• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2009

Securing Library Technology by Wright, Adam, Earp, Paul W.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Lyon, Gordon, Fyodor
Augmented Vision Perception in Infrared: Algorithms and Applied Systems by
Engineering Secure Software and Systems: First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009 Proceedings by
Safety-Critical Systems: Problems, Process and Practice: Proceedings of the Seventeenth Safety-Critical Systems Symposium Brighton, Uk, 3 - 5 February by
Integrating Advanced Computer-Aided Design, Manufacturing, and Numerical Control: Principles and Implementations by Xu, Xun
HOWTO Secure and Audit Oracle 10g and 11g by Ben-Natan, Ron
Information Security Applications: 9th International Workshop, Wisa 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers by
Theory of Cryptography: Sixth Theory of Cryptography Conference, Tcc 2009, San Francisco, Ca, Usa, March 15-17, 2009, Proceedings by
Public Key Cryptography - Pkc 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, Ca, Usa, March 18-20, 2009 by
Post-Quantum Cryptography Using Complexity by de Mare, Michael James
Handbook of Research on Social Software and Developing Community Ontologies by
Complex-Valued Neural Networks: Utilizing High-Dimensional Parameters by
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement by Brotby Cism, W. Krag
TCP/IP - The Ultimate Protocol Guide: Volume 2 - Applications, Access and Data Security by Miller, Philip M.
TCP/IP - The Ultimate Protocol Guide: Volume 1 - Data Delivery and Routing by Miller, Philip M.
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks by Nystrom, Martin, Fry, Chris
Identifying Malicious Code Through Reverse Engineering by
Trusted Computing: Second International Conference, Trust 2009 Oxford, Uk, April 6-8, 2009, Proceedings by
Information Security and Cryptoloy - ICISC 2008: 11th International Conference Seoul, Korea, December 3-5, 2008 Revised Selected Papers by
Information Security Practice and Experience: 5th International Conference, Ispec 2009 Xi'an, China, April 13-15, 2009 Proceedings by
Trustworthy Global Computing: 4th International Symposium, Tgc 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers by
Topics in Cryptology - Ct-Rsa 2009: The Cryptographers' Track at the Rsa Conference 2009, San Francisco, Ca, Usa, April 20-24, 2009, Proceedings by
Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues by
Handbook of Research on Secure Multimedia Distribution by
Information Security by Brotby, Krag
Cyberpower and National Security by
Guide to Biometric Reference Systems and Performance Evaluation by
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009, Proceedings by
Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers by
Formal Aspects in Security and Trust by
Pervasive Computing by
Advances in Cryptology - Eurocrypt 2009 by
Transactions on Computational Science IV: Special Issue on Security in Computing by
Active and Programmable Networks by
Data Governance Imperative (The) by Sarsfield, Steve
The Future of Identity in the Information Society: Challenges and Opportunities by
Machine Learning in Cyber Trust: Security, Privacy, and Reliability by
Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy by Alexander, Philip
Socioeconomic and Legal Implications of Electronic Intrusion by
Auto-Identification and Ubiquitous Computing Applications by
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions by
Strategies and Responses to Crime: Thinking Locally, Acting Globally by
Wired/Wireless Internet Communications: 7th International Conference, WWIC 2009, Enschede, the Netherlands, May 27-29 2009, Proceedings by
Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20 by Gritzalis, Dimitris, Lopez, Javier
Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008 by
Coding and Cryptology: Second International Workshop, Iwcc 2009 by
Experimental Algorithms: 8th International Symposium Sea 2009, Dortmund, Germany, June 4-6, 2009, Proceedings by
Formal to Practical Security: Papers Issued from the 2005-2008 French-Japanese Collaboration by
Transactions on Data Hiding and Multimedia Security IV by
Applied Cryptography and Network Security: 7th International Conference, Acns 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings by
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 18th International Symposium, Aaecc-18, Tarragona, Sapin, June 8-12, 2009, Proceedin by
Trust Management III: Third Ifip Wg 11.11 International Conference, Ifiptm 2009, West Lafayette, In, Usa, June 15-19, 2009, Proceedings by
Cisco ASA Configuration by Deal, Richard
Information Security Management Handbook, Volume 3 by
Algorithmic Cryptanalysis by Joux, Antoine
Applied Combinatorics by Roberts, Fred, Tesman, Barry
Beautiful Security: Leading Security Experts Explain How They Think by Oram, Andy, Viega, John
Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities by Volkamer, Melanie
Gröbner Bases, Coding, and Cryptography by
Progress in Cryptology--AFRICACRYPT 2009 by
Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009, Proceedings by
Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009, Proceedings by
Security and Dependability for Ambient Intelligence by
Forensics in Telecommunications, Information and Multimedia: Second International Conference, E-Forensics 2009, Adelaide, Australia, January 19-21, 20 by
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings by
Handbook of Remote Biometrics: For Surveillance and Security by
Autonomic and Trusted Computing: 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009 Proceedings by
Information Theoretic Security by Liang, Yingbin, Poor, H. Vincent, Shamai, Shlomo
Protecting Privacy in Video Surveillance by
Comptia Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2e [With DVD ROM] by Cross, Michael, Fritz, Dustin, Krishnamurthy, Mohan
Cryptanalysis of RSA and Its Variants by Hinek, M. Jason
Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009, Proceedings by
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009, Proceedings by
Privacy Enhancing Technologies: 9th International Symposium, Pets 2009, Seattle, Wa, Usa, August 5-7, 2009, Proceedings by
Computational Methods for Counterterrorism by
Pairing-Based Cryptography - Pairing 2009: Third International Conference Palo Alto, Ca, Usa, August 12-14, 2009 Proceedings by
Security of Mobile Communications by Boudriga, Noureddine
Sicherheit Und Vertrauen in Der Mobilen Informations- Und Kommunikationstechnologie: Tagungsband Zur Eict-Konferenz It-Sicherheit by
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know by Viega, John
Contemporary Computing by
Advances in Cryptology - Crypto 2009: 29th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 16-20, 2009, Proceedings by
Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers by
Computational Forensics: Third International Workshop, Iwcf 2009, the Hague, the Netherlands, August 13-14, 2009, Proceedings by
Fast Software Encryption by
The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September by
Security Risk Management Body of Knowledge by Jakeman, Miles, Talbot, Julian
Elementary Cryptanalysis by Sinkov, Abraham
Digital Watermarking: 8th International Workshop, Iwdw 2009, Guildford, Uk, August 24-26, 2009, Proceedings by
Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution by Teti, Antonio
Data Protection: Governance, Risk Management, and Compliance by Hill, David G.
Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009 Linz, Austria, September 3-4, 2009 Proceedings by
Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks by
Electronic Government: 8th International Conference, EGOV 2009, Linz, Austria, August 31-September 3, 2009, Proceedings by
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures by
Police Leadership in a Democracy: Conversations with America's Police Chiefs by Isenberg, Jim
Algebraic Cryptanalysis by Bard, Gregory
Wireless and Mobile Networking: Second Ifip Wg 6.8 Joint Conference, Wmnc 2009, Gdansk, Poland, September 9-11, 2009, Proceedings by
Information Security: 12th International Conference, Isc 2009 Pisa, Italy, September 7-9, 2009 Proceedings by
E-Voting and Identity: Second International Conference, VOTE-ID 2009 Luxembourg, September 7-8, 2009 Proceedings by
Cryptographic Hardware and Embedded Systems - Ches 2009: 11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings by
Global Security, Safety, and Sustainability: 5th International Conference, Icgs3 2009, London, Uk, September 1-2, 2009, Proceedings by
Smart Spaces and Next Generation Wired/Wireless Networking: 9th International Conference, New2an 2009 and Second Conference on Smart Spaces, Rusmart 2 by
Dnssec Specifications by
Information Warfare by Ventre, Daniel
Network Security Bible by Cole, Eric
Cyber-Security and Threat Politics: US Efforts to Secure the Information Age by Dunn Cavelty, Myriam
Pearls of Discrete Mathematics by Erickson, Martin
Advances in Digital Forensics V: Fifth Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Florida, Usa, January 26-28, 2009, Revised by
Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Se by
Selected Areas in Cryptography: 15th Annual International Workshop, Sac 2008, Sackville, New Brunswick, Canada, August 14-15, 2008 by
Conduite et Maîtrise de la Sécurité Informatique: La méthode CMSI by Hallepee, Didier
Computer Safety, Reliability, and Security: 28th International Conference, SAFECOMP 2009 Hamburg, Germany, September 15-18, 2009 Proceedings by
Computer Security - ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings by
Ad-Hoc, Mobile and Wireless Networks: 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings by
Biometric ID Management and Multimodal Communication: Joint COST 2101 and 2102 International Conference, BioID_MultiComm 2009, Madrid, Spain, Septembe by
Personal Satellite Services: International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers by
Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009, Proceedings by
Security Awareness: Neue Wege Zur Erfolgreichen Mitarbeiter-Sensibilisierung by
Security and Privacy in Mobile Information and Communication Systems: First International Icst Conference, Mobisec 2009, Turin, Italy, June 3-5, 2009, by
Foundations of Cryptography: Volume 2, Basic Applications by Goldreich, Oded
Protecting SQL Server Data by Magnabosco, John
Critical Infrastructure Protection III: Third Ifip Wg 11.10 International Conference, Hanover, New Hampshire, Usa, March 23-25, 2009, Revised Selected by
Innovations in Digital Watermarking Techniques by Wang, Feng-Hsing
Critical Information Infrastructures Security: Third International Workshop, CRITIS 2008 Rome, Italy, October 13-15, 2008 Revised Papers by
Computational Intelligence in Security for Information Systems: Cisis'09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings by
Security in Ad-Hoc and Sensor Networks by Beyah, Raheem A., Corbett, Cherita L., McNair, Janise
Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers by
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them by LeBlanc, David, Viega, John, Howard, Michael
I Contenuti Digitali: Tecnologie, Diritti E Libertà by Lucchi, Nicola
Hacking Exposed Computer Forensics by Philipp, Aaron
Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings by
Digital Watermarking: 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008, Selected Papers by
Guidelines on Firewalls and Firewall Policy by National Institute of Standards and Tech, Scarfone, Karen, Hoffman, Paul
NIST SP 800-41 Guidelines on Firewalls and Firewall Policy: NiST SP 800-41 by National Institute of Standards and Tech
Eleventh Hour Security+: Exam Sy0-201 Study Guide by Dubrawsky, Ido
Network+: Exam N10-004 Study Guide by Alpern, Naomi
Cybercrime, Cyberterrorism, and Cyberwarfare by Uda, Robert T. Mba
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions by Philipp, Aaron, Davis, Chris, Cowen, David
Unauthorised Access: Physical Penetration Testing for It Security Teams by Allsopp, Wil
Advances in Information and Computer Security: 4th International Workshop on Security, Iwsec 2009 Toyama, Japan, October 28-30, 2009 Proceedings by
Harboring Data: Information Security, Law, and the Corporation by
ISSE 2009 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2009 Conference by
Algebraic Geometry in Coding Theory and Cryptography by Niederreiter, Harald, Xing, Chaoping
Safety and Security in Multiagent Systems: Research Results from 2004-2006 by
Integrated Management of Systems, Services, Processes and People in IT by
Trust Management for Service-Oriented Environments by Bouguettaya, Athman, Malik, Zaki
Stabilization, Safety, and Security of Distributed Systems by
On the Move to Meaningful Internet Systems: Otm 2009: Confederated International Conferences, Coopis, Doa, Is, and Odbase 2009, Vilamoura, Portugal, N by
Software and Data Technolgoies by
Provable Security: Third International Conference, Provsec 2009, Guangzhou, China, November 11-13, 2009. Proceedings by
On the Move to Meaningful Internet Systems: OTM 2009 Workshops by
iNetSec 2009-Open Research Problems in Network Security by
On the Move to Meaningful Internet Systems: Otm 2009: Confederated International Conferences, Coopis, Doa, Is, and Odbase 2009, Vilamoura, Portugal, N by
Kryptologie: Algebraische Methoden Und Algorithmen by Kiechle, Hubert, Karpfinger, Christian
Hacking: The Next Generation by Dhanjani, Nitesh, Rios, Billy, Hardin, Brett
Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Sel by
Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, Isips 2008, New Brunswick, Nj, Us by
Network Intrusion Detection and Prevention: Concepts and Techniques by Tavallaee, Mahbod, Ghorbani, Ali A., Lu, Wei
e-Business and Telecommunications by
Cyber Situational Awareness: Issues and Research by
Enterprise Security for the Executive: Setting the Tone from the Top by Bayuk, Jennifer
Cyberdeterrence and Cyberwar by Libicki, Martin C.
Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. by
Information Theoretic Security by
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance by Kumaraswamy, Subra, Latif, Shahed, Mather, Tim
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers by
Handbook of Data Compression by Motta, Giovanni, Salomon, David
Security for Web Services and Service-Oriented Architectures by Paci, Federica, Bertino, Elisa, Martino, Lorenzo
Advances in Cryptology - Asiacrypt 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Ja by
Security Informatics by
Database Theory and Application: International Conference, Dta 2009, Held as Part of the Future Generation Information Technology Conference, Fgit 200 by
Future Generation Information Technology by
Security Technology: International Conference, Sectech 2009, Held as Part of the Future Generation Information Technology Conference, Fgit by
Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings by
Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin by
Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings by
Information Systems Security: 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings by
Modsecurity 2.5 by Mischel, Magnus
Information and Communications Security: 11th International Conference, Icics 2009 by
Cryptography and Coding: 12th Ima International Conference, Imacc 2009, Cirencester, Uk, December 15-17, 2009, Proceedings by
Cyber Law by Kumar, Anupa P.
Securing Wireless Communications at the Physical Layer by
Security in Embedded Devices by Gebotys, Catherine H.
Kryptografie in Theorie Und PRAXIS: Mathematische Grundlagen Für Internetsicherheit, Mobilfunk Und Elektronisches Geld by Schwarzpaul, Thomas, Beutelspacher, Albrecht, Neumann, Heike B.
Expdt: Vergleichbarkeit Von Richtlinien Für Selbstregulierung Und Selbstdatenschutz by Kähmer, Martin
Distributed Computing and Networking: 11th International Conference, Icdcn 2010, Kolkata, India, January 3-6, 2010, Proceedings by
Making Systems Safer: Proceedings of the Eighteenth Safety-Critical Systems Symposium, Bristol, Uk, 9-11th February 2010 by
Collaborative Computer Security and Trust Management by