• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2017

Android Application Pentesting Handbook 2 by Huntley, Samuel
Hacklog Volume 1 Anonimato: Manuale sulla Sicurezza Informatica e Hacking Etico by Novelli, Stefano
Digital Communication A Practical Guide to Data Communication Networking by Kumaravel, Dr K.
Information Security for the Busy Entrepreneur or Manager: What you need to know, minus the paranoia by Ableson, W. Frank
Cybersecurity Exposed: The Cyber House Rules by Meeuwisse, Raef
Ransomware: Defending Against Digital Extortion by Liska, Allan, Gallo, Timothy
How to Bullet Proof Your LinkedIn Profile: 10 Security Issues to Avoid by Gallagher, Patrick X.
Windows Stack Exploitation 2 by Huntley, Samuel
Security-Aware Design for Cyber-Physical Systems: A Platform-Based Approach by Sangiovanni-Vincentelli, Alberto, Lin, Chung-Wei
Open Source Intelligence Investigation: From Strategy to Implementation by
Hardware IP Security and Trust by
Topics in Cryptology - Ct-Rsa 2017: The Cryptographers' Track at the Rsa Conference 2017, San Francisco, Ca, Usa, February 14-17, 2017, Proceedings by
Psychology and Law in Europe: When West Meets East by
Facing Cyber Threats Head On: Protecting Yourself and Your Business by Minick, Brian
Hardware Protection Through Obfuscation by
Personal Cybersecurity: How to Avoid and Recover from Cybercrime by Waschke, Marvin
Smart Computing and Communication: First International Conference, Smartcom 2016, Shenzhen, China, December 17-19, 2016, Proceedings by
Blue Team Field Manual (BTFM) by White, Alan J., Clark, Ben
Coded Code Word Keeper: Keep your code words secret without hiding the book by Rothwell, Steve
Management Der Informationssicherheit: Kontrolle Und Optimierung by Sowa, Aleksandra
Securing the Internet of Things by Xu, Li Da, Li, Shancang
Security Testing with Kali NetHunter by Dieterle, Daniel W.
Network Security Assessment: Know Your Network by McNab, Chris
Threat Intelligence and Me: A Book for Children and Analysts by Lee, Robert M.
Journal of Cyber Security and Mobility (6-1) by
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers by Metheny, Matthew
Internet of Vehicles - Technologies and Services: Third International Conference, Iov 2016, Nadi, Fiji, December 7-10, 2016, Proceedings by
Iot Security Issues by Gilchrist, Alasdair
Information Security Practices: Emerging Threats and Perspectives by
Tor: Tor and the Deep Web: A Guide to Become Anonymous Online, Conceal Your IP Address, Block NSA Spying and Hack! by Welsh, Joshua
Sicherheit in vernetzten Systemen: 24. DFN-Konferenz by
Electronic Voting: First International Joint Conference, E-Vote-Id 2016, Bregenz, Austria, October 18-21, 2016, Proceedings by
C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking and Mobile Hacking by Cody, Isaac D.
Red Team: An Attack Paradigm by Knowell, Richard
Python: Penetration Testing for Developers: Penetration Testing for Developers: Execute effective tests to identify software v by May, Benjamin, Mabbitt, Andrew, Duffy, Christopher
Raspberry Pi: Amazing Projects from Scratch by Kakkar, Arush, Pajankar, Ashwin, Grimmett, Richard
Hacking: A Complete Practical Guide For Beginners To Learn Ethical Computer Hacking and Security by Draper, Brian
Data for the People: How to Make Our Post-Privacy Economy Work for You by Weigend, Andreas
Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind by Bone, James
Convergence Security: Journal Volume 1 - 2016 by
Introduction to Privacy Engineering and Risk Management in Federal Systems: NISTIR 8062 Jan 2017 by National Institute of Standards
Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities by Asharaf, S., Adarsh, S.
Blockchain Applications: A Hands-On Approach by Bahga, Arshdeep, Madisetti, Vijay
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina gattino rossiccio che si riposa by Agende Pratiche
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina gattino giocoso by Agende Pratiche
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina gattino con occhi blu by Agende Pratiche
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina Jack Russell Terrier by Agende Pratiche
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina cucciolo Golden Retriever by Agende Pratiche
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina Mastino Francese by Agende Pratiche
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina cavallo nero by Agende Pratiche
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina tenero puledro by Agende Pratiche
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina cavallo curioso by Agende Pratiche
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations by Buchanan, Ben
Security Breaches and Threat Prevention in the Internet of Things by
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina Basset Hound by Agende Pratiche
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina piccolo pony by Agende Pratiche
PCI Compliance, Version 3.2: The Latest on PCI DSS Compliance by Adamson, James K., Williams, Branden R.
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa cavalo preto by Coisas Realmente Úteis
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa potro bonito by Coisas Realmente Úteis
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa pónei pequeno by Coisas Realmente Úteis
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa cavalo curioso by Coisas Realmente Úteis
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina gatto "cucù" by Agende Pratiche
Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken by Steinicke, Tobias
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa peekaboo by Coisas Realmente Úteis
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa gatinho ruivo a relaxar by Coisas Realmente Úteis
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa gatinho brincalhão by Coisas Realmente Úteis
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa gatinho de olhos azuis by Coisas Realmente Úteis
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa Jack Russell Terrier by Coisas Realmente Úteis
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa cachorrinho Golden Retriever by Coisas Realmente Úteis
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa Basset by Coisas Realmente Úteis
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa French Mastiff by Coisas Realmente Úteis
Python Scapy Dot11: Programacion en Python para pentesters Wi-Fi by Hansen, Yago
Hacking: The No-Nonsense Guide: Learn Ethical Hacking Within 12 Hours! by University, Cyberpunk
Quantum Information Theory by Wilde, Mark M.
Guida al Pentesting con Parrot Security OS by Caranti, Milo Massimo
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa gatinho ruivo a relaxar - Português (Brasil) by Agendas E. Cadernos
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa gatinho brincalhão - Português (Brasil) by Agendas E. Cadernos
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa gatinho de olhos azuis - Português (Brasil) by Agendas E. Cadernos
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa Jack Russell Terrier - Português (Brasil) by Agendas E. Cadernos
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa cachorrinho Golden Retriever - Português (Brasil) by Agendas E. Cadernos
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa Basset - Português (Brasil) by Agendas E. Cadernos
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa French Mastiff - Português (Brasil) by Agendas E. Cadernos
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa cavalo preto - Português (Brasil) by Agendas E. Cadernos
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa potro bonito - Português (Brasil) by Agendas E. Cadernos
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa pônei pequeno - Português (Brasil) by Agendas E. Cadernos
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa cavalo curioso - Português (Brasil) by Agendas E. Cadernos
As Easy as Morse: Memorize the Morse Code using Fun Illustrations by Stargazer, Sanyukta, Bhatnagar, Sanyukta
Agenda de Senhas: Agenda para endereços eletrônicos e senhas: Capa gato peekaboo - Português (Brasil) by Agendas E. Cadernos
Information Security and Cryptology - Icisc 2016: 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected by
Communication, Control and Security Challenges for the Smart Grid by
Interoperability, Safety and Security in Iot: Second International Conference, Interiot 2016 and Third International Conference, Saseiot 2016, Paris, by
Digital Forensics and Watermarking: 15th International Workshop, Iwdw 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers by
Hacking: 2 Books: Beginners Guide and Advanced Tips by Anderson, Mark
OpenVPN Cookbook, Second Edition by Keijser, Jan Just
Information Systems Security and Privacy: Second International Conference, Icissp 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers by
Hacking With Python: The Complete and Easy Guide to Ethical Hacking, Python Hacking, Basic Security, and Penetration Testing - Learn How to by Welsh, Joshua
Blockchain: The Untapped Goldmine Of Blockchain That Virtually No One Knows About by Publishing, Writers International, Barnett, Alex
Information Security of Highly Critical Wireless Networks by Abaimov, Stanislav, Gaycken, Sandro, Martellini, Maurizio
Information Science and Applications (Icisa) 2016 by
Blockchain & FinTech: A Comprehensive Blueprint to Understanding Blockchain & Financial Technology. 2 Books in 1. by Hayen, Richard
Kish Cypher, The: The Story of Kljn for Unconditional Security by Kish, Laszlo B.
Public-Key Cryptography - Pkc 2017: 20th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, the Netherlands, by
Public-Key Cryptography - Pkc 2017: 20th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, the Netherlands, by
Securing Government Information and Data in Developing Countries by
Tor: Exactly How to Remain Invisible on the Anonymous Deep Web by Cody, Joshua
The Internet of Risky Things: Trusting the Devices That Surround Us by Smith, Sean
Secure and Privacy-Preserving Data Communication in Internet of Things by Zhu, Liehuang, Zhang, Zijian, Xu, Chang
Cyber Warfare in the 21st Century: Threats, Challenges, and Opportunities: Testimony Before the House Committee on Armed Services by House Committee on Armed Services
Risks and Security of Internet and Systems: 11th International Conference, Crisis 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers by
Feistel Ciphers: Security Proofs and Cryptanalysis by Patarin, Jacques, Volte, Emmanuel, Nachef, Valerie
Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers by
INFORMATION AS POWER CHINA'S CYBER POWER and AMERICA'S NATIONAL SECURITY by Spade, Jayson M., War College, U. S. Army
Privacy and Security Policies in Big Data by
Kompendium der Kryptologie: Die Welt der elektronischen Sicherheit in Theorie und Praxis by Brands, Gilbert
Der Paketfilter bei OpenWrt by Weidner, Mathias
Windows Virus and Malware Troubleshooting by Bettany, Andrew, Halsey, Mike
Cybersecurity: Geopolitics, Law, and Policy by Guiora, Amos N.
Smart Card Research and Advanced Applications: 15th International Conference, Cardis 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers by
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework by Kohnke, Anne, Sigler, Ken, Shoemaker, Dan
Easy Guide: JN0-130 Juniper Networks Certified Internet Specialist: Questions and Answers by Songer, Austin Vern
How to Keep Your Stuff Safe Online by Meeuwisse, Raef
Codes, Cryptology and Information Security: Second International Conference, C2si 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of C by
Lightweight Cryptography for Security and Privacy: 5th International Workshop, Lightsec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected by
How to Protect Yourself from Your Computer by Arena, Marc-Anthony C.
Cybersecurity: Geopolitics, Law, and Policy by Guiora, Amos N.
Hacking: 3 Manuscripts - Bitcoin, Tor, Hacking With Python by Welsh, Joshua
Advanced Image-Based Spam Detection and Filtering Techniques by Dhavale, Sunita Vikrant
Arithmetic of Finite Fields: 6th International Workshop, Waifi 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers by
EARLY WARNING and PREDICTION of INTERNET ATTACKS and EXPLOITS by Zeitz, Brian P. Major, Air Force Institute of Technology
Neun Schritte zum Erfolg: Ein Überblick zur Implementierung der Norm ISO 27001:2013 by Calder, Alan
Cybersecurity for Beginners by Meeuwisse, Raef
Cybersecurity for Beginners by Meeuwisse, Raef
Wireshark 101: Essential Skills for Network Analysis by Chappell, Laura
Data Analytics for Internal Auditors by Cascarino, Richard E.
Hacking with Python: Beginner's Guide to Ethical Hacking, Basic Security, Penetration Testing, and Python Hacking by Lane, Evan
Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals by Daniel, Lars, Sammons, John
Blockchain Basics: A Non-Technical Introduction in 25 Steps by Drescher, Daniel
Advanced Computing and Systems for Security: Volume Four by
Advanced Computing and Systems for Security: Volume Three by
Facebook: Keeping you Secure by Lyon, David
Build a Better Password: Create and Save Strong, Secure Passwords the Fun & Easy Way! by Mead, Danielle
Mastering Blockchain: Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks by Bashir, Imran
Information Science and Applications 2017: Icisa 2017 by
Enterprise Security: Second International Workshop, Es 2015, Vancouver, Bc, Canada, November 30 - December 3, 2015, Revised Selected Papers by
Hacking: Top Online Handbook in Exploitation of Computer Hacking, Security, and Penetration Testing by Pg Wizard Books
Transactions on Computational Science XXIX by
Advanced Penetration Testing: Hacking the World's Most Secure Networks by Allsopp, Wil
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework by Bullock, Jessey, Parker, Jeff T.
Detecting and Mitigating Robotic Cyber Security Risks by
How to Erase Yourself from the Internet Completely: How to Remain Anonymous Online by Menon, Mohan J.
Troubleshooting OpenVPN by Crist, Eric F.
Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain by Tsirigotis, Anthimos Alexandros
Bitcoins für Anfänger: Alles was Sie zum Thema Bitcoin wissen müssen. Eine Einführung in die Welt der Kryptowährung. by Sander, Philip
Dark Territory: The Secret History of Cyber War by Kaplan, Fred
Multimedia Security: Watermarking, Steganography, and Forensics by
Principles of Security and Trust: 6th International Conference, Post 2017, Held as Part of the European Joint Conferences on Theory and Practice of So by
Visual Cryptography and Secret Image Sharing by
Information Security Applications: 17th International Workshop, Wisa 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers by
Cybersecurity Exposed: The Cyber House Rules by Meeuwisse, Raef
Tor: Access the Dark Net, Stay Anonymous Online and Escape NSA Spying by Lane, Evan
Hacking for Beginners: The Complete Guide by Barnes, Tim
Security Solutions for AWS: Understanding Network Security and Performance Monitoring for Amazon Web Services by University, Argent
Solving Information Assurance Issues using Defense in Depth Measures and The Analytical Hiearchy Process by Alexander, Rodney
Informationelle Selbstbestimmung Im Digitalen Wandel by
Cybersecurity and Privacy - bridging the gap by
Advances in Cryptology - Eurocrypt 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, Franc by
Advances in Cryptology - Eurocrypt 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, Franc by
Advances in Cryptology - Eurocrypt 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, Franc by
Darkweb Cyber Threat Intelligence Mining by Robertson, John, Diab, Ahmad, Marin, Ericsson
Intelligent Textiles for Personal Protection and Safety by Cavanaugh, James
Cyberstrategien Für Unternehmen Und Behörden: Maßnahmen Zur Erhöhung Der Cyberresilienz by Frey, Stefanie, Bartsch, Michael
Privacy and Identity Management. Facing Up to Next Steps: 11th Ifip Wg 9.2, 9.5, 9.6/11.7, 11.4, 11.6/Sig 9.2.2 International Summer School, Karlstad, by
Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits by Bogart, Andy, Ablon, Lillian
Tor: Accessing The Deep Web & Dark Web With Tor: How To Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access The De by Jones, Jack
Privacy, Data Protection and Cybersecurity in Europe by
Iso27001/Iso27002: Ein Taschenführer by Calder, Alan
Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing by
Cisco Firepower 6.x with Firepower Threat Defense by Tatistcheff, Alex, Lammle, Todd
Hacking: The Complete Beginner's Guide To Computer Hacking: How To Hack Networks and Computer Systems, Information Gathering, P by Jones, Jack
Intelligence and Security Informatics: 12th Pacific Asia Workshop, Paisi 2017, Jeju Island, South Korea, May 23, 2017, Proceedings by
Hacking Wireless 101: ¡Cómo hackear redes inalámbricas fácilmente! by Astudillo B., Karina
Hacking: The Blueprint a Beginners Guide to Ethical Computer Hacking by Architects, Cyberpunk
How to Hack Like a God: Master the Secrets of Hacking Through Real Life Scenarios by Flow, Sparc
The 7 Minute Server: Build Your Own VPN by Hugg, Jen Harvey
Information Security: Principles and Practices by
It-Sicherheit: Digitalisierung Der Geschäftsprozesse Und Informationssicherheit by Gadatsch, Andreas, Mangiapane, Markus
Introduction to Evolutionary Informatics by Marks II, Robert J., Dembski, William A., Ewert, Winston
Progress in Cryptology - Africacrypt 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings by
Neuf étapes vers le succès: Un aperçu de la mise en oeuvre de la norme ISO 27001:2013 by Calder, Alan
Research Methods for Cyber Security by Manz, David O., Edgar, Thomas W.
Kali Linux Intrusion and Exploitation Cookbook: Powerful recipes to detect vulnerabilities and perform security assessments by Girdhar, Ishan, Shah, Dhruv
Datenschuul: Datenschutz op Platt by Pauls, Birgit
Risk Assessment and Risk-Driven Quality Assurance: 4th International Workshop, Risk 2016, Held in Conjunction with Ictss 2016, Graz, Austria, October by
Tactical Cyber: Building a Strategy for Cyber Support to Corps and Below by Serena, Chad C., Porche, Isaac R., Paul, Christopher
Tor: Remaining Anonymous on the Dark Net in an Era of NSA Spying by Price, Miles
Hacking & Tor: The Ultimate Beginners Guide To Hacking, Tor, & Accessing The Deep Web & Dark Web by Jones, Jack
Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses by Bossler, Adam, Holt, Thomas
Signal Processing and Networking for Big Data Applications by Wang, Dan, Han, Zhu, Hong, Mingyi
Study on Mobile Device Security by Department of Homeland Security
Applied Network Security by Salmon, Arthur, Levesque, Warun, McLafferty, Michael
See More