Network Control and Engineering for Qos, Security and Mobility II: Ifip Tc6 / Wg6.2 & Wg6.7 Second International Conference on Network Control and Eng by
Cryptographic Security Architecture: Design and Verification by Gutmann, Peter
Applied Cryptography and Network Security: First International Conference, Acns 2003. Kunming, China, October 16-19, 2003, Proceedings by
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User by Held, Gilbert
Fast Software Encryption: 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers by
The Art of Deception: Controlling the Human Element of Security by Mitnick, Kevin D., Simon, William L.
Investigator's Guide to Steganography by Kipper, Gregory
Network Perimeter Security: Building Defense In-Depth by Riggs, Cliff
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach by Wang, Xiaoyang Sean, Jajodia, Sushil, Peng Ning
Artificial Intelligence and Security in Computing Systems: 9th International Conference, Acs '2002 Międzyzdroje, Poland October 23-25, 2002 Proce by
Digital Rights Management: Technological, Economic, Legal and Political Aspects by
Real World Microsoft Access Database Protection and Security by Robinson, Garry
Best Damn Cisco Internetworking Book Period by Syngress
The ABCs of LDAP: How to Install, Run, and Administer LDAP Services by Voglmaier, Reinhard E.
Fundamentals of Network Security by Maiwald, Eric
Synchronizing E-Security by Williams, Godfried B.
Formal Aspects of Security: First International Conference, Fasec 2002, London, Uk, December 16-18, 2002, Revised Papers by
Security for Mobility by
Surviving Security: How to Integrate People, Process, and Technology by Andress, Amanda
Information Security and Auditing in the Digital Age by Umar, Amjad
System-On-Chip Architectures and Implementations for Private-Key Data Encryption by McCanny, John V., McLoone, Máire