• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2019

Advances in Cryptology - Crypto 2019: 39th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2019, Proceedings, Part I by
Advances in Cryptology - Crypto 2019: 39th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2019, Proceedings, Part I by
Trust, Privacy and Security in Digital Business: 16th International Conference, Trustbus 2019, Linz, Austria, August 26-29, 2019, Proceedings by
Internet Account And Password: A Book For All Your Passwords 6x9 120 Pages (Large Print Edition) by Publishing, Papyrus Harmony
Hands-On Artificial Intelligence for Cybersecurity by Parisi, Alessandro
Advances in Cryptology - Crypto 2019: 39th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2019, Proceedings, Part I by
Hacking with Kali Linux: The Complete Guide on Kali Linux for Beginners and Hacking Tools. Includes Basic Security Testing with Kali Linux by Ict School
Handbook of Multimedia Information Security: Techniques and Applications by
I Definitely Don't Forget My Passwords: Basic Internet Password Keeper Book by Press, Fletcher
Passwort Buch: Passwörter und Zugangsdaten sicher verwalten, Schmetterling Cover by Bloom, Sophia
Pacifying the Homeland: Intelligence Fusion and Mass Supervision by McQuade, Brendan
Pacifying the Homeland: Intelligence Fusion and Mass Supervision by McQuade, Brendan
Advances in Digital Forensics XV: 15th Ifip Wg 11.9 International Conference, Orlando, Fl, Usa, January 28-29, 2019, Revised Selected Papers by
Routledge Handbook of South Asian Criminology by
Information Systems: Research, Development, Applications, Education: 12th Sigsand/Plais Eurosymposium 2019, Gdansk, Poland, September 19, 2019, Procee by
Bug Bounty Hunting mit Kali-Linux oder Parrot Security OS: Hacking als Hautberuf oder Nebenjob by Noors, Alicia, B, Mark
Blockchain Technology in Internet of Things by Zhu, Liehuang, Li, Meng, Gai, Keke
Cybersecurity for Beginners: What You Must Know about Cybersecurity by Kovacs, Attila
Cybersecurity for Beginners: What You Must Know about Cybersecurity by Kovacs, Attila
Cybersecurity for Beginners: How to Get a Job in Cybersecurity by Kovacs, Attila
Cybersecurity for Beginners: How to Get a Job in Cybersecurity by Kovacs, Attila
Computer Safety, Reliability, and Security: Safecomp 2019 Workshops, Assure, Decsos, Sassur, Strive, and Waise, Turku, Finland, September 10, 2019, Pr by
Cybersecurity for Beginners: How to Defend Against Hackers & Malware by Kovacs, Attila
Cybersecurity for Beginners: What You Must Know about Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware by Kovacs, Attila
Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity by Kovacs, Attila
Cybersecurity for Beginners: What You Must Know about Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware by Kovacs, Attila
Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity by Kovacs, Attila
Cybersecurity for Beginners: How to Defend Against Hackers & Malware by Kovacs, Attila
The New Era of Cybersecurity Breaches: A Case Study and Lessons Learned by Payne, Graeme
Informationssicherheit Und Datenschutz Systematisch Und Nachhaltig Gestalten: Eine Kompakte Einführung in Die Praxis by Hanschke, Inge
Ich werde dich niemals vergessen: Einhorn Passwort Buch mit Register zum Verwalten von Passwörtern, Zugangsdaten und PINs by Zettelwirtschaft, Nie Wieder
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World by Jin, Jennifer, Carey, Marcus J.
Ethical Hacking for Beginners: Pre-Engagement Process Execution by Kovacs, Attila
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast by Kovacs, Attila
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast by Kovacs, Attila
Demystifying Internet of Things Security: Successful Iot Device/Edge and Platform Security Deployment by Smith, Ned, Cheruvu, Sunil, Kumar, Anil
Applied Cryptography and Network Security Workshops: Acns 2019 Satellite Workshops, Simla, Cloud S&p, Aiblock, and Aiots, Bogota, Colombia, June 5-7, by
Waging Cyber War: Technical Challenges and Operational Constraints by Oakley, Jacob G.
The Audit Value Factor by Samson, Daniel
Hacking: 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks by Wagner, Alex
Hacking: Wireless Hacking by Wagner, Alex
Hacking: 10 Most Dangerous Cyber Gangs by Wagner, Alex
Hacking: Beginners Guide, 17 Must Tools every Hacker should have, Wireless Hacking & 17 Most Dangerous Hacking Attacks by Wagner, Alex
Hacking: Social Engineering Attacks, Techniques & Prevention by Wagner, Alex
Hacking: Beginners Guide by Wagner, Alex
Hacking: 17 Must Tools Every Hacker Should Have by Wagner, Alex
Hacking: 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks by Wagner, Alex
Hacking: 17 Must Tools every Hacker should have, Wireless Hacking & 17 Most Dangerous Hacking Attacks by Wagner, Alex
Linux for Beginners: How to Install the Linux OS by Kovacs, Attila
Linux for Beginners: 37 Linux Commands you Must Know by Kovacs, Attila
Linux for Beginners: 3 Books in 1 by Kovacs, Attila
Hacking with Kali Linux: Penetration Testing Hacking Bible by Wagner, Alex
Hacking: Social Engineering Attacks, Techniques & Prevention by Wagner, Alex
Hacking: 3 Books in 1 by Wagner, Alex
Hacking: Hacking Firewalls & Bypassing Honeypots by Wagner, Alex
Hacking: 17 Most Dangerous Hacking Attacks by Wagner, Alex
Hacking with Kali Linux: Penetration Testing Hacking Bible by Wagner, Alex
Hacking: 17 Most Dangerous Hacking Attacks by Wagner, Alex
Hacking: Beginners Guide, 17 Must Tools every Hacker should have, Wireless Hacking & 17 Most Dangerous Hacking Attacks by Wagner, Alex
Linux for Beginners: How to Perform Linux Admin Tasks by Kovacs, Attila
Linux for Beginners: 3 Books in 1 by Kovacs, Attila
Hacking: 17 Must Tools every Hacker should have, Wireless Hacking & 17 Most Dangerous Hacking Attacks by Wagner, Alex
Hacking: 10 Most Dangerous Cyber Gangs by Wagner, Alex
Hacking: Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most Dangerous Cyber Gangs by Wagner, Alex
Hacking: Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most Dangerous Cyber Gangs by Wagner, Alex
Hacking: 3 Books in 1 by Wagner, Alex
Hacking: Hacking Firewalls & Bypassing Honeypots by Wagner, Alex
Industrial Networks and Intelligent Systems: 5th Eai International Conference, Iniscom 2019, Ho CHI Minh City, Vietnam, August 19, 2019, Proceedings by
Bitcoin: Invest In Digital Gold by Juhasz, Szabolcs
Cryptocurrencies and Blockchain Technology: Cryptocurrencies and Blockchain: 4 Books in 1 by Söze, Keizer
Cryptocurrencies and Blockchain Technology: Cryptocurrencies and Blockchain: 4 Books in 1 by Söze, Keizer
Bitcoin: Invest In Digital Gold by Juhasz, Szabolcs
VLSI Design and Test: 23rd International Symposium, Vdat 2019, Indore, India, July 4-6, 2019, Revised Selected Papers by
Cross Site Scripting: XSS Defense Made Easy by Berman, Harvey
Advanced Computing and Systems for Security: Volume Nine by
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location Gray And White Cover by Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Black And White Cover by Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Green Cover by Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location -Red Cover by Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Olive Green Cover by Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Gray Cover by Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Pink Cover by Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Orange Cover by Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Red And White Cover by Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - navy blue Cover by Pray, Norman M.
IT Issues in Higher Education: Emerging Research and Opportunities by
Complete Guide to Building An Information Security Program: Connecting Polices, Procedures, & IT Standards by Rauschendorfer, David
The Fraud Prevention (FP)101 Handbook: An Illustrated Guide to Consumer Fraud Awareness by Tracey, David
Acquiring Card Payments by Dubinsky, Ilya
Computer Security - Esorics 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I by
Computer Security - Esorics 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II by
Information Security: 22nd International Conference, Isc 2019, New York City, Ny, Usa, September 16-18, 2019, Proceedings by
Business Process Management: Blockchain and Central and Eastern Europe Forum: BPM 2019 Blockchain and Cee Forum, Vienna, Austria, September 1-6, 2019, by
The 2020 California Consumer Privacy Act (CCPA) Definitive Guide: An Applied Solution using NIST 800-171 by Russo Cissp-Issap Ceh, Mark a.
Smart Card Security: Applications, Attacks, and Countermeasures by Gupta, Brij B., Quamara, Megha
Scam Me If You Can: Simple Strategies to Outsmart Today's Rip-off Artists by Abagnale, Frank
Blockchain and Cryptocurrencies by
Commercial Facilities Protection and Homeland Security by Spellman, Frank R.
Kali Linux: Kali Linux Made Easy For Beginners And Intermediates Step By Step With Hands On Projects (Including Hacking and Cybers by Berg, Craig
Shit I can't remember: Password manager book with alphabet tabs and discreet romantic watercolor design (5"x8") - a great gift for for kids, by Life, Boss Girl
Securecsocial: Secure Cloud-Based Social Network by Senevirathna, Kasun, Atrey, Pradeep
Explainable Ai: Interpreting, Explaining and Visualizing Deep Learning by
Financial Cryptography and Data Security: 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 - March 2, 2018, Revised Selected P by
Karma-Based API on Apple Platforms: Building Privacy Into IOS and macOS Apps by Carrasco Molina, Manuel
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data by Lakshmi, Vasantha
Security, Privacy, and Forensics Issues in Big Data by
Instagram User Guide: The Complete Secrets, Tips, Step by Step Reference to Using Instagram Like a Pro by Jones, David
Electronic Voting: 4th International Joint Conference, E-Vote-Id 2019, Bregenz, Austria, October 1-4, 2019, Proceedings by
Security Awareness: Grundlagen, Maßnahmen Und Programme Für Die Informationssicherheit by Beißel, Stefan
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- And Game-Theoretic Approaches to Cyber Security by
Die Zukunft Der Datenökonomie: Zwischen Geschäftsmodell, Kollektivgut Und Verbraucherschutz by
Blockchain and the Law: The Rule of Code by de Filippi, Primavera, Wright, Aaron
Sudo Mastery by Lucas, Michael W.
Computer Hacking: This Book Includes: Hacking Tools for Computers with Linux Mint, Linux for Beginners and Kali Linux Tools and Hacking by Ict School
I Can't Remember My Password: Password and Username Keeper by Publishing, Smw
Advanced Computing and Systems for Security: Volume Ten by
Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques by
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud by Siepmann, Frank
How to Complete a Risk Assessment in 5 Days or Less by Peltier, Thomas R.
Securing Converged IP Networks by Macaulay, Tyson
Authentication Codes and Combinatorial Designs by Pei, Dingyi
Strategic Information Security by Wylder, John
Volunteer Police, Choosing to Serve: Exploring, Comparing, and Assessing Volunteer Policing in the United States and the United Kingdom by Jones, Carol Borland, Wolf, Ross
Casting Light on the Dark Web: A Guide for Safe Exploration by Beckstrom, Matthew, Lund, Brady
Rsa and Public-Key Cryptography by Mollin, Richard A.
Information Security Risk Management for ISO 27001 / ISO 27002 by Watkins, Steve G., Calder, Alan
Security Software Development: Assessing and Managing Security Risks by Ashbaugh, Cissp
Developing Cyber Resilient Systems: A Systems Security Engineering Approach: NIST SP 800-160 Volume 2 by National Institute of Standards and Tech
Cloud Security Auditing by Wang, Yushun, Majumdar, Suryadipta, Madi, Taous
IT Issues in Higher Education: Emerging Research and Opportunities by
A Hacker, I Am by Ford, Craig
A Hacker, I Am by Ford, Craig
Security and Privacy Issues in Sensor Networks and IoT by
Progress in Cryptology - Latincrypt 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chi by
The Weaponization of AI and the Internet: How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives by Bell, Larry
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat by Carlin, John P., Graff, Garrett M.
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Mitnick, Kevin
Quadratics by Mollin, Richard A.
A Practical Guide to Security Engineering and Information Assurance by Herrmann, Debra S.
Cybersecurity in the Electricity Sector: Managing Critical Infrastructure by Leszczyna, Rafal
The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity by Quade, Phil
Penetration Testing: A guide for business and IT managers by Furneaux, Nick, Marchang, Jims
CompTIA Pentest+ Technology Workbook by Specialist, Ip
Machine Learning for Cyber Security: Second International Conference, Ml4cs 2019, Xi'an, China, September 19-21, 2019, Proceedings by
Adopter SharePoint sans développer: SharePoint, Ms Teams: Une gouvernance efficace by Poireau, Frank
Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali by
Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali by
Gaining Competitive Advantage in the Gray Zon: Response Options for Coercive Aggression Below the Threshold of Major War by Hornung, Jeffrey W., Mazarr, Michael J., Morris, Lyle J.
Attracting, Recruiting, and Retaining Successful Cyberspace Operations Officers: Cyber Workforce Interview Findings by Payne, Leslie Adrienne, Hardison, Chaitra M., Hamm, John A.
Certified Disaster Response and Recovery Manager: Exam Prep Guide by Kaplan, Michael I.
Modern Principles, Practices, and Algorithms for Cloud Security by
ISO 27001 Controls - A Guide to Implementing and Auditing by
Advanced Informatics for Computing Research: Third International Conference, Icaicr 2019, Shimla, India, June 15-16, 2019, Revised Selected Papers, Pa by
Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings by
Blockchain: The Insights You Need from Harvard Business Review by Tapscott, Don, Review, Harvard Business
Data Privacy Management, Cryptocurrencies and Blockchain Technology: Esorics 2019 International Workshops, Dpm 2019 and CBT 2019, Luxembourg, Septembe by
Comptia A+ Certification All-In-One for Dummies by Tetz, Edward, Clarke, Glen E., Warner, Timothy L.
Ethical Hacking: A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment by Codings, Zach
Android Security: Attacks and Defenses by Misra, Anmol, Dubey, Abhishek
Network Perimeter Security: Building Defense In-Depth by Riggs, Cliff
Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques by Fung, Benjamin C. M., Wang, Ke, Fu, Ada Wai-Chee
Asset Protection through Security Awareness by Speed, Tyler Justin
RC4 Stream Cipher and Its Variants by Paul, Goutam, Maitra, Subhamoy
Security Patch Management by Nicastro, Felicia
The Art of War for Computer Security by Madsen, Tom
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet by Dunham, Ken, Melnick, Jim
Public Key Infrastructure: Building Trusted Applications and Web Services by Vacca, John R.
Building an Effective Information Security Policy Architecture by Bacik, Sandy
Data-driven Block Ciphers for Fast Telecommunication Systems by Moldovyan, Nikolai, Moldovyan, Alexander A.
How to Achieve 27001 Certification: An Example of Applied Compliance Management by Willett, Keith D., Arnason, Sigurjon Thor
Computer Forensics: Evidence Collection and Management by Newman, Robert C.
Wireless Crime and Forensic Investigation by Kipper, Gregory
Data Protection: Governance, Risk Management, and Compliance by Hill, David G.
Your Safety and Privacy Online: The CIA and NSA by Bjarnason, Siggi
Your Safety and Privacy Online: The CIA and NSA by Bjarnason, Siggi
Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider It Attacks by Brancik, Kenneth
Binary Analysis Cookbook by Born, Michael
Shit I Can't Remember: Password I Can't Remember, Home network information, Software license keys and Credit card information by Practices, Best
Learn Ethereum by Wu, Xun (Brian), Zou, Zhihong, Song, Dongying
Passwords: A password keeper to secure usernames, internet websites, and passwords, alphabetically organized. by Publishing, Cottage Garden
New Paradigm in Decision Science and Management: Proceedings of Icdsm 2018 by
Defeating Communism One More Time: Using the Good of Cyberspace to Stop Chinese Global Aggression by Russo Cissp-Issap, Mark a.
Security in RFID and Sensor Networks by
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods by Raghavan, Lakshmikanth, Merkow, Mark S.
Security of Mobile Communications by Boudriga, Noureddine
Architecting Secure Software Systems by Talukder, Asoke K., Chaitanya, Manish
Discrete Dynamical Systems and Chaotic Machines: Theory and Applications by Bahi, Jacques, Guyeux, Christophe
The I-Coin Explained: The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions by Drouin, Maxime
Surviving Security: How to Integrate People, Process, and Technology by Andress, Amanda
Sicurezza Informatica - Manuale Principianti: Un ottimo manuale per avvicinarsi al mondo della sicurezza informatica personale by Placido, Ruggero
Practical Security Properties on Commodity Computing Platforms: The Uber Extensible Micro-Hypervisor Framework by Vasudevan, Amit
The Cognitive Early Warning Predictive System Using the Smart Vaccine: The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure by Termanini, Rocky
Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition by Yang, Yi Xian, Niu, Xin Xin, Xu, Cheng Qing
FISMA Principles and Best Practices: Beyond Compliance by Howard, Patrick D.
Provable Security: 13th International Conference, Provsec 2019, Cairns, Qld, Australia, October 1-4, 2019, Proceedings by
Discrete Password Logbook: "Locked Door" Edition by
Discrete Password Logbook: "Kitty Cats" Edition by
Practical PowerShell Security and Compliance Center by Scoles, Damian
Blockchain for Decision Makers by Tormen, Romain
Modern Principles, Practices, and Algorithms for Cloud Security by
See More