• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2019

Practical Cryptography in Python: Learning Correct Cryptography by Example by Monson, Christopher K., Nielson, Seth James
Kali Linux: Guía completa para principiantes aprende Kali Linux paso a paso (Libro En Español/Kali Linux Spanish Book Version) by Thorpe, Ethan
Cryptology and Network Security: 18th International Conference, Cans 2019, Fuzhou, China, October 25-27, 2019, Proceedings by
Developing Applications with Azure Active Directory: Principles of Authentication and Authorization for Architects and Developers by Garg, Mohit, Mayank, Manas
Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector NIST SP 1800-24 by National Institute of Standards and Tech
The Data Protection Officer: IDSolves.com by Williams, Adams Choubey
When Autonomous Vehicles Are Hacked, Who Is Liable? by Winkelman, Zev, Buenaventura, Maya, Anderson, James M.
It Auditing Using Controls to Protect Information Assets, Third Edition by Kegerreis, Mike, Schiller, Mike, Davis, Chris
Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home by Schober, Craig W., Schober, Scott N.
Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home by Schober, Scott N., Schober, Craig W.
Cyber Resilience by Petrenko, Sergei
Quantum Cryptography in Advanced Networks by
The IoT Architect's Guide to Attainable Security and Privacy by Fagbemi, Damilare D., Wheeler, Jc, Wheeler, David M.
Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond by Reyes, Matt
Codes: The Guide to Secrecy From Ancient to Modern Times by Mollin, Richard A.
Foundations of Information Security: A Straightforward Introduction by Andress, Jason
Advanced Applications of Blockchain Technology by
Big Data Security by
Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World by Schneier, Bruce
Secure Programming of Web Applications: Web Application Security for Software Developers and Project Managers by Hissen, Frank
Hacking: The Secret Behind iCloud by Youness, Serghini
Security and Privacy for Big Data, Cloud Computing and Applications by
The Giant Black Book of Computer Viruses by Ludwig, Mark
Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond by Reyes, Matt
Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Sele by
Oops! I Forgot Password by Hall, Dorothy J.
Don't forget! password: Keep your usernames, social info, passwords, web addresses and security question in one. So easy & organized by Hall, Dorothy J.
Password manager: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized by Hall, Dorothy J.
Cybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks by Genics, Trust
Applications and Techniques in Information Security: 10th International Conference, Atis 2019, Thanjavur, India, November 22-24, 2019, Proceedings by
Learning CoreDNS: Configuring DNS for Cloud Native Environments by Belamaric, John, Liu, Cricket
Hack Proof Your Business by Morgan, Jeri, Daley, Michael, Kistler, John
Female Offenders and Reentry: Pathways and Barriers to Returning to Society by
Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges: Icbcc 2019, Umkc, Kansas City, USA by
Geospatial Information Technology for Emergency Response by
Frontiers in Cyber Security: Second International Conference, Fcs 2019, Xi'an, China, November 15-17, 2019, Proceedings by
The 2018 Yearbook of the Digital Ethics Lab by
Apple Card and Apple Pay: A Ridiculously Simple Guide to Mobile Payments by La Counte, Scott
Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies by Codings, Zach
Fighting Shadows in the Dark: Understanding and Countering Coercion in Cyberspace by Marcinek, Krystyna, Hodgson, Quentin E., Ma, Logan
Personal Password Keeper: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized by Hall, Dorothy J.
Ethical Hacking: The Complete Beginners Guide to Basic Security and Penetration Testing by Stanford, Marc
Omas Passwort Buch: Praktisches Passwortbuch mit Register zum Verwalten von Passwörtern, Zugangsdaten und PINs by Zettelwirtschaft, Nie Wieder
Ich habe das sch*** Passwort schon wieder vergessen: Handliches Passwort Buch mit A-Z Register zum Verwalten von Passwörtern, Zugangsdaten und PINs by Zettelwirtschaft, Nie Wieder
The Ethical Hack: A Framework for Business Value Penetration Testing by Tiller, James S.
Opas Passwort Buch: Übersichtliches Passwortbuch mit Register zum Verwalten von Passwörtern und Zugangsdaten by Zettelwirtschaft, Nie Wieder
Developing Safer Online Environments for Children: Tools and Policies for Combatting Cyber Aggression by
Ich werde dich niemals vergessen: Diskretes Passwortbuch mit A-Z Register zum Verwalten von Internet Zugangsdaten by Zettelwirtschaft, Nie Wieder
Big Seven Study (2016): 7 open source Crypto-Messengers to be compared (English/Deutsch): or: Comprehensive Confidentiality Review & Audit of by Maier, Ann-Kathrin, Adams, David
Security and Privacy in Social Networks and Big Data: 5th International Symposium, Socialsec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Sele by
Passwortbuch für Vergessliche: Praktisches Passwort Buch mit A-Z Register zum Verwalten von Passwörtern, Zugangsdaten und PINs - Mit Hanfmotiv by Zettelwirtschaft, Nie Wieder
Pssst... Top Secret: Handliches Passwort Buch mit Register zum Verwalten von geheimen Passwörtern, Zugangsdaten und PINs by Zettelwirtschaft, Nie Wieder
Ciber Seguridad: Guía completa para principiantes aprende los conceptos básicos y los métodos eficaces de la ciber seguridad (Libro En by Walker, Brian
Passwort Buch: Handliches Passwortbuch mit Register zum Verwalten von Passwörtern, Lizenzschlüsseln und PINs - Schweigende Frau Motiv by Zettelwirtschaft, Nie Wieder
Sch**** ich erinnere mich nicht: Handliches Passwort Buch mit Register zum Verwalten von Passwörtern und Zugangsdaten - Mit schönen Blumenmuster by Zettelwirtschaft, Nie Wieder
Developing Safer Online Environments for Children: Tools and Policies for Combatting Cyber Aggression by
Security and Privacy Issues in Sensor Networks and IoT by
Hacking Ético: Guía completa para principiantes para aprender y entender los reinos del hacking ético (Libro En Español/Ethical Hacki by Walker, Brian
Mobile Security in Ethical Hacking: by Zahid Wadiwale by Wadiwale, Mohammed Zahid
Certified Cyber Incident Response Manager: Exam Prep Guide by Kaplan, Michael I.
Data Communication and Networks: Proceedings of Gucon 2019 by
Trust Management XIII: 13th Ifip Wg 11.11 International Conference, Ifiptm 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings by
Zero Day - Zero Budget: Information Security Management Beyond Standards by Farkas, Imre
Ich kenne deine dunkelsten Geheimnisse: Handliches Passwortbuch mit A-Z Register zum Verwalten von Passwörtern, Zugangsdaten, PINs und Puks by Zettelwirtschaft, Nie Wieder
Cyber Security: The Lifeline of Information and Communication Technology by Rohokale, Vandana, Prasad, Ramjee
Sch**** ich erinnere mich nicht: Hilfreiches Passwortbuch mit A-Z Register zum Verwalten von persönlichen Passwörtern, Zugangsdaten und PINs by Zettelwirtschaft, Nie Wieder
Elementary Information Security by Smith, Richard E.
It Governance: An International Guide to Data Security and ISO 27001/ISO 27002 by Watkins, Steve, Calder, Alan
Future Network Systems and Security: 5th International Conference, Fnss 2019, Melbourne, Vic, Australia, November 27-29, 2019, Proceedings by
It Governance: An International Guide to Data Security and ISO 27001/ISO 27002 by Calder, Alan, Watkins, Steve
Blockchain 2035: The Digital DNA of Internet 3.0 by Tate, Jared C., Knapp, Andrew D.
Industrial Control Systems Security and Resiliency: Practice and Theory by
System Administration Ethics: Ten Commandments for Security and Compliance in a Modern Cyber World by Ljubuncic, Igor, Litterer, Tom
I Know Your Dirty Little Secret: Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and Services - With Tabs by Publishing, Secure
I'll Never Forget You: Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design by Publishing, Secure
Networking for Beginners: An Easy Guide to Learning Computer Network Basics. Take Your First Step, Master Wireless Technology, the OSI Model, IP by Scott, Russell
Building an Effective Cybersecurity Program by Schreider, Tari
Smart Blockchain: Second International Conference, Smartblock 2019, Birmingham, Uk, October 11-13, 2019, Proceedings by
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager by Mustafa, Osama, Lockard, Robert P.
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology a by Walker, Benjamin
Deaver on Cybersecurity: An irreverent and honest exposé of the online security problem, complete with a candid and thorough reveal of its solution by Deaver, Frederic Scott
Computer Security Fundamentals by Easttom II
Smart Computing and Communication: 4th International Conference, Smartcom 2019, Birmingham, Uk, October 11-13, 2019, Proceedings by
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communic by Walker, Benjamin
In Depth Security Vol. III: Proceedings of the DeepSec Conferences by
Screen-Obsessed: Parenting in the Digital Age by Lwin, May O., Shin, Wonsun
Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, Dependsys 2019, Guangzhou, China, November 12-15, by
Kali linux: learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools by Harris, Adam
Puzzles on Cypercrime and God's Mathematics by Ting, John
Information Security Practice and Experience: 15th International Conference, Ispec 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings by
Smart City and Informatization: 7th International Conference, Isci 2019, Guangzhou, China, November 12-15, 2019, Proceedings by
Das S-Netzwerk Und Sein Wirtschaftliches Potenzial: Die Möglichkeiten Des S-Webs Und Der Jadwirtschaft Mit Der Einweg-Währung Jad by Viehmann, Johannes
Deaver on Cybersecurity: An irreverent and honest exposé of the online security problem, complete with a candid and thorough reveal of its solution by Deaver, Frederic Scott
The Practice of Enterprise Modeling: 12th Ifip Working Conference, Poem 2019, Luxembourg, Luxembourg, November 27-29, 2019, Proceedings by
Ransomware Revealed: A Beginner's Guide to Protecting and Recovering from Ransomware Attacks by Hassan, Nihad A.
Innovations and Interdisciplinary Solutions for Underserved Areas: Third Eai International Conference, Intersol 2019, Cairo, Egypt, February 14-15, 20 by
Advances in Cryptology - Asiacrypt 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Jap by
Science of Cyber Security: Second International Conference, Scisec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers by
Advances in Cryptology - Asiacrypt 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Jap by
The Darknet and Smarter Crime: Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy by Bancroft, Angus
Wireshark Workbook 1: Practice, Challenges, and Solutions by Chappell, Laura
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto by Grimes, Roger A.
Safety and Security Engineering VIII by
Trusted Data, revised and expanded edition: A New Framework for Identity and Data Sharing by
Advances in Cryptology - Asiacrypt 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Jap by
Computer Networking Beginners Guide: An Easy Approach to Learning Wireless Technology, Social Engineering, Security and Hacking Network, Communication by Scott, Russell
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web Sites and Applications by Sinha, Sanjib
Secure It Systems: 24th Nordic Conference, Nordsec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings by
Reprogramming the World: Cyberspace and the Geography of Global Order by Blount, P. J.
Progress in Cryptology - Indocrypt 2019: 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings by
Learn Kali Linux 2019 by D. Singh, Glen
How to Manage Cybersecurity Risk: A Security Leader's Roadmap with Open FAIR by Carlson, Christopher T.
Intelligent Data Processing: 11th International Conference, Idp 2016, Barcelona, Spain, October 10-14, 2016, Revised Selected Papers by
Cryptography and Coding: 17th Ima International Conference, Imacc 2019, Oxford, Uk, December 16-18, 2019, Proceedings by
Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom Gilb by
Protocols for Authentication and Key Establishment by Stebila, Douglas, Boyd, Colin, Mathuria, Anish
Security, Privacy, and Applied Cryptography Engineering: 9th International Conference, Space 2019, Gandhinagar, India, December 3-7, 2019, Proceedings by
Security Controls Evaluation, Testing, and Assessment Handbook by Johnson, Leighton
Critical Concepts, Standards, and Techniques in Cyber Forensics by
Machine Learning for Cybersecurity Cookbook by Tsukerman, Emmanuel
Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments by Dall'acqua, Luisa, Gironacci, Irene M.
Cyber Security for Small Business: Protect Your Digital World by Paterson, Cat
Theory of Cryptography: 17th International Conference, Tcc 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part I by
Future Data and Security Engineering: 6th International Conference, Fdse 2019, Nha Trang City, Vietnam, November 27-29, 2019, Proceedings by
Algebra, Codes and Cryptology: First International Conference, A2c 2019 in Honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5-7, 2019, Proce by
Theory of Cryptography: 17th International Conference, Tcc 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part II by
Stuxnet: The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of Kaspers by Poroshyn, Roman
Elementary... the Art and Science of Finding Information: Achieving More "Knowledge Advantage" through OSINT - Revised and Expanded Edition by Millington, Alan, Monday, Mark, Fernandez, Miguel
Elementary... the Art and Science of Finding Information: Achieving More "Knowledge Advantage" through OSINT - Revised and Expanded Edition by Millington, Alan, Monday, Mark, Fernandez, Miguel
Handbook of Vascular Biometrics by
Lattice-Based Public-Key Cryptography in Hardware by Verbauwhede, Ingrid, Sinha Roy, Sujoy
Multimedia Watermarking Techniques and Applications by Kirovski, Darko
Security in Wireless Mesh Networks by
Multimedia Encryption and Authentication Techniques and Applications by Furht, Borko, Kirovski, Darko
Adaptive Security Management Architecture by Tiller, James S.
How Cyber Security Can Protect Your Business: A guide for all stakeholders by Wright, Christopher
Fintech and Data Privacy in Germany: An Empirical Analysis with Policy Recommendations by Dorfleitner, Gregor, Hornuf, Lars
Modern Cryptography: Current Challenges and Solutions by
Internet of Things (IoT) for Automated and Smart Applications by
Hacking!: This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX by Nowak, Grzegorz
Mon Carnet de Mots de Passe: A5 - 98 Pages - Noir - Petit format, grands caractères - couverture originale by Secureo, Ne Rien Oublier Editions
Cybercrime Prevention: Theory and Applications by Hutchings, Alice, Brewer, Russell, de Vel-Palumbo, Melissa
Graphical Models for Security: 6th International Workshop, Gramsec 2019, Hoboken, Nj, Usa, June 24, 2019, Revised Papers by
Microsoft 365 Mobility and Security - Exam Guide MS-101 by Chamberlain, Nate
Handbook of Research on Intelligent Data Processing and Information Security Systems by
Carnet de mots de passe: conçu pour rassembler toutes vos informations sur internet motif nuit étoilée 142 pages prédéfinies et classées par or by Karach, Olivier
Carnet de mots de passe Je déteste l'informatique et par-dessus tout me souvenir des mots de passe: conçu pour rassembler toutes vos informations sur by Karach, Olivier
Carnet de Mots de passe: conçu pour rassembler toutes vos informations sur internet motif fleurs colorées 142 pages prédéfinies et classées par by Karach, Olivier
Carnet de Mots de passe: conçu pour rassembler toutes vos informations sur internet motif fleurs noires 142 pages prédéfinies et classées par o by Karach, Olivier
Carnet de mots de passe Retiens tes Mots de passe: conçu pour rassembler toutes vos informations sur internet 142 pages prédéfinies et classées par or by Karach, Olivier
Proceedings of International Ethical Hacking Conference 2019: Ehacon 2019, Kolkata, India by
Zero Trust Networks with Vmware Nsx: Build Highly Secure Network Architectures for Your Data Centers by Keeriyattil, Sreejith
2017 Annual Report of Top Cyber Security Incidents by Hyslip, Thomas
Fourth International Congress on Information and Communication Technology: Icict 2019, London, Volume 1 by
Privacy in Dynamical Systems by
Advances in Data Sciences, Security and Applications: Proceedings of Icdssa 2019 by
Information Systems Security: 15th International Conference, Iciss 2019, Hyderabad, India, December 16-20, 2019, Proceedings by
It-Sicherheitsmanagement Nach Der Neuen ISO 27001: Isms, Risiken, Kennziffern, Controls by Reuter, Jürgen, Kersten, Heinrich, Klett, Gerhard
Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacki by Codings, Zach
Hacking with Kali Linux: Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. by Hack, Anthony
Secrets of a Cyber Security Architect by Schoenfield, Brook S. E.
Mathematical Theory of Advanced Computing by Osterhage, Wolfgang W.
Cryptography: Breakthroughs in Research and Practice by
Cissp: Tips and Tricks to Learn and Study about Information Systems Security from A-Z by Schmidt, Walker
Network and System Security: 13th International Conference, Nss 2019, Sapporo, Japan, December 15-18, 2019, Proceedings by
Kali Linux: The Complete Guide To Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How To H by Hack, Anthony
Practical Handbook for Professional Investigators by McMahon CLI Cfe, Rory J.
Policing Organized Crime: Intelligence Strategy Implementation by Gottschalk, Petter
Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations by Girod, Robert J.
Global Issues in Contemporary Policing by
Trends in the Judiciary: Interviews with Judges Across the Globe, Volume Two by
Community Policing and Peacekeeping by
Policing in Israel: Studying Crime Control, Community, and Counterterrorism by
State Fragility Around the World: Fractured Justice and Fierce Reprisal by Pate, Matthew, Gould, Laurie A.
Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War by
Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival by Heard, Brian John
Economic Development, Crime, and Policing: Global Perspectives by
Trends in Policing: Interviews with Police Leaders Across the Globe, Volume Five by
Trends in Legal Advocacy: Interviews with Prosecutors and Criminal Defense Lawyers Across the Globe, Volume One by
Police Investigative Interviews and Interpreting: Context, Challenges, and Strategies by Lai, Miranda, Norma, Caroline, Mulayim, Sedat
Collaborative Policing: Police, Academics, Professionals, and Communities Working Together for Education, Training, and Program Implementation by
Criminal Enterprise Investigation by Trier, Thomas A.
Corruption, Fraud, Organized Crime, and the Shadow Economy by
Financial Crimes: A Threat to Global Security by
Policing Global Movement: Tourism, Migration, Human Trafficking, and Terrorism by
Delivering Police Services Effectively by Den Heyer, Garth
Learning-Based Vanet Communication and Security Techniques by Zhuang, Weihua, Zhou, Sheng, Xiao, Liang
The Evolution of Policing: Worldwide Innovations and Insights by
Ubiquitous Computing and Computing Security of Iot by
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines by Chopra, Abhishek, Chaudhary, Mukund
Security in Smart Cities: Models, Applications, and Challenges by
Cold Cases: Evaluation Models with Follow-Up Strategies for Investigators, Second Edition by Adcock, James M., Stein, Sarah L.
Police Corruption: Preventing Misconduct and Maintaining Integrity by Prenzler, Tim
Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes by Mining, Ethem
Sustainable Logistics and Production in Industry 4.0: New Opportunities and Challenges by
Security and Privacy in Communication Networks: 15th Eai International Conference, Securecomm 2019, Orlando, Fl, Usa, October 23-25, 2019, Proceedings by
E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age: 8th International Conference, E-Democracy 2019, Athens, Greece, December 12- by
Hacking With Kali Linux: The Step-By-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing by Carmack, David James
Psychology and Law in Europe: When West Meets East by
Financial Investigation and Forensic Accounting by Manning, George A.
See More