• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2014

Drugs on the Dark Net: How Cryptomarkets Are Transforming the Global Trade in Illicit Drugs by Martin, J.
Security and Privacy in Communication Networks: 9th International Icst Conference, Securecomm 2013, Revised Selected Papers by
Critical Information Infrastructures Security: 8th International Workshop, Critis 2013, Amsterdam, the Netherlands, September 16-18, 2013, Revised Sel by
Cybersecurity and Cyberwar: What Everyone Needs to Know(r) by Friedman, Allan, Singer, P. W.
Mobile Platform Security by Dmitrienko, Alexandra, Asokan, N., Davi, Lucas
Cyber-War: The Anatomy of the Global Security Threat by Richards, J.
Surveillance and Threat Detection: Prevention Versus Mitigation by Kirchner, Richard
Internet and the Law: Technology, Society, and Compromises by Schwabach, Aaron
Password Keeper: Password Reminder Book (Keyboard Cover) by Journals, Cool
What Is Computer Science?: An Information Security Perspective by Smart, Nigel, Page, Daniel
Introduction to Public Key Technology and the Federal PKI Infrastructure by Nist
Recommendation for Block Cipher Modes of Operation Methods and Techniques by Nist
NSA, BND & Co.: Die Möglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmaßnahmen by Brands, Gilbert
Computer Security: Bibliography Of Selected Computer Security Publications January 1980-October 1989 by Nist
Public Key Infrastructures, Services and Applications: 10th European Workshop, Europki 2013, Egham, Uk, September 12-13, 2013, Revised Selected Papers by
Anonymizing Health Data: Case Studies and Methods to Get You Started by Arbuckle, Luk, Emam, Khaled El
Privacy Technologies and Policy: First Annual Privacy Forum, Apf 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers by
Secure Cloud Computing by
Introduction to Biometrics by Jain, Anil K., Ross, Arun A., Nandakumar, Karthik
The Privacy Engineer's Manifesto: Getting from Policy to Code to Qa to Value by Finneran, Tom, Dennedy, Michelle, Fox, Jonathan
The State of the Art in Intrusion Prevention and Detection by
Theory of Cryptography: 11th International Conference, Tcc 2014, San Diego, Ca, Usa, February 24-26, 2014, Proceedings by
Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications by
419 the Cyberscam Game: Knowing the Hidden Corners of Their Lives by Fonba Jf, Jules Fonba
Anti-Hacker Tool Kit, Fourth Edition by Shema, Mike
Topics in Cryptology -- Ct-Rsa 2014: The Cryptographer's Track at the Rsa Conference 2014, San Francisco, Ca, Usa, February 25-28, 2014, Proceedings by
Information Theoretic Security: 7th International Conference, Icits 2013, Singapore, November 28-30, 2013, Proceedings by
Pairing-Based Cryptography -- Pairing 2013: 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers by
Passive and Active Measurement: 15th International Conference, Pam 2014, Los Angeles, Ca, Usa, March 10-11, 2014, Proceedings by
Intrusion Detection in Wireless Ad-Hoc Networks by
Sicherheit Und Vertrauen Im Internet: Eine Technische Perspektive by Sack, Harald, Meinel, Christoph
Risikomanagement Kompakt: Risiken Und Unsicherheiten Bewerten Und Beherrschen by Ebert, Christof
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions by Gomzin, Slava
Unmasking the Social Engineer: The Human Element of Security by Hadnagy, Christopher
Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation by Gazet, Alexandre, Bachaalany, Elias, Dang, Bruce
Threat Modeling: Designing for Security by Shostack, Adam
Recommendation for Key Management - Part 2: Best Practices for Key Management Organization by Barker, William, Burr, William, Barker, Elaine
Communication Networks for Smart Grids: Making Smart Grid Real by Budka, Kenneth C., Deshpande, Jayant G., Thottan, Marina
Gitolite Essentials by Chamarty, Sitaram
Computer Security: Adware or spyware removal and protection by Hicks, Allen E.
Penetration Testing with Backbox by Umit Uygur, Stefan
Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware by
Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises by Reed, Andy
Achieving Higher-Fidelity Conjunction Analyses Using Cryptography to Improve Information Sharing by Baiocchi, Dave, Welser, William, IV, Hemenway, Brett
Cyber Escroquerie: L`art Spectaculaire De FOUR-ONE-NINE by Fonba, Jules
Radio Frequency Identification: Security and Privacy Issues: Security and Privacy Issues 9th International Workshop, Rfidsec 2013, Graz, Austria, July by
Trust, Computing, and Society by
Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency: Is Hollywood's blueprint for Chaos coming true by Osborne, Mark
Public-Key Cryptography -- Pkc 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 2 by
Reversible Digital Watermarking: Theory and Practices by Chakraborty, Rajat Subhra, Naskar, Ruchira
Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, Snds 2014, Trivandrum, India, March 13-14, 2014. by
Mobility Data Management and Exploration by Pelekis, Nikos, Theodoridis, Yannis
ELSTER - Die elektronische Steuererklärung by Dieter, Susanne
Cloud Encrypted storage system and method, Attendance Management System: Provisional application #61875050 by Liubachev, Mikhail Leonidovich
Principles of Security and Trust: Third International Conference, Post 2014, Held as Part of the European Joint Conferences on Theory and Practice of by
The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk by Young, Carl
The Hacker Playbook: Practical Guide To Penetration Testing by Kim, Peter
DODI No 8500.01 Cybersecurity: DODI No. 8500.01 by Department of Defense
Learning Pentesting for Android by Gupta, Aditya
A Cryptography Primer: Secrets and Promises by Klein, Philip N.
A Cryptography Primer: Secrets and Promises by Klein, Philip N.
Network Hardening: An Automated Approach to Improving Network Security by Albanese, Massimiliano, Jajodia, Sushil, Wang, Lingyu
Trustworthy Global Computing: 8th International Symposium, Tgc 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers by
Information Security Applications: 14th International Workshop, Wisa 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers by
Extending Symfony 2 Web Application Framework by Armand, Sebastien
The Browser Hacker's Handbook by Orru, Michele, Alcorn, Wade, Frichot, Christian
Transactions on Large-Scale Data- And Knowledge-Centered Systems XIII by
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8 by Carvey, Harlan
Cryptography and Secure Communication by Blahut, Richard E.
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps: Sicherheitsanalyse von Microsoft Komponenten by Szameitat, Daniel
Android Hacker's Handbook by Lanier, Zach, Mulliner, Collin, Drake, Joshua J.
Building the Infrastructure for Cloud Security: A Solutions View by Castro-Leon, Enrique, Yeluri, Raghuram
Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia by
Multidisciplinary Perspectives in Cryptology and Information Security by
Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, Dpm 2013, and 6th International Workshop, Setop 2013, Egham, by
Information Security Practice and Experience: 10th International Conference, Ispec 2014, Fuzhou, China, May 5-8, 2014, Proceedings by
Kali Linux - Assuring Security by Penetration Testing: With Kali Linux you can test the vulnerabilities of your network and then take steps to secure by Allen, Lee, Ali, Shakeel, Heriyanto, Tedi
Framework for Improving Critical Infrastructure Cybersecurity by National Institute of Standards and Tech
Information and Communication Technology: Second Ifip Tc 5/8 International Conference, Ict-Eurasia 2014, Bali, Indonesia, April 14-17, 2014, Proceedin by
Foundations and Practice of Security: 6th International Symposium, Fps 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers by
Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography by
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications by
Protecting Oracle Database 12c by Wright, Paul
Collaboration with Cloud Computing: Security, Social Media, and Unified Communications by Messier, Ric
The Nsa Report: Liberty and Security in a Changing World by Clarke, Richard A., Morell, Michael J., President's Review Group on Intelligence and Communications
Learning Veeam(r) Backup and Replication for Vmware Vsphere by Mohn, Christian
Security for Service Oriented Architectures by Williams, Walter
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense by Ackroyd, Richard, Watson, Gavin, Mason, Andrew
Unimodal and Multimodal Biometric Data Indexing by Dey, Somnath, Samanta, Debasis
Software-Technologien und -Prozesse by
Journal of Cyber Security and Mobility 3-2, Special Issue on Next Generation Mobility Network Security by
Password Journal by Speedy Publishing LLC
PCI Compliance: The Definitive Guide by Bhargav, Abhay
Privacy and Identity Management for Emerging Services and Technologies: 8th Ifip Wg 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmeg by
Cyberwar, Cyberterror, Cybercrime: An In-Depth Guide to the Role of Standards in the Cybersecurity Environment - Second Edition by Mehan, Julie E.
Trust Management VI: 6th Ifip Wg 11.11 International Conference, Ifiptm 2012, Surat, India, May 21-25, 2012, Proceedings by
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach: Security in Cloud Computing by Dhivakar, Ashwin
Procuring Penetration Testing Services by Crest
Progress in Cryptology - Africacrypt 2014: 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings by
Privacy Technologies and Policy: Second Annual Privacy Forum, Apf 2014, Athens, Greece, May 20-21, 2014, Proceedings by
Intelligence and Security Informatics: Pacific Asia Workshop, Paisi 2014, Tainan, Taiwan, May 13, 2014, Proceedings by
Advances in Cryptology - Eurocrypt 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, by
ForensicsNet?/ForensicsLab?: Cyber Security in a Cloud! by Preston, Treat
Mastering Kali Linux for Advanced Penetration Testing by Beggs, Robert
Mastering Metasploit by Jaswal, Nipun
Qc-Ldpc Code-Based Cryptography by Baldi, Marco
No Trace Left: Internet Privacy Tips and Strategies to Protect Your Personal and Financial Information by Simmons, Rj
Querying Over Encrypted Data in Smart Grids by Lu, Rongxing, Liang, Xiaohui, Wen, Mi
Engineering Secure Future Internet Services and Systems: Current Research by
Human Aspects of Information Security, Privacy, and Trust: Second International Conference, Has 2014, Held as Part of Hci International 2014, Heraklio by
Disaster Recovery Using Vmware Vsphere(r) Replication and Vcenter Site Recovery Manager by Gb, Abhilash
Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns by
Information Security Breaches: Avoidance and Treatment Based on Iso27001 - Second Edition by Krausz, Michael
Secure Data Management: 10th Vldb Workshop, Sdm 2013, Trento, Italy, August 30, 2013, Proceedings by
Computer Forensics and Digital Investigation with EnCase Forensic v7 by Widup, Suzanne
Stuxnet: The True Story of Hunt and Evolution by Poroshyn, Roman
To the Cloud: Big Data in a Turbulent World by Mosco, Vincent
To the Cloud: Big Data in a Turbulent World by Mosco, Vincent
NISTIR 7924 Reference Certificate Policy: Draft by National Institute of Standards and Tech
Game Theory Applications in Network Design by Kim, Sungwook
Network Topology in Command and Control: Organization, Operation, and Evolution by
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers by Parno, Bryan Jeffrey
Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology by Hosmer, Chet
ICT Systems Security and Privacy Protection: 29th Ifip Tc 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings by
The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice by Andress, Jason
Computer Networks: 21st International Conference, Cn 2014, Brunów, Poland, June 23-27, 2014. Proceedings by
Selected Areas in Cryptography -- Sac 2013: 20th International Conference, Burnaby, Bc, Canada, August 14-16, 2013, Revised Selected Papers by
Information Security and Privacy Research: 27th Ifip Tc 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, by
Your Digital Footprint: Password Protection Requirements by Hudkins, Ronald E.
Configuration Management with Chef-Solo by Ur Rahman, Naveed
Building Virtual Pentesting Labs for Advanced Penetration Testing by Cardwell, Kevin
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records by Robichau, Bernard Peter
Penetration Testing: A Hands-On Introduction to Hacking by Weidman, Georgia
The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law by Air Command and General Staff College
Electronic Identity by Chen-Wilson, Lisha, Argles, David, De Andrade, Norberto Nuno Gomes
Praxisleitfaden Zur Implementierung Eines Datenschutzmanagementsystems: Ein Risikobasierter Ansatz Für Alle Unternehmensgrößen by Matz, Manuela, Wiedemann, Michael, Loomans, Dirk
Internet Censorship: A Reference Handbook by Schell, Bernadette
Ensuring Survivable Information Services: Architecting, Diagnosing and Reconfiguring by Air Force Research Laboratory
When is a Hack an Attack? A Sovereign State's Options if Attacked in Cyberspace: A Case Study of Estonia by Air Command and Staff College
Information Security - Weaknesses Place Commerce Data and Operations at Serious Risk by United States General Accounting Office
The Zealots Guide To Linux Mint Special Edition by Taylor, Brian
CyberCrime - A Clear and Present Danger: The CEO's Guide to Cyber Security by Smith, Roger W.
Electronic Authentication Guideline by Dodson, Donna F., Newton, Elaine M., Perlen, Ray a.
Wireless Multimedia Communication Systems: Design, Analysis, and Implementation by Bakmaz, Bojan M., Rao, K. R., Bojkovic, Zoran S.
Privacy Enhancing Technologies: 14th International Symposium, Pets 2014, Amsterdam, the Netherlands, July 16-18, 2014, Proceedings by
The Book on Healthcare IT: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology by Scott, James
Information Security in Diverse Computing Environments by
Applied Cryptography and Network Security: 12th International Conference, Acns 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings by
SharePoint 2010 Security for the Site Owner: and for Administrators and Developers! by Smith, Michael T.
Cloud Computing im Mittelstand. Vertrauensbasis und IT-Sicherheit als zentrale Erfolgsfaktoren by Harnau, Yvonne
Information Security Theory and Practice. Securing the Internet of Things: 8th Ifip Wg 11.2 International Workshop, Wistp 2014, Heraklion, Crete, Gree by
Monitoring and Securing Virtualized Networks and Services: 8th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and Secu by
Trust and Trustworthy Computing: 7th International Conference, Trust 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings by
Information Security and Privacy: 19th Australasian Conference, Acisp 2014, Wollongong, Nsw, Australia, July 7-9, 2014. Proceedings by
Smart Card Research and Advanced Applications: 12th International Conference, Cardis 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Pap by
Pervasive Wireless Environments: Detecting and Localizing User Spoofing by Chen, Yingying, Trappe, Wade, Yang, Jie
Bio-Inspiring Cyber Security and Cloud Services: Trends and Innovations by
Cybersecurity: Authoritative Reports and Resources, by Topic by Tehan, Rita
Network Intrusion Analysis by Fichera, Joe
Architecting User-Centric Privacy-As-A-Set-Of-Services: Digital Identity-Related Privacy Framework by Ben Ayed, Ghazi
Jqueryfordesigners: Beginner'sguide by Maclees, Natalie
Cybersecurity: Being Cyber Aware and Cyber Safe by Morimoto, Rand
Continued Rise of the Cloud: Advances and Trends in Cloud Computing by
Fast Software Encryption: 20th International Workshop, Fse 2013, Singapore, March 11-13, 2013. Revised Selected Papers by
Data and Applications Security and Privacy XXVIII: 28th Annual Ifip Wg 11.3 Working Conference, Dbsec 2014, Vienna, Austria, July 14-16, 2014, Proceed by
Digital-Forensics and Watermarking: 12th International Workshop, Iwdw 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers by
Risk Assessment and Risk-Driven Testing: First International Workshop, Risk 2013, Held in Conjunction with Ictss 2013, Istanbul, Turkey, November 12, by
A Mathematical Approach to Research Problems of Science and Technology: Theoretical Basis and Developments in Mathematical Modeling by
Advances in Cryptology -- Crypto 2014: 34th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 17-21, 2014, Proceedings, Part II by
Advances in Cryptology -- Crypto 2014: 34th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 17-21, 2014, Proceedings, Part I by
Restfuljavawebservicessecurity by Salazar, Andres, Reneenriquez, Rene
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory by Case, Andrew, Levy, Jamie, Hale Ligh, Michael
Trust Management VIII: 8th Ifip Wg 11.11 International Conference, Ifiptm 2014, Singapore, July 7-10, 2014, Proceedings by
Hackers Underground Knowledge: Quick and easy way to learn secret hacker techniques by Kohler, Martin
Journal of Cyber Security and Mobility 3-3, Special Issue on Big Data Theory and Practice by
Iso27001 in a Windows Environment by Honan, Brian
Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance by
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder. by Murdoch Gse, Don
Incident Response & Computer Forensics by Pepe, Matthew, Luttgens, Jason T., Mandia, Kevin
Social Engineering in It Security: Tools, Tactics, and Techniques by Conheady, Sharon
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, Dimva 2014, Egham, Uk, July 10-11, 2014, Proceedings by
Trust, Privacy, and Security in Digital Business: 11th International Conference, Trustbus 2014, Munich, Germany, September 2-3, 2014. Proceedings by
Advances in Information and Computer Security: 9th International Workshop on Security, Iwsec 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings by
Ethical Hacking and Penetration Testing Guide by Baloch, Rafay
United States Cybersecurity Strategy, Policy, and Organization: Poorly Postured to Cope with a Post-9/11 Security Environment by U. S. Army Command and General Staff Coll
Drugs on the Dark Net: How Cryptomarkets Are Transforming the Global Trade in Illicit Drugs by Martin, J.
Effective Child Abuse Investigation for the Multi-Disciplinary Team by Graham, Bradley Richard
Foundations of Security Analysis and Design VII: Fosad 2012 / 2013 Tutorial Lectures by
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine by Ruan, Xiaoyu
Privacy and Identity Management for Life: 7th Ifip Wg 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revis by
Recent Advances in Information Hiding and Applications by
The Algorithmic Foundations of Differential Privacy by Dwork, Cynthia, Roth, Aaron
ICT and Society: 11th Ifip Tc 9 International Conference on Human Choice and Computers, Hcc11 2014, Turku, Finland, July 30 - August 1, by
Soliton Coding for Secured Optical Communication Link by Alavi, Sayed Ehsan, Mahdaliza Idrus, Sevia, Sadegh Amiri, Iraj
Intrusion Detection System in mobile ad hoc network in MAC layer by Gondaliya, Tapan
Kali Linux Network Scanning Cookbook by Hutchens, Justin
Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice by
Smart Grid Security: Second International Workshop, Smartgridsec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers by
Cyberspace and Cybersecurity: Chinese translation by Kostopoulos, George K.
Availability, Reliability, and Security in Information Systems: Ifip Wg 8.4, 8.9, Tc 5 International Cross-Domain Conference, CD-Ares 2014 and 4th Int by
See More