• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2015

The Mind of the Black Hat: Understanding Today's Cyber Criminal by Sanchez, Dennis Paul Nino S.
Journal of Cyber Security and Mobility 4-1: Resilient and Trustworthy IoT Systems by
Transactions on Large-Scale Data- And Knowledge-Centered Systems XVI: Selected Papers from Acomp 2013 by
Physically Unclonable Functions (Pufs): Applications, Models, and Future Directions by Wachsmann, Christian, Sadeghi, Ahmad-Reza
Don't Fall Victim to Identity Theft: How to Protect Your Name from Being Used Without Your Consent by Lewis, Brian
Healthcare Information Security and Privacy by Murphy, Sean P.
Oracle Database 12c Security by Gaetjen, Scott, Knox, David, Maroulis, William
Applications of Cryptography and Network Security by
Game Theoretic Analysis of Congestion, Safety and Security: Traffic and Transportation Theory by
Digital Forensics and Cyber Crime: Fifth International Conference, Icdf2c 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers by
Trustworthy Global Computing: 9th International Symposium, Tgc 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers by
The Hash Function Blake by Aumasson, Jean-Philippe, Meier, Willi, Phan, Raphael C. -W
Complete Guide to Internet Privacy, Anonymity & Security by Bailey, Matthew
Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day: Simple Steps to Help You Create Better Security Habits to Reduce the Risk of Bec by Fischer, Boaz
Attribute-Based Credentials for Trust: Identity in the Information Society by
Managing Information Security Breaches by Krausz, Michael
Detecting Peripheral-Based Attacks on the Host Memory by Stewin, Patrick
Assessing Information Security by Gavrilenko, Konstantin, Michajlowski, Andrei, Vladimirov, Andrew
Game Theoretic Analysis of Congestion, Safety and Security: Networks, Air Traffic and Emergency Departments by
Cyber Defense and Situational Awareness by
Trusted Computing Platforms: Tpm2.0 in Context by Chen, Liqun, Proudler, Graeme, Dalton, Chris
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security by Arthur, Will, Challener, David
Construction and Analysis of Cryptographic Functions by Budaghyan, Lilya
From Police to Security Professional: A Guide to a Successful Career Transition by D'Angelo, Michael S.
Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers by
Assessing Security and Privacy Controls in Federal Information Systems and Organ: NIST SP 800-53A Revision 4 - Building Effective Assessment Plans by Standards, National Instituteof
Vowel Inherent Spectral Change by
NIST SP 800-163 Vetting the Security of Mobile Applications: NiST SP 800-163 by National Institute of Standards and Tech
Wireless Ad-Hoc Networks by
Python Penetration Testing Essentials by Mohit
Spam: A Shadow History of the Internet by Brunton, Finn
Fundamentals of Sketch-Based Passwords: A General Framework by Snyder, Wesley E., Wang, Cliff, Riggan, Benjamin S.
Once More Unto the Breach, second edition by Simmpns, Andrea C.
Smartdata: Privacy Meets Evolutionary Robotics by
Data Protection and the Cloud: Are the risks too great? by Ticher, Paul
Engineering Secure Software and Systems: 7th International Symposium, Essos 2015, Milan, Italy, March 4-6, 2015, Proceedings by
Integrated Research in Steganography by
Boys Password Journal by Speedy Publishing LLC
The Business Immunity System: The Pitfalls & Side Effects of Data Handling, Privacy Issues, & Background Checks by Zahidi, Rachid
Dad's & Mom's Internet Safety Do's & Don'ts: Second Edition by Russell, Kevin
Web Application Security is a Stack (Large Print Edition) by Mac Vittie, Lori
Remember!: Your Simple Solution to Keeping & Organizing Passwords by Schultz, V. J.
Mastering the Nmap Scripting Engine by Calderón Pale, Paulino
The Mobile Application Hacker's Handbook by Erasmus, Tyrone, Colley, Shaun, Chell, Dominic
A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm: A Model To Enhance The Performance Of Cloud by Manisekaran, Pradheep
The CISO Handbook: A Practical Guide to Securing Your Company by Gentile, Michael, Collette, Ron, August, Thomas D.
Getting Started with Windows Server Security by Sivarajan, Santhosh
Learning iOS Security by Banks, Allister, Edge, Charles S.
Information Security: Principles and New Concepts (Volume I) by
Information Security: Principles and New Concepts (Volume II) by
Information Security: Principles and New Concepts (Volume III) by
Information Security: Principles and New Concepts (Volume IV) by
Transactions on Large-Scale Data- And Knowledge-Centered Systems XVII: Selected Papers from Dawak 2013 by
Online Advertising and Hidden Hazards to Consumer Security and Data Privacy by Permanent Subcommittee on Investigations
Cybersecurity in Our Digital Lives by
Cyber Warfare: A Reference Handbook by Springer, Paul
Candidate Multilinear Maps by Garg, Sanjam
Web Security: A WhiteHat Perspective by Wu, Hanqing, Zhao, Liz
Requirements for The Control of Electromagnetic Interference Characteristics of Subsystems and Equipment: MiL-STD-461G by Department of Defense
Information Security Risk Management: Risikomanagement Mit Iso/Iec 27001, 27005 Und 31010 by Klipper, Sebastian
Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide by Crawley, Don R.
Computing Security & Cryptography Handbook by
Hacking Wireless Networks - The ultimate hands-on guide by Kolokithas, Andreas
Remember!: Your Simple Solution to Keeping & Organizing Passwords (medium size edition) by Schultz, V. J.
Konfliktmanagement Für Sicherheitsprofis: Auswege Aus Der "buhmann-Falle" Für It-Sicherheitsbeauftragte, Datenschützer Und Co. by Klipper, Sebastian
Blockchain: Blueprint for a New Economy by Swan, Melanie
Build a Security Culture by Roer, Kai
Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I by
Introduction to Social Media Investigation: A Hands-On Approach by Golbeck, Jennifer
Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Wright, Joshua, Cache, Johnny
Scfm: Secure Coding Field Manual: A Programmer's Guide to OWASP Top 10 and CWE/SANS Top 25 by Wear, Sunny
Cyber Law in the Czech Republic by Polčák, Radim, Čermák, Jiří, Loebl, Zbyněk
Public-Key Cryptography -- Pkc 2015: 18th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, Usa, Marc by
Transactions on Large-Scale Data- And Knowledge-Centered Systems XVIII: Special Issue on Database- And Expert-Systems Applications by
Security Issues in Mobile Nfc Devices by Roland, Michael
Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II by
Advances in Information Retrieval: 37th European Conference on IR Research, Ecir 2015, Vienna, Austria, March 29 - April 2, 2015. Proceedings by
Transactions on Large-Scale Data- And Knowledge-Centered Systems XIX: Special Issue on Big Data and Open Data by
Arithmetic of Finite Fields: 5th International Workshop, Waifi 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers by
Recent Progress in Biometrics by
Zabbix Cookbook by Uytterhoeven, Patrik
Secrets and Lies: Digital Security in a Networked World by Schneier, Bruce
Providing Assurance to Cloud Computing through ISO 27001 Certification: How Much Cloud is Secured After Implementing Information Security Standards by Tariq, Muhammad Imran
Violence in Nigeria: Patterns and Trends by Haken, Nate, Taft, Patricia
Topics in Cryptology -- Ct-Rsa 2015: The Cryptographer's Track at the Rsa Conference 2015, San Francisco, Ca, Usa, April 20-24, 2015. Proceedings by
Passive and Active Measurement: 16th International Conference, Pam 2015, New York, Ny, Usa, March 19-20, 2015, Proceedings by
Lightweight Cryptography for Security and Privacy: Third International Workshop, Lightsec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selecte by
Information Security and Cryptology - Icisc 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers by
Smart Card Research and Advanced Applications: 13th International Conference, Cardis 2014, Paris, France, November 5-7, 2014. Revised Selected Papers by
Protocols and Procedures of Cryptography and Network Security by
How Data Mining Threatens Student Privacy by Committee on Homeland Security House of
Kali Linux Wireless Penetration Testing Beginner's Guide: Master wireless testing techniques to survey and attack wireless networks with Kali Linux by Ramachandran, Vivek, Buchanan, Cameron
Learning AirWatch by Dunkerley, Mark
Learning Puppet Security by Slagle, Jason
Elastix Unified Communications Server Cookbook by Barajas Puente, Gerardo
NISTIR 7823 Advanced Metering Infrastructure Smart Meter Upgradeability Test Fra: nistir 7823 by National Institute of Standards and Tech
Transactions on Large-Scale Data- And Knowledge-Centered Systems XX: Special Issue on Advanced Techniques for Big Data Management by
Advances in Cryptology - Eurocrypt 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulga by
Security Technology Convergence Insights by Bernard, Ray
Measuring and Communicating Security's Value: A Compendium of Metrics for Enterprise Protection by Campbell, George
Python Hacking Essentials by Wish, Earnest
Seguridad en Bases de Datos y Aplicaciones Web by Gallardo Aviles, Gabriel
Group Theoretic Cryptography by Steinwandt, Rainer, González Vasco, Maria Isabel
Advances in Cryptology - Eurocrypt 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulga by
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails by Fincher, Michele, Hadnagy, Christopher
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain by
The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and our Democratic Process by Burnham, David
Principles of Security and Trust: 4th International Conference, Post 2015, Held as Part of the European Joint Conferences on Theory and Practice of So by
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, Dpm 2014, 7th International Workshop, Se by
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers by
Information Theoretic Security: 8th International Conference, Icits 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings by
Progress in Cryptology - Latincrypt 2014: Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil by
Proactive Botnet Detection: Through Characterization of Distributed Denial of Service Attacks by Hyslip, Thomas S.
One Creepy Street: The Spider on the Web by Jordan, Lee
Advances in Audio Watermarking Based on Singular Value Decomposition by Dhar, Pranab Kumar, Shimamura, Tetsuya
Enterprise Identity Management: Towards an Investment Decision Support Approach by Royer, Denis
Foundations of Information Security Based on Iso27001 and Iso27002 by
Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare by
Foundations and Practice of Security: 7th International Symposium, Fps 2014, Montreal, Qc, Canada, November 3-5, 2014. Revised Selected Papers by
Intelligence and Security Informatics: Pacific Asia Workshop, Paisi 2015, Ho CHI Minh City, Vietnam, May 19, 2015. Proceedings by
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family by Payton, Theresa, Claypoole, Ted
Agile Information Security: Using Scrum to Survive in and Secure a Rapidly Changing Environment by Fitzer, James R.
Hacking: Hacking Essentials, What You Must Know About Hacking by Boy, Hacking
Counterterrorism and Cybersecurity: Total Information Awareness by Lee, Newton
Information Security Practice and Experience: 11th International Conference, Ispec 2015, Beijing, China, May 5-8, 2015, Proceedings by
What Happens on Campus Stays on YouTube: The NEW rules for your reputation on campus, online, and beyond. by O'Connell, Courtney, Brown, Paul Gordon, Meriwether, Jason L.
Cyber Warfare: Building the Scientific Foundation by
Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field by O'Gara, Adrian
Aspect-Oriented Security Hardening of UML Design Models by Mouheb, Djedjiga, Pourzandi, Makan, Debbabi, Mourad
Securing SQL Server: Protecting Your Database from Attackers by Cherry, Denny
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques by Chauhan, Sudhanshu, Panda, Nutan Kumar
The Tao of Open Source Intelligence by Bertram, Stewart
My Password Vault: All Your Passwords In One Place by Sargent, Sans
Password Keeper by Speedy Publishing LLC
Password Journal by Speedy Publishing LLC
My Password Journal by Speedy Publishing LLC
Cybersecurity Information Sharing Act of 2015 by Select Committee on Intelligence
Beyond Cybersecurity: Protecting Your Digital Business by Bailey, Tucker, O'Halloran, Derek, Kaplan, James M.
Transactions on Data Hiding and Multimedia Security X by
Secret Password Journal by Speedy Publishing LLC
Pattern and Security Requirements: Engineering-Based Establishment of Security Standards by Beckers, Kristian
Learning Android Forensics by Tindall, Donnie, Tamma, Rohit
Cyber Attack Information System: Erfahrungen Und Erkenntnisse Aus Der Ikt-Sicherheitsforschung by
Encyclopedia of Biometrics by
New Threats and Countermeasures in Digital Crime and Cyber Terrorism by
Remember!: Your Simple Solution to Keeping & Organizing Passwords (small size edition) by Schultz, V. J.
Spam Nation: The Inside Story of Organized Cybercrime--From Global Epidemic to Your Front Door by Krebs, Brian
Password Journal and Website Keeper by Speedy Publishing LLC
Website Address Book by Speedy Publishing LLC
Codes, Cryptology, and Information Security: First International Conference, C2si 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thi by
JIRA Essentials - Third Edition by Li, Patrick
Two-Factor Authentication by Stanislav, Mark
Fast Software Encryption: 21st International Workshop, Fse 2014, London, Uk, March 3-5, 2014. Revised Selected Papers by
A Guide to Enterprise Networking Technology: Volume 1 by Devaraj, Manju
Risks and Security of Internet and Systems: 9th International Conference, Crisis 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers by
Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger by Lawrence, Eric
Smart Grid Security by Goel, Sanjay, Hong, Yuan, Papakonstantinou, Vagelis
Leakage Resilient Password Systems by Li, Yingjiu, Yan, Qiang, Deng, Robert H.
Official (Isc)2 Guide to the Cissp-Issmp Cbk by Steinberg, Joseph
Self- And Co-Regulation in Cybercrime, Cybersecurity and National Security by Tropina, Tatiana, Callanan, Cormac
Data Security: Examining Efforts to Protect Americans' Financial Information by Subcommittee on Financial Institutions a.
Trust Management IX: 9th Ifip Wg 11.11 International Conference, Ifiptm 2015, Hamburg, Germany, May 26-28, 2015, Proceedings by
Digital and Software Piracy: A Selective Annotated Bibliography of Dissertations and Theses by Angelini, Zander
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats by Siegel, Stanley, Williams, Chris K., Donaldson, Scott
Securing Systems: Applied Security Architecture and Threat Models by Schoenfield, Brook S. E.
Advanced Dpa Theory and Practice: Towards the Security Limits of Secure Embedded Circuits by Peeters, Eric
Quantum Attacks on Public-Key Cryptosystems by Yan, Song Y.
Hacking: Basic Security, Penetration Testing and How to Hack by Sharpe, Isaac
Information Security Education Across the Curriculum: 9th Ifip Wg 11.8 World Conference, Wise 9, Hamburg, Germany, May 26-28, 2015, Proceedings by
Policies and Research in Identity Management: Third Ifip Wg 11.6 Working Conference, Idman 2013, London, Uk, April 8-9, 2013, Proceedings by
ICT Systems Security and Privacy Protection: 30th Ifip Tc 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings by
Hacking: Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide by Spivak, Walter
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis by Ucedavelez, Tony, Morana, Marco M.
Hacking: Ultimate Hacking for Beginners, How to Hack by McKinnon, Andrew
Nmap Essentials by Shaw, David
VMware vSphere Essentials by Kumar, Kunal
Datensicherheit und Datenschutz im Cloud Computing. Fallstudie und kritische Analyse: Dropbox und JiffyBox by Michl, Johannes
Protecting Privacy in Data Release by Livraga, Giovanni
Future Network Systems and Security: First International Conference, Fnss 2015, Paris, France, June 11-13, 2015, Proceedings by
The Theory and Reality of Wireless LAN Security: Final Year project by Halapacz, Tomasz
Cyber-Physical Attacks: A Growing Invisible Threat by Loukas, George
Hacking Into Thinking Machines by Sawarkar, Yash Mahesh
Information Security and Privacy: 20th Australasian Conference, Acisp 2015, Brisbane, Qld, Australia, June 29 -- July 1, 2015, Proceedings by
Intelligent Mechanisms for Network Configuration and Security: 9th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and by
Cyber Security: Analytics, Technology and Automation by
Digital-Forensics and Watermarking: 13th International Workshop, Iwdw 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers by
The Book on Healthcare IT Volume 2: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology by Scott, James
Forensische Analyse von Flash-Speichern: Bachelorarbeit by Scherer, Daniel
Learning Python Network Programming: Utilize Python 3 to get network applications up and running quickly and easily by Sarker, M. Omar Faruque, Washington, Sam
The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues by Choo, Raymond, Ko, Ryan
Trust Management VII: 7th Ifip Wg 11.11 International Conference, Ifiptm 2013, Malaga, Spain, June 3-7, 2013, Proceedings by
Python Web Penetration Testing Cookbook by Mound, Dave, May, Benjamin, Buchanan, Cameron
Microsoft Dynamics AX 2012 R3 Security by Moustafa, Ahmed Mohamed Rafik
Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan by Bollinger, Jeff, Valites, Matthew, Enright, Brandon
Hacking Secrets: What Hackers don't Want You to Know? by Anonymous
Data and Applications Security and Privacy XXIX: 29th Annual Ifip Wg 11.3 Working Conference, Dbsec 2015, Fairfax, Va, Usa, July 13-15, 2015, Proceedi by
Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution by Teti, Antonio
Safe Computing is Like Safe Sex: You have to practice it to avoid infection by Lowe, Richard, Jr.
Troubleshooting CentOS by Hobson, Jonathan
Managing Online Accounts: Creating, managing, and tracking Internet online accounts by Forlanda, Juancho
See More