• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2013

Transactions on Large-Scale Data- And Knowledge-Centered Systems IX by
Cryptographic Hardware and Embedded Systems -- Ches 2013: 15th International Workshop, Santa Barbara, Ca, Usa, August 20-23, 2013, Proceedings by
NIST SP 800-40 R3 Guide to Enterprise Patch Management Technologies: NiST SP 800-40 R3 by National Institute of Standards and Tech
Enterprise Cyber Security: principles and practice by Dhillon, Gurpreet S.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy by Engebretson, Patrick
Self-Learning Speaker Identification: A System for Enhanced Speech Recognition by Herbig, Tobias, Gerl, Franz, Minker, Wolfgang
Counterterrorism and Open Source Intelligence by
Essential Information Security by
Trust, Privacy, and Security in Digital Business: 10th International Conference, Trustbus 2013, Prague, Czech Republic, August 28-29, 2013. Proceeding by
Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers by
Dynamic Secrets in Communication Security by Xiao, Sheng, Gong, Weibo, Towsley, Don
Handbook For Securing Your Home or Small Business Computer Network by Meyers, Andrew
Digital-Forensics and Watermarking: 11th International Workshop, Iwdw 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers by
Mobile Security: How to Secure, Privatize and Recover Your Devices by Speed, Timothy, Nykamp, Darla, Anderson, Joseph
Trustworthy Execution on Mobile Devices by McCune, Jonathan M., Vasudevan, Amit, Newsome, James
Public Key Infrastructures, Services and Applications: 9th European Workshop, Europki 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Paper by
Lightweight Cryptography for Security and Privacy: 2nd International Workshop, Lightsec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers by
Advances in Security of Information and Communication Networks: First International Conference, Secnet 2013, Cairo, Egypt, September 3-5, 2013. Procee by
Web Penetration Testing with Kali Linux by Muniz, Joseph, Lakhani, Aamir
Cryptography Infosec Pro Guide by Oriyano, Sean-Philip
Introduction to Computer and Network Security: Navigating Shades of Gray by Brooks, Richard R.
Hacking the Human 2 by Mann, Ian
Official (Isc)2 Guide to the Csslp Cbk by Paul, Mano
Computer Security -- Esorics 2013: 18th European Symposium on Research in Computer Security, Egham, Uk, September 9-13, 2013, Proceedings by
Service-Oriented and Cloud Computing: Second European Conference, Esocc 2013, Málaga, Spain, September 11-13, 2013, Proceedings by
Availability, Reliability, and Security in Information Systems and Hci: Ifip Wg 8.4, 8.9, Tc 5 International Cross-Domain Conference, CD-Ares 2013, Re by
E-Discovery: Introduction to Digital Evidence (Book Only) by Godfrey, Ronald, Steuart, Christopher, Phillips, Amelia
Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models by Rehman, Rafeeq U.
Communications and Multimedia Security: 14th Ifip Tc 6/Tc 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceeding by
Computer Safety, Reliability, and Security: 32nd International Conference, Safecomp 2013, Toulouse, France, September 14-27, 2013, Proceedings by
X-Ways Forensics Practitioner's Guide by Zimmerman, Eric, Shavers, Brett
Online File Sharing: Innovations in Media Consumption by Andersson Schwarz, Jonas
Secure Information Management Using Linguistic Threshold Approach by Ogiela, Marek R., Ogiela, Urszula
Information Security Management Handbook, Volume 7 by
Official (ISC)2(R) Guide to the ISSAP(R) CBK by
Basic Politics of Movement Security: A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks by Hiscocks, Mandy, Sakai, J.
Selinux Policy Administration by Vermeulen, Sven
The CEO's Manual on Cyber Security by Scott, James
Malware Narratives: An Introduction by Software Diagnostics Services, Vostokov, Dmitry
Cisco a Beginner's Guide, Fifth Edition by Velte, Anthony, Velte, Toby
Conduite et Maîtrise de l'Audit Informatique: La méthode CMAI by Hallepee, Didier
Managing Information Security by
Network and System Security by
Cyber Security and It Infrastructure Protection by Vacca, John R.
Complete Internet Privacy: The Quickest Guide to Being Anonymous Online by Cox, Craig
Microsoft Directaccess Best Practices and Troubleshooting by Krause, Jordan
What They Didn't Teach at the Academy: Topics, Stories, and Reality Beyond the Classroom by
Secure IP Mobility Management for Vanet by Shen, Xuemin, Taha, Sanaa
Security in Computing and Communications: International Symposium, Sscc 2013, Mysore, India, August 22-24, 2013. Proceedings by
Security and Trust Management: 9th International Workshop, STM 2013, Egham, Uk, September 12-13, 2013, Proceedings by
Trustworthy Global Computing: 7th International Symposium, Tgc 2012, Newcastle Upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers by
Sichere Web-Anwendungen by Szameitat, Daniel
Sicherheit von Android-Betriebssystemen by Szameitat, Daniel, Haug, Martin
Kali Linux Cookbook by Pritchett, Willie
Secure Smart Embedded Devices, Platforms and Applications by
Security, Privacy and Trust in Cloud Systems by
Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements by Watson, David Lilburn, Jones, Andrew
Security, Privacy, and Applied Cryptography Engineering: Third International Conference, Space 2013, Kharagpur, India, October 19-23, 2013, Proceeding by
Provable Security: 7th International Conference, Provsec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings by
Cuckoo Malware Analysis by Muhardianto, Iqbal, Oktavianto, Digit
Research in Attacks, Intrusions, and Defenses: 16th International Symposium, Raid 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings by
Private Information Retrieval by Paulet, Russell, Bertino, Elisa, Yi, Xun
The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice by Castrillo, Ileana, Rountree, Derrick
Business Continuity and Disaster Recovery Planning for IT Professionals by Rima, Chris, Snedaker, Susan
Advances in Digital Forensics IX: 9th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 28-30, 2013, Revised Selec by
This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers by Greenberg, Andy
Vmware Vcloud Security by Sarkar, Prasenjit
Cyber-Physical Systems: Integrated Computing and Engineering Design by Hu, Fei
Intrusion Detection for Ip-Based Multimedia Communications Over Wireless Networks by Tang, Jin, Cheng, Yu
Architectures and Protocols for Secure Information Technology Infrastructures by
Organizational, Legal, and Technological Dimensions of Information System Administration by
IBM Mainframe Security by Dattani, Dinesh D.
Hardware Malware by Dabrowski, Adrian, Weippl, Edgar, Krieg, Christian
Critical Information Infrastructure Security: 6th International Workshop, Critis 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Pap by
Security Basics for Computer Architects by Lee, Ruby B.
Practical Biometrics: From Aspiration to Implementation by Ashbourn, Julian
An Introduction to Information Security and ISO27001: 2013: A Pocket Guide by Watkins, Steve G.
ISO27001/ISO27002 a Pocket Guide - Second Edition: 2013 by Calder, Alan
How to Secure Your Computer by Perry, William G.
Cryptographic Applications of Analytic Number Theory: Complexity Lower Bounds and Pseudorandomness by Shparlinski, Igor
Instant Windows PowerShell by Menon, Vinith
Digital Forensics and Cyber Crime: 4th International Conference, Icdf2c 2012, Lafayette, In, Usa, October 25-26, 2012, Revised Selected Papers by
Financial Cryptography and Data Security: FC 2013 Workshops, Usec and Wahc 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers by
Decision and Game Theory for Security: 4th International Conference, Gamesec 2013, Fort Worth, Tx, Usa, November 11-12, 2013, Proceedings by
Transactions on Large-Scale Data- And Knowledge-Centered Systems X: Special Issue on Database- And Expert-Systems Applications by
Internet and Distributed Computing Systems: 6th International Conference, Idcs 2013, Hangzhou, China, October 28-30, 2013, Proceedings by
Advances in Information and Computer Security: 8th International Workshop on Security, Iwsec 2013, Okinawa, Japan, November 18-20, 2013, Proceedings by
Secure It Systems: 18th Nordic Conference, Nordsec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings by
Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems by Lan, Pang-Chang, Kuo, C. -C Jay, Hong, Y. -W Peter
Cybercrime: Eine Gefährdung der Sicherheit im Informationszeitalter? by Hübert, Alexander
Cyber Security: Deterrence and It Protection for Critical Infrastructures by
Femtocells: Secure Communication and Networking by Wong, Marcus
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by Winterfeld, Steve, Andress, Jason
Information and Communications Security: 15th International Conference, Icics 2013, Beijing, China, November 20-22, 2013, Proceedings by
Location Privacy Protection in Mobile Networks by Li, Xiaolin, Liu, Xinxin
Managing Intelligence: A Guide for Law Enforcement Professionals by Buckley, John
WordPress Security Fundamentals: Protect Your Website from Hackers and Identify WordPress Security Issues by Webster, Blake
Cryptology and Network Security: 12th International Conference, Cans 2013, Paraty, Brazil, November 20-22, 2013, Proceedings by
Automated Security Management by
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats by
Gns3 Network Simulation Guide by Welsh, Chris
When Technocultures Collide: Innovation from Below and the Struggle for Autonomy by Genosko, Gary
ISSE 2013 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2013 Conference by
Security Assessment in Vehicular Networks by Du, Suguo, Zhu, Haojin
Security and Privacy Preserving in Social Networks by
Journal of Cyber Security and Mobility 2-3/4 by
Advances in Cryptology - Asiacrypt 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, by
Advances in Cryptology -- Asiacrypt 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, by
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications by
Cybersecurity by Mowbray, Thomas J.
Progress in Cryptology - Indocrypt 2013: 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings by
Distributed Denial of Service Attack and Defense by Yu, Shui
Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Select by
Security and the Networked Society by Glance, David, Gregory, Mark A.
Information and Network Security Management: Strategic Concept Applications by Adebiaye, Richmond S.
Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings by
Trusted Systems: 5th International Conference, Intrust 2013, Graz, Austria, December 4-5, 2013, Proceedings by
Advances in Digital Forensics VII: 7th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 31 - February 2, 2011, Re by
Assessment of Access Control Systems by Nist
Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures by Pasanen, Sanna, Haataja, Keijo, Hyppönen, Konstantin
Computer Security Division 2010 Annual Report by Nist
Computer Security Division 2011 Annual Report by Nist
Security Protocols: 21st International Workshop, Cambridge, Uk, March 19-20, 2013, Revised Selected Papers by
Social Media Security: Leveraging Social Networking While Mitigating Risk by Cross, Michael
Black Code: Surveillance, Privacy, and the Dark Side of the Internet by Deibert, Ronald J.
Introduction to Information Security by Spring, Jonathan, Shimeall, Timothy
Cyberspace and International Relations: Theory, Prospects and Challenges by
Critical Information Infrastructures Security: 7th International Workshop, Critis 2012, Lillehammer, Norway, September 17-18, 2012. Revised Selected P by
Primality and Cryptography by
Information Systems Security: 9th International Conference, Iciss 2013, Kolkata, India, December 16-20, 2013. Proceedings by
Policing Transnational Organized Crime and Corruption: Exploring the Role of Communication Interception Technology by Congram, M., Bell, P.
Spring Security 3.X Cookbook by Mankale, Anjana
Implementing Appfog by Nohr, Matthew
Computer Incident Response and Forensics Team Management by Johnson, Leighton
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters by Greene, James, Futral, William
Seitenkanalangriffe: Power Analysis by Hoffmann, Thomas
Getting Started with Fortigate by Rosato, Fabbri, Volpe, Fabrizio
The Evolution of Policing: Worldwide Innovations and Insights by
Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime by
The Case for the ISO27001: 2013 (Large Print Edition) by It Governance, Calder, Alan
Advances in Information Technology: 6th International Conference, Iait 2013, Bangkok, Thailand, December 12-13, 2013. Proceedings by
Cryptography and Coding: 14th Ima International Conference, Imacc 2013, Oxford, Uk, December 17-19, 2013, Proceedings by
Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa, by
Applied Information Security: A Hands-On Approach by Schläpfer, Michael, Basin, David, Schaller, Patrick
An Investigation Into the Detection and Mitigation of Denial of Service (Dos) Attacks: Critical Information Infrastructure Protection by
Network Security Technologies: Design and Applications by
Vorratsdatenspeicherung: Zwischen Überwachungsstaat Und Terrorabwehr by Moser-Knierim, Antonie
Modern Cryptography Primer: Theoretical Foundations and Practical Applications by Kościelny, Czeslaw, Kurkowski, Miroslaw, Srebrny, Marian
Hacking with Kali: Practical Penetration Testing Techniques by Broad, James, Bindner, Andrew
Measuring Itsm: Measuring, Reporting, and Modeling the It Service Management Metrics That Matter Most to It Senior Executives by Steinberg, Randy A.
Introduction to Public Key Infrastructures by Wiesmaier, Alexander, Buchmann, Johannes A., Karatsiolis, Evangelos
Security and Privacy for Implantable Medical Devices by
Security Management: A Critical Thinking Approach by Land, Michael, Ricks, Bobby, Ricks, Truett
Transactions on Large-Scale Data- And Knowledge-Centered Systems XII by
Instant Java Password and Authentication Security by Mayoral, Fernando
Applied Network Security Monitoring: Collection, Detection, and Analysis by Sanders, Chris, Smith, Jason
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud by Siepmann, Frank
Core Software Security: Security at the Source by Ransome, James, Misra, Anmol
Transactions on Large-Scale Data- And Knowledge-Centered Systems XI: Special Issue on Advanced Data Stream Management and Continuous Query Processing by
A Framework for Designing Cryptographic Key Management Systems by Nist
Computational Intelligence, Cyber Security and Computational Models: Proceedings of Icc3, 2013 by
Cloud Storage Forensics by Martini, Ben, Choo, Raymond, Quick, Darren
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS) by Nist
The Economics of Information Security and Privacy by
Border Gateway Protocol Security by Nist
Critical Infrastructure Protection VII: 7th Ifip Wg 11.10 International Conference, Iccip 2013, Washington, DC, Usa, March 18-20, 2013, Revised Select by
Complete Guide to Anonymous Torrent Downloading and File-Sharing: A Practical, Step-By-Step Guide on How to Protect Your Internet Privacy and Anonymit by Bailey, Matthew
Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War by
What Happens in Vegas Stays on YouTube: Privacy Is Dead. The New Rules of Reputation. by Qualman, Erik
Monitoring with Opsview by Wijntje, Alan
Security and Trust in Online Social Networks by Viviani, Marco, Carminati, Barbara, Ferrari, Elena
Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition by Collier, Mark, Endler, David
Security Management of Next Generation Telecommunications Networks and Services by Jacobs, Stuart
Spaßguerilla 2.0 oder globale Revolution?: Eine motivorientierte Analyse von Struktur, Kultur und Methoden der Anonymous-Bewegung by Knab, Julian
Computer Security Incident Handling Guide by Nist
Creating a Patch and Vulnerability Management Program by Nist
Building a Home Security System with Beaglebone by Pretty, Bill
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides by Casey, Eoghan, Aquilina, James M., Malin, Cameron H.
Hackers and Crackers: Cyber-Criminal Have YOU Targeted! by Preston, Treat
RFID Security and Privacy by Deng, Robert, Bertino, Elisa, Li, Yingjiu
Protecting Our Future, Volume 1: Educating a Cybersecurity Workforce by
Analyzing Security, Trust, and Crime in the Digital World by
Research Developments in Biometrics and Video Processing Techniques by
Advances in Secure Computing, Internet Services, and Applications by