• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2010

Info Security Risk Management by Minoli, Daniel, Kouns, Jake
Information Security Applications: 10th International Workshop, Wisa 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers by
Information Security and Digital Forensics: First International Conference, ISDF 2009 London, United Kingdom, September 7-9, 2009 Revised Selected Pap by
Security in Emerging Wireless Communication and Networking Systems: First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, by
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) by Christodonte II, Marcos
Power Analysis Side Channel Attacks by Parameswaran, Sri, Ambrose, Jude, Ignjatovic, Alexandar
Engineering Secure Software and Systems by
Trust Modeling and Management in Digital Environments: From Social Concept to System Development by
Computer Synthesized Speech Technologies: Tools for Aiding Impairment by
Mobile Application Security by Clark, Chris, Dwivedi, Himanshu, Thiel, David
Net Neutrality: Towards a Co-Regulatory Solution by Marsden, Christopher T.
Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition by Yang, Yi Xian, Niu, Xin Xin, Xu, Cheng Qing
Data Privacy Management and Autonomous Spontaneous Security by
Open Source Software for Digital Forensics by
Theory of Cryptography: 7th Theory of Cryptography Conference, Tcc 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings by
IT Induction and Information Security Awareness by Maddock, Valerie
Decrypted Secrets: Methods and Maxims of Cryptology by Bauer, Friedrich L.
Handbook of Information and Communication Security by
New Applications in IT Standards: Developments and Progress by
Serious Game Design and Development: Technologies for Training and Learning by
Information Systems, Technology and Management by
Asset Protection through Security Awareness by Speed, Tyler Justin
Replication: Theory and Practice by
Topics in Cryptology - Ct-Rsa 2010: The 10th Cryptographers' Track at the Rsa Conference 2010, San Francisco, Ca, Usa, March 1-5, 2010. Proceedings by
Cryptography Engineering: Design Principles and Practical Applications by Kohno, Tadayoshi, Schneier, Bruce, Ferguson, Niels
Secure Integrated Circuits and Systems by
Datenschutz Kompakt Und Verständlich: Eine Praxisorientierte Einführung by Witt, Bernhard C.
Permutation Complexity in Dynamical Systems: Ordinal Patterns, Permutation Entropy and All That by Amigó, José
Information Security Risk Analysis by Peltier, Thomas R.
Seven Deadliest Web Application Attacks by Shema, Mike
Seven Deadliest Microsoft Attacks by Alpern, Naomi, Kraus, Rob, Barber, Brian
Seven Deadliest Wireless Technologies Attacks by Haines, Brad
High Performance Networking, Computing, Communication Systems, and Mathematical Foundations: International Conferences, ICHCC 2009-ICTMF 2009 Sanya, H by
Face Recognition by
Broadband Quantum Cryptography by Rogers, Daniel
Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings by McGovern, Glenn P.
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP by
Smart Card Research and Advanced Applications: 9th Ifip Wg 8.8/11.2 International Conference, Cardis 2010, Passau, Germany, April 14-16, 2010, Proceed by
Sicher & Mobil: Sicherheit in Der Drahtlosen Kommunikation by Osterhage, Wolfgang W.
Digital Video and Audio Broadcasting Technology: A Practical Engineering Guide by Fischer, Walter
Progress in Cryptology--AFRICACRYPT 2010 by
Innovationen und IT-Sicherheit: Innovationen und Sicherheit von RFID-Systemen by Hack, Daniel
Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 Eindhoven, The Netherlands, November 5-6, 2009 Revised Selected Papers by
Loganalysis Tools für Datamining in Logfiles by Hurm, Dominic
Information Security Risk Management for ISO27001/Iso27002 by Watkins, Steve G., Calder, Alan
Seven Deadliest Unified Communications Attacks by York, Dan
Seven Deadliest USB Attacks by Anderson, Brian, Anderson, Barbara
Seven Deadliest Social Network Attacks by Timm, Carl, Perez, Richard
Information Security Practice and Experience by
Networking 2010: 9th International IFIP TC 6 Networking Conference Chennai, India, May 11-15, 2010 Proceedings by
Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January by
The Illusion of Due Diligence: Notes from the CISO Underground by Bardin, Jeffrey S.
Analysis Techniques for Information Security by Datta, Anupam, Jha, Somesh, Li, Ninghui
Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives by
Implications of Aggregated Dod Information Systems for Information Assurance Certification and Accreditation by Gonzales, Daniel, Ohlandt, Chad, Landree, Eric
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments by Kipper, Greg, Barrett, Diane
Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography Paris, France, May 26-28, 2010 Pro by
Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference, CMS 2010 Linz, Austria, May 31 - June 2, 2010 Proceedings by
Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques French Rivier by
Post-Quantum Cryptography: Third International Workshop, Pqcrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings by
Wired/Wireless Internet Communications: 8th International Conference, WWIC 2010 Lulea, Sweden, June 1-3, 2010 Proceedings by
The Cryptography of Shakespeare V1 by Arensberg, Walter Conrad
CISSP Exam Prep Questions, Answers & Explanations: 1000+ CISSP Practice Questions with Detailed Solutions by Ssi Logic
Combinatorial Designs for Authentication and Secrecy Codes by Huber, Michael
Trust Management IV: 4th Ifip Wg 11.11 International Conference, Ifiptm 2010, Morioka, Japan, June 16-18, 2010, Proceedings by
Handbook of Electronic Security & Digi.. by Jahankhani, Hamid, Me, Gianluigi, Watson, David Lilburn
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 Hyderabad, India, June 21, 2010 Proceedings by
Personal Satellite Services: Second International ICST Conference, PSATS 2010, Rome, Italy, February 4-5, 2010, Revised Selected Papers by
Computer Networks: 17th Conference, Cn 2010, Ustron, Poland, June 15-19, 2010. Proceedings by
Trust and Trustworthy Computing: Third International Conference, Trust 2010, Berlin, Germany, June 21-23, 2010, Proceedings by
Architecting Critical Systems: First International Symposium, Prague, Czech Republic, June 23-25, 2010 by
Applied Cryptography and Network Security: 8th International Conference, Acns 2010, Beijing, China, June 22-25, 2010, Proceedings by
Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings by
Towards Trustworthy Elections: New Directions in Electronic Voting by
Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings by
Secure and Resilient Software Development by Merkow, Mark S., Raghavan, Lakshmikanth
Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World by Fried, Stephen
Arithmetic of Finite Fields: Third International Workshop, Waifi 2010, Istanbul, Turkey, June 27-30, 2010, Proceedings by
Networked Services and Applications - Engineering, Control and Management: 16th Eunice/Ifip Wg 6.6 Workshop, Eunice 2010, Trondheim, Norway, June 28-3 by
Information Security and Privacy: 15th Australasian Conference, Acisp 2010, Sydney, Australia, July 5-7, 2010, Proceedings by
Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation by Schuckers, Michael E.
Coastal Lagoons: Critical Habitats of Environmental Change by
Risiko-Assessments Für Datenqualität: Konzept Und Realisierung by Harrach, Hakim
Web Service Mining: Application to Discoveries of Biological Pathways by Zheng, George, Bouguettaya, Athman
Digital Triage Forensics: Processing the Digital Crime Scene by Pearson, Stephen, Watson, Richard
Network Flow Analysis by Lucas, Michael W.
Privacy and Identity Management for Life: 5th Ifip Wg 9.2, 9.6/11.4, 11.6, 11.7/Primelife International Summer School, Nice, France, September 7-11, 2 by
Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers by
E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development by
Transactions on Data Hiding and Multimedia Security V by
It Security Management: It Securiteers - Setting Up an It Security Function by Partida, Alberto, Andina, Diego
Handbook of FPGA Design Security by Huffmire, Ted, Irvine, Cynthia, Nguyen, Thuy D.
802.11 Wireless Networks: Security and Analysis by Holt, Alan, Huang, Chi-Yu
Hackers & Painters: Big Ideas from the Computer Age by Graham, Paul
Algorithmic Number Theory: 9th International Symposium, Ants-IX, Nancy, France, July 19-23, 2010, Proceedings by
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th International Conference, Dimva 2010, Bonn, Germany, July 8-9, 2010, Proceeding by
Recent Trends in Network Security and Applications: Third International Conference, Cnsa 2010, Chennai, India, July 23-25, 2010 Proceedings by
Least Privilege Security for Windows 7, Vista and XP by Smith, Russell
It Security Metrics: A Practical Framework for Measuring Security & Protecting Data by Hayden, Lance
Privacy Enhancing Technologies: 10th International Symposium, Pets 2010, July 21-23, 2010, Berlin, Germany, Proceedings by
Critical Information Infrastructures Security: 4th International Workshop, Critis 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers by
Information Security and Cryptology - Icisc 2009: 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers by
Trusted Systems: First International Conference, Intrust 2009, Beijing, China, December 17-19, 2009. Proceedings by
Surviving Cyberwar by Stiennon, Richard
Surviving Cyberwar by Stiennon, Richard
Handbook of Financial Cryptography and Security by
Privacy, Identity, and Cloud Computing by Katzan, Harry, Jr.
Access Control, Security, and Trust: A Logical Approach by Older, Susan Beth, Chin, Shiu-Kai
Privacy, Identity, and Cloud Computing by Katzan, Harry, Jr.
Speech Dereverberation by
Economics of Information Security and Privacy by
Cryptographic Hardware and Embedded Systems -- Ches 2010: 12th International Workshop, Santa Barbara, Usa, August 17-20,2010, Proceedings by
Progress in Cryptology - LATINCRYPT 2010: First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, Augu by
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings by
Pervasive Information Security and Privacy Developments: Trends and Advancements by
Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption by
Digital Business Security Development: Management Technologies by
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems by
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised by
Insider Threats in Cyber Security by
Introduction to Cryptography with Mathematical Foundations and Computer Implementations by Stanoyevitch, Alexander
Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques by Fu, Ada Wai-Chee, Fung, Benjamin C. M., Wang, Ke
Wireless Network Administration a Beginner's Guide by Soyinka, Wale
Designing an IAM Framework with Oracle Identity and Access Management Suite by Scheidel, Jeff
Adaptive Cryptographic Access Control by Kayem, Anne V. D. M., Akl, Selim G., Martin, Patrick
Elements of Computer Security by Salomon, David
Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings by
Global Security, Safety, and Sustainability: 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, Proceedings by
What Kind of Information Society?: Governance, Virtuality, Surveillance, Sustainability, Resilience by
E-Government, E-Services and Global Processes: Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010, by
Dynamic Police Training by Bumbak, Ann R.
Managing an Information Security and Privacy Awareness and Training Program by Herold, Rebecca
Advanced Statistical Steganalysis by Böhme, Rainer
Swanson on Internal Auditing: Raising the Bar by Swanson, Dan
Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings by
Securing the Information Infrastructure by Kizza, Joseph M., Kizza, Florence M.
Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings by
Sequences and Their Applications - Seta 2010: 6th International Conference, Paris, France, September 13-17, 2010. Proceedings by
Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings by
Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings by
Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, by
Securing Strats in Linux Platforms and Applications by Jang, Michael
Multiple Access Communications: Third International Workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010, Proceedings by
Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings by
Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, Revised Selected Papers by
Stabilization, Safety, and Security of Distributed Systems: 12th International Symposium, SSS 2010, New York, Ny, Usa, September 20-22, 2010, Proceedi by
Attacken und Gegenmaßnahmen: Informationsabfragen und Recommender Systeme by Haschej, Marko
Trustworthy Global Computing: 5th International Symposium, Tgc 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers by
A Guide to Kernel Exploitation: Attacking the Core by Oldani, Massimiliano, Perla, Enrico
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives by
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering by
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec by
Emergency Notification by Chandler, Robert
Spyware and Adware by Aycock, John
Citrix XenDesktop Implementation: A Practical Guide for IT Professionals by James, Gareth R.
Provable Security: 4th International Conference, Provsec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings by
Terrorism and Homeland Security: Perspectives, Thoughts, and Opinions by
Communications and Networking by
Junos Security: A Guide to Junos for the Srx Services Gateways and Security Certification by Woodberg, Brad, Giecco, Patricio, Cameron, Rob
Cyber Terrorism: Political and Economic Implications by Colarik, Andrew M.
Computational Gas-Solids Flows and Reacting Systems: Theory, Methods and Practice by
Certification and Security in Health-Related Web Applications: Concepts and Solutions by
Conducting Biosocial Surveys: Collecting, Storing, Accessing, and Protecting Biospecimens and Biodata by Committee on Population, National Research Council, Division of Behavioral and Social Sciences and Education
Secure Group Communications Over Data Networks by Zou, Xukai, Ramamurthy, Byrav, Magliveras, Spyros S.
Brute Force: Cracking the Data Encryption Standard by Curtin, Matt
Information Hiding: 12th International Conference, Ih 2010, Calgary, Ab, Canada, June 28-30, 2010, Revised Selected Papers by
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, by
Ubiquitous Intelligence and Computing: 7th International Conference, UIC 2010, Xi'an, China, October 26-29, 2010, Proceedings by
Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings by
Machine Learning and Systems Engineering by
Security Strategy: From Requirements to Reality by Stackpole, Bill, Oksendahl, Eric
Guide to Biometric Reference Systems and Performance Evaluation by
Foundations of Computer Security by Salomon, David
Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting by
Secure Systems Development with UML by Jürjens, Jan
Preserving Privacy in Data Outsourcing by Foresti, Sara
Linguistisches Identity Matching: Paradigmenwechsel in Der Suche Und Im Abgleich Von Personendaten by Lisbach, Bertrand
ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference by
Grid Computing Security by Chakrabarti, Anirban
Anti-Spam Measures: Analysis and Design by Schryen, Guido
Coding for Data and Computer Communications by Salomon, David
Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection by
Smart Cards, Tokens, Security and Applications by
Advances in Information Technology: 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedings by
Web Application Security: Iberic Web Application Security Conference, Ibwas 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers by
Security in Computing Systems: Challenges, Approaches and Solutions by Biskup, Joachim
Post-Quantum Cryptography by
The Future of Identity in the Information Society: Challenges and Opportunities by
Gröbner Bases, Coding, and Cryptography by
Security Engineering for Service-Oriented Architectures by Hafner, Michael, Breu, Ruth
Model-Driven Risk Analysis: The Coras Approach by Solhaug, Bjørnar, Stølen, Ketil, Lund, Mass Soldal
Human Ear Recognition by Computer by Bhanu, Bir, Chen, Hui
Guide to Computer Network Security by Kizza, Joseph Migga
Algebraic Aspects of Cryptography by Koblitz, Neal
Complexity Theory and Cryptology: An Introduction to Cryptocomplexity by Rothe, Jörg
Network Security: A Decision and Game-Theoretic Approach by Alpcan, Tansu, Başar, Tamer
Public Key Infrastructures, Services and Applications: 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Paper by
RFID Security and Privacy: Concepts, Protocols, and Architectures by Henrici, Dirk
Intelligence and Security Informatics: Techniques and Applications by
Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20 by Gritzalis, Dimitris, Lopez, Javier
See More