• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2019

Advances in Cryptology - Eurocrypt 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, G by
Casp+ Comptia Advanced Security Practitioner Certification All-In-One Exam Guide, Second Edition (Exam Cas-003) by White, Gregory B., Lane, Nicholas, Conklin, Wm Arthur
It-Revision, It-Audit Und It-Compliance: Neue Ansätze Für Die It-Prüfung by Sowa, Aleksandra, Duscha, Peter, Schreiber, Sebastian
Mastering Ethereum by Grincalaitis, Merunas
Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation by Gilbert, Karl, Caudill, Benjamin
Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows by
5g for the Connected World by
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data: 13th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 Interna by
5G Explained by Penttinen, Jyrki T. J.
Security Tokens and Stablecoins Quick Start Guide by Kwok, Angela, Sun, Weimin, Wu, Xun (Brian)
Hyperledger Cookbook by Zhang, Andrew, Wu, Xun (Brian), Zhang, Chuanfeng
Security and Privacy: Second Isea International Conference, Isea-Isap 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers by
Cybersecurity Blue Team Toolkit by Tanner, Nadean H.
Computer Security: A Hands-on Approach by Du, Wenliang
Computer & Internet Security: A Hands-on Approach by Du, Wenliang
Computer & Internet Security: A Hands-on Approach by Du, Wenliang
Internet Security: A Hands-on Approach by Du, Wenliang
Cryptology and Error Correction: An Algebraic Introduction and Real-World Applications by Childs, Lindsay N.
Computing and Network Sustainability: Proceedings of Irscns 2018 by
Privacy and Identity in a Networked Society: Refining Privacy Impact Assessment by Strauß, Stefan
Active Directory Administration Cookbook by Berkouwer, Sander
Essential Firepower: Your best practice guide to configuring Cisco's Next Generation Firewall by Tatistcheff, Alex
Authentication Technologies for Cloud Computing, Iot and Big Data by
Fraud Auditing Using CAATT: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud by Aghili, Shaun
Children and Mobile Phones: Adoption, Use, Impact, and Control by Gunter, Barrie
A Reference or Randomness Beacons: NiSTIR 8213 by National Institute of Standards and Tech
Grundlagen Und Anwendung Von Information Security Awareness: Mitarbeiter Zielgerichtet Für Informationssicherheit Sensibilisieren by Fertig, Tobias, Weber, Kristin, Schütz, Andreas E.
Information Security Theory and Practice: 12th Ifip Wg 11.2 International Conference, Wistp 2018, Brussels, Belgium, December 10-11, 2018, Revised Sel by
Cybersecurity Ops with Bash: Attack, Defend, and Analyze from the Command Line by Troncone, Paul, Albing, Carl
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by Sanger, David E.
Securing Telehealth Remote Patient Monitoring Ecosystem: Cybersecurity for the Healthcare Sector by National Institute of Standards and Tech
Machine Learning and Cognitive Science Applications in Cyber Security by
How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East by Ismail, Haitham
Cybersecurity and Privacy in Cyber Physical Systems by
Information Technology Protection and Homeland Security by Spellman, Frank R.
Cyber Security Cryptography and Machine Learning: Third International Symposium, Cscml 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings by
Datenschutz beim vernetzten und autonomen Fahren. Welche Rahmenbedingungen können sensible Daten schützen? by Kotter, Philip
Advanced Blockchain Development by Prusty, Narayan, Bashir, Imran
Cyberdanger: Understanding and Guarding Against Cybercrime by Willems, Eddy
Security and Privacy Trends in the Industrial Internet of Things by
Cybersecurity: A comprehensive guide to getting started in cybersecurity by Ozkaya, Erdal
Understanding Cyberrisks in IoT: When Smart Things Turn Against You by Adaros Boye, Carolina A.
Cyberattaque: Plongez au coeur du blackout @Global Work collection by Vagabulle, Angeline, Renard, Jean-Marie
Fundamentals of Smart Contract Security by Ma, Richard, Gorzny, Jan, Zulkoski, Edward
The Business of Cybersecurity: Foundations and Ideologies by Sathnur, Ashwini
Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide: Volume 1 - General Implementation Guidance by National Institute of Standards and Tech
Applied Cryptography and Network Security: 17th International Conference, Acns 2019, Bogota, Colombia, June 5-7, 2019, Proceedings by
Cyberattaque: Plongez au coeur du blackout ! by Vagabulle, Angeline, Renard, Jean-Marie
Nichts ist sicher: Tricks und Techniken von Cyberkriminellen verstehen und sich schützen by Noors, Alicia, B, Mark
Information Security and Privacy: 24th Australasian Conference, Acisp 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings by
Learn Penetration Testing by Pillay, Rishalin
Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism by
Practice Makes Perfect. Creation of a Penetration Testing Laboratory, Procedures and Tools, Start to Finish by Butler, Thomas
The Evolving Israel-China Relationship by Chan, Arthur, Shatz, Howard J., Efron, Shira
Women Securing the Future with Tippss for Iot: Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things by
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data: 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 Interna by
Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications by
Proactive and Dynamic Network Defense by
Practical Information Security: A Competency-Based Education Course by Aleroud, Ahmed, Alsmadi, Izzat, Burdwell, Robert
A Quick Guide To Understanding IT Security Basics For IT Professionals by Small, M. J.
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition by Sachowski, Jason
ICT Systems Security and Privacy Protection: 34th Ifip Tc 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings by
Distributed Applications and Interoperable Systems: 19th Ifip Wg 6.1 International Conference, Dais 2019, Held as Part of the 14th International Feder by
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, Dimva 2019, Gothenburg, Sweden, June 19-20, 2019, Pr by
Mastering Malware Analysis by Kleymenov, Alexey, Thabet, Amr
String Analysis for Software Verification and Security by Alkhalaf, Muath, Bultan, Tevfik, Yu, Fang
Modern Data Strategy by Fellows, Lorraine, Fleckenstein, Mike
Advances in Human Factors in Cybersecurity: Proceedings of the Ahfe 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, by
Anomaly Detection Principles and Algorithms by Mohan, Chilukuri K., Huang, Huaming, Mehrotra, Kishan G.
Privacy Technologies and Policy: 7th Annual Privacy Forum, Apf 2019, Rome, Italy, June 13-14, 2019, Proceedings by
Security and Privacy in New Computing Environments: Second Eai International Conference, Spnce 2019, Tianjin, China, April 13-14, 2019, Proceedings by
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists by Baer, Tobias
Certified Network Forensic Analysis Manager: Exam Prep Guide by Kaplan, Michael I.
Data and Applications Security and Privacy XXXIII: 33rd Annual Ifip Wg 11.3 Conference, Dbsec 2019, Charleston, Sc, Usa, July 15-17, 2019, Proceedings by
Internet Password Organizer: Golden Retriever Dog (Password Log Book) by P. K., Peter Paker
Cyber Law in Hong Kong by Zhao, Yun
Hci for Cybersecurity, Privacy and Trust: First International Conference, Hci-CPT 2019, Held as Part of the 21st Hci International Conference, Hcii 20 by
Software Deployment, Updating, and Patching by Hanrion, Patrick, Stackpole, Bill
Algebraic Curves in Cryptography by Ling, San, Wang, Huaxiong, Xing, Chaoping
Cyberbullying and the Wild, Wild Web: What You Need to Know by Hitchcock, J. a.
Data Security and Cryptography by
Internet Password Organizer: Flowers (Password Log Book) by P. K., Peter Paker
Hacking Cyberspace by Gunkel, David J.
Internet Password Logbook: Black Password organizer to Keep Usernames, Passwords, Web Addresses & More. Alphabetical Tabs for Quick Easy Access by Journals, Practical Blank
Security, Privacy and Trust in the Iot Environment by
Web Services - Icws 2019: 26th International Conference, Held as Part of the Services Conference Federation, Scf 2019, San Diego, Ca, Usa, June by
Security within CONASENSE Paragon by
Information Security: Theory and Practice by
Security, Privacy, and Forensics Issues in Big Data by
Happy 60th Birthday: 60 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large Print Edition) by Designs, Level Up, Douglas, Karlon
Happy 67th Birthday: 67 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large Print Edition) by Douglas, Karlon, Designs, Level Up
Happy 81st Birthday: 81 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large Print Edition) by Designs, Level Up, Douglas, Karlon
Happy 85th Birthday: 85 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large Print Edition) by Designs, Level Up, Douglas, Karlon
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies by Bauer, Craig P.
Improving your Penetration Testing Skills by Teixeira, Daniel, Najera-Gutierrez, Gilberto, Ahmed Ansari, Juned
Attribute Considerations for Access Control Systems: NIST Special Publication 800-205 by National Institute of Standards and Tech
Securing Cloud and Mobility: A Practitioner's Guide by Hourani, Paul, Lim, Ian, Coolidge, E. Coleen
Blockchain - Icbc 2019: Second International Conference, Held as Part of the Services Conference Federation, Scf 2019, San Diego, Ca, Usa, Jun by
Computer Security: Principles and Practice by
Critical Incident Management by Sterneckert, Alan B.
Enhancing Computer Security with Smart Technology by Vemuri, V. Rao
Anonymous Communication Networks: Protecting Privacy on the Web by Peng, Kun
Security Management: A Critical Thinking Approach by Ricks, Bobby E., Land, Michael, Ricks, Truett
Data Security and Communication Networks by
Ethical Hacking: Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking by Walker, Brian
Pro Azure Governance and Security: A Comprehensive Guide to Azure Policy, Blueprints, Security Center, and Sentinel by De Tender, Peter, Rendon, David, Erskine, Samuel
Cyber Security: Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security by Walker, Brian
(ISC)2 CISSP Certified Information Systems Security Professional Workbook: With 150+ Practice Questions by Specialist, Ip
Practical OPNsense: Enterprise firewalls build on open source by Stubbig, Markus
Hacking With Kali Linux: A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, W by Bradley, Peter
Improving Image Quality in Visual Cryptography by Xiang, Yong, Yan, Bin, Hua, Guang
Forensic Investigations and Risk Management in Mobile and Wireless Communications by
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls by Hodson, Christopher J.
Grundrechtsschutz Im Smart Car: Kommunikation, Sicherheit Und Datenschutz Im Vernetzten Fahrzeug by
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Nist Sp 800-171 by National Institute of Standards and Tech
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Nist Sp 800-171b by National Institute of Standards and Tech
The Ultimate Guide to Anonymity by Davis, Vincent
You Are The #1 Target by Experts, The World's Leading
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls by Hodson, Christopher J.
Blockchain Technology for Global Social Change by Bernhardt, Sonja, Thomason, Jane, Kansara, Tia
Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities by Swain, Gandharba
Architectures and Frameworks for Developing and Applying Blockchain Technology by
Casino and Gaming Resort Investigations by Boss, Derk J., Zajic, Alan W.
The California Consumer Privacy ACT (Ccpa): An Implementation Guide by
SSCP Systems Security Certified Practitioner Practice Exams by Mitropoulos, Nick
Progress in Cryptology - Africacrypt 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings by
Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments by
Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, VOL 1 by
Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, VOL 2 by
Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, VOL 3 by
Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! by Dodson, Adam
Casino and Gaming Resort Investigations by Zajic, Alan W., Boss, Derk J.
The Face of Online Security and Tips to Help Protect You and Your Family: A guide for protecting the ones you love. by Garcia, Katrina R.
Das Gefährdungs- und Bedrohungspotential durch Cyberkriminalität in Deutschland by Anonym
Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation: NIST SP 1800-14A, B & C by National Institute of Standards and Tech
Inside the Dark Web by Islam, Rafiqul, Ozkaya, Erdal
Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms: NIST SP 800-175B Rev. 1 by National Institute of Standards and Tech
Information Systems Security and Privacy: 4th International Conference, Icissp 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selecte by
Artificial Intelligence for Communications and Networks: First Eai International Conference, Aicon 2019, Harbin, China, May 25-26, 2019, Proceedings, by
CCNA Cyber Ops: SECOPS - Certification Guide 210-255 by Chu, Andrew
Keeping Track of: Passwords by Alison, Susan
Hands-On Microservices with Kubernetes by Sayfan, Gigi
Keeping Track of: Passwords by Alison, Susan
Battlefield Forensics for Persian Gulf States: Regional and U.S. Military Weapons, Ammunition, and Headstamp Markings by Mikko, Don, Bailey, William
Nomenclatura - Encyclopedia of modern Cryptography and Internet Security: From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys [Pape by
DIY VPN: Control Your Own VPN Server by Harvey, J.
Real-World Bug Hunting: A Field Guide to Web Hacking by Yaworski, Peter
Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceedings of the 15th International Conference on Iih-Msp in Conjunctio by
Cyber Law in Mexico by Velasco, Cristos
Deep Reinforcement Learning: Frontiers of Artificial Intelligence by Sewak, Mohit
Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceedings of the 15th International Conference on Iih-Msp in Conjunctio by
Security, Privacy, and Anonymity in Computation, Communication, and Storage: Spaccs 2019 International Workshops, Atlanta, Ga, Usa, July 14-17, 2019, by
Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part II by
Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part IV by
Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part III by
Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part I by
pfSense Essentials: The Complete Reference to the pfSense Internet Gateway and Firewall by Reed, Jeremy C.
Security, Privacy, and Anonymity in Computation, Communication, and Storage: 12th International Conference, Spaccs 2019, Atlanta, Ga, Usa, July 14-17, by
Post-Quantum Cryptography: 10th International Conference, Pqcrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers by
I Need to Remember: Password Logbook Floral Password Book Organizer to Keep Usernames, Passwords, Web Addresses by N. Design, Kelly
Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy by Warner, Richard, Sloan, Robert H.
All the Shit I Can't Remember: Password Keeper and Finder Notebook w/ White & Green Paint on House Wall Texture Design Gift by Brush, The Yellow
Emerging Technology in Modelling and Graphics: Proceedings of Iem Graph 2018 by
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations by Reddy, Niranjan
Communication Technologies for Vehicles: 14th International Workshop, Nets4cars/Nets4trains/Nets4aircraft 2019, Colmar, France, May 16-17, 2019, Proce by
How to Achieve Network Security: Using Risk Assessment and Game Theory to Protect Your Systems by Halton, Wolf
Kali Linux: Comprehensive Beginners Guide to Learn Kali Linux Step by Step by Thorpe, Ethan
V: Monogram Letter Initial Internet Password Logbook: Keep track of usernames, passwords, web addresses in one easy and organized location by Bonus, 5star
Progress in Cryptology - Latincrypt 2017: 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, Septembe by
Penetration Testing by Karamagi, Robert
White Hat Hacking by Karamagi, Robert
Cybersecurity Framework Smart Grid Profile: NIST Technical Note 2051 by National Institute of Standards and Tech
Code-Based Cryptography: 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18-19, 2019, Revised Selected Papers by
Die Rechtsstellung des betrieblichen Datenschutzbeauftragten by Schindela, André
Passwort Buch: Übersichtliches Passwortbuch mit Register zum Verwalten von Passwörtern, Zugangsdaten und PINs by Zettelwirtschaft, Nie Wieder
Opas Passwort Buch: Handliches Passwortbuch mit A-Z Register zum Verwalten von Passwörtern, Zugangsdaten und PINs by Zettelwirtschaft, Nie Wieder
Mein persönliches Passwort-Buch: Zum Schutz von Zugangsdaten, Passwörtern, Lizenzschlüsseln und persönlichen Codes by Lindo, Wilfred
Blockchain and Web 3.0: Social, Economic, and Technological Challenges by
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit Register zum Verwalten von Internet Zugangsdaten by Zettelwirtschaft, Nie Wieder
Advances in Information and Computer Security: 14th International Workshop on Security, Iwsec 2019, Tokyo, Japan, August 28-30, 2019, Proceedings by
Internet Passwort Manager: Handliches Passwortbuch mit Register zum Verwalten von Passwörtern und Zugangsdaten by Zettelwirtschaft, Nie Wieder
Sch**** ich erinnere mich nicht: Handliches Passwort Buch mit Register zum Verwalten von Passwörtern, Zugangsdaten und PINs by Zettelwirtschaft, Nie Wieder
Challenges in Cybersecurity and Privacy - the European Research Landscape by
100 Top Tips - Stay Safe Online and Protect Your Privacy by Vandome, Nick
7 Rules to Influence Behaviour and Win at Cyber Security Awareness by Chirag, Joshi D.
Blockchain, Cryptocurrencies & The Future by McNicol, Brian, Pannirselvam, Muthu
Don't You Dare Forget Me!: Discreet Internet Password Keeper - Store Websites, Usernames, Passwords - Funny Gift Kitten/Cat Lovers by Organizers, Cat &. Dog
Multimedia Big Data Computing for Iot Applications: Concepts, Paradigms and Solutions by
CompTIA Security+ Technology Workbook: Second Edition by Specialist, Ip
Handbook of Research on Machine and Deep Learning Applications for Cyber Security by
Forensic Investigations and Risk Management in Mobile and Wireless Communications by
It's Just Your Password Dumb Ass by House, Robert
Pentest+ A Practitioners Study Guide by Evenden, David
Cissp: Una guía completa para principiantes sobre la seguridad de los sistemas de información (Libro En Español / CISSP Spanish Book Version) by Schmidt, Walker
Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and Iot by
Kali Linux: Kali Linux Made Easy For Beginners And Intermediates; Step By Step With Hands On Projects (Including Hacking and Cyber by Craig, Berg
Hack Proof Yourself!: The essential guide for securing your digital world by Weis, Dan
Transformation of Cryptography: Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications by Dooble, Gunther Van, Bertram, Linda a.
Als IT-Security Officer zertifiziert: Über 100 Fragen und Antworten auf dem Weg zur Zertifizierung als ITSO (IT Security Officer) by Serwas, Heinrich
Database and Expert Systems Applications: Dexa 2019 International Workshops Biokdd, Iwcfs, Mlkgraphs and Tir, Linz, Austria, August 26-29, 2019, Proce by
See More