• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2020

oh Merde je ne me souviens pas: un organisateur pour tous vos mots de passe by Slipy
Handbook of Computer Networks and Cyber Security: Principles and Paradigms by
Machine Learning Approaches in Cyber Security Analytics by Thomas, Tony, P. Vijayaraghavan, Athira, Emmanuel, Sabu
Criptomoneda: La guía definitiva para el comercio en criptomonedas (Aprendizaje sistemático acerca de invertir y comerciar en cripto by Rael, Ade
Quantum Cryptography and the Future of Cyber Security by
Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part II by
Digital Video and Audio Broadcasting Technology: A Practical Engineering Guide by Fischer, Walter
Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part I by
Administer and Secure Enterprise Linux: Red Hat and CentOS versions 7 and 8 by Overton, Russell, Technical Academy, Janus
Security+: A Practitioners Study Guide by Proehl, Lauren, Evenden, David
Advances in Cyber Security Analytics and Decision Systems by
Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe by Rubinoff, Shira
Darknet Secrets: A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online by Bogachev, Yuri a.
Shit I Can't Remember: Keep track of usernames, passwords, web addresses in one easy & organized location by Books, Family's
Selected Areas in Cryptography - Sac 2019: 26th International Conference, Waterloo, On, Canada, August 12-16, 2019, Revised Selected Papers by
CompTIA Security+ Practice Tests SY0-501: Practice tests in 4 different formats and 6 cheat sheets to help you pass the CompTIA Security+ exam by Neil, Ian
Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social En by Evans, Lester
Ethical Hacking: A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking by Lewis, Elijah
Cybersecurity: A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z by Lewis, Elijah
Unmasking the hacker: demystifying cybercrime by Turner, Amanda-Jane
Unmasking the Hacker: Demystifying Cybercrime by Turner, Amanda-Jane
Cybersecurity For Beginners: Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism by Bogachev, Yuri a.
Hacking For Beginners: Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe by Bogachev, Yuri a.
Cyber Law in Japan by Yanaga, Masao
Cyber Law in Italy by Ziccardi, Giovanni
Protektion 4.0: Das Digitalisierungsdilemma by Müller, Günter
Quality, Reliability, Security and Robustness in Heterogeneous Systems: 15th Eai International Conference, Qshine 2019, Shenzhen, China, November 22-2 by
Hacking With Kali Linux: The Ultimate Guide For Beginners To Hack With Kali Linux. Learn About Basics Of Hacking, Cybersecurity, Wireless Netwo by Solow, Frank
Principles for Cyber Security Operations by Hettema, Hinne
Cybersecurity Engineer I'm Not Arguing I'm Just Explaining Why I'm Right by Quotes, Cybersecurity
Advances in Cyber Security: First International Conference, Aces 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers by
PC Computer Security & Backup Guide: How to Secure & Backup Your PC with Antivirus & Malware Software by Albert, Jon
Certified Cyber Security Operations Manager: Exam Prep Guide by Kaplan, Michael I.
Red Team Development and Operations: A practical guide by Vest, Joe, Tubberville, James
Sicherheit in vernetzten Systemen: 27. DFN-Konferenz by
Digital Transformation for a Sustainable Society in the 21st Century: I3e 2019 Ifip Wg 6.11 International Workshops, Trondheim, Norway, September 18-2 by
Cybersecurity: Essential Guide for Beginners to Learn Basic Methods of Cybersecurity by George, Henry
Black Hat Go: Go Programming for Hackers and Pentesters by Patten, Chris, Kottmann, Dan, Steele, Tom
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und P by Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von Zugangsdaten und PINs by Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von persönlichen Zugangsdaten und PINs by Schutz, Thorsten
Blockchain and Trustworthy Systems: First International Conference, Blocksys 2019, Guangzhou, China, December 7-8, 2019, Proceedings by
Information Security Applications: 20th International Conference, Wisa 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers by
Emerging Technologies for Authorization and Authentication: Second International Workshop, Etaa 2019, Luxembourg City, Luxembourg, September 27, 2019, by
Intrusion Detection: A Data Mining Approach by SenGupta, Nandita, Sil, Jaya
Image and Video Technology: Psivt 2019 International Workshops, Sydney, Nsw, Australia, November 18-22, 2019, Revised Selected Papers by
Deep Biometrics by
Risk and the Theory of Security Risk Assessment by Young, Carl S.
Applied Incident Response by Anson, Steve
Digital Forensics and Incident Response - Second Edition: Incident response techniques and procedures to respond to modern cyber threats by Johansen, Gerard
Hacking: Fundamentals for Absolute Beginners by Bell, Alexander
I'm Dead, But My Password Is Not by Howard, Josh K.
Fourth International Congress on Information and Communication Technology: Icict 2019, London, Volume 2 by
Informationssicherheit Und Datenschutz Systematisch Und Nachhaltig Gestalten: Eine Kompakte Einführung in Die PRAXIS by Hanschke, Inge
Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed and Trusted Industry Environment by
Topics in Cryptology - Ct-Rsa 2020: The Cryptographers' Track at the Rsa Conference 2020, San Francisco, Ca, Usa, February 24-28, 2020, Proceedings by
I'll Never Forget You: Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral Motif by Secure, Sam
Blockchain Development for Finance Projects by Roy, Ishan
Information Security Management Principles by Alexander, David, Finch, Amanda, Taylor, Andy
Iso/Iec 27701: 2019: An introduction to privacy information management by Shipman, Alan, Watkins, Steve
Shield Your Privacy: 15 Ways To Protect Your Personal Information by Nickerson, Heather
Cryptography Arithmetic: Algorithms and Hardware Architectures by Omondi, Amos R.
Seguridad en Redes y Sistemas de Comunicación. Teoría y Práctica by García Teodoro, Pedro, Maciá Fernández, Gabriel
What the Heck Is My Password? by Casey, Beth
Learn to hack from scratch: A hands-on lab based penetration testing experience for beginners to experts with step by step instructions by Anon, A.
Quantum Cryptography and the Future of Cyber Security by
Das große Buch der Passwörter: Vergessen Sie nie wieder ein Passwort. by Journals, Dream Big
Linux for Hackers: A Comprehensive Beginners Guide to the World of Hacking Using Linux by Vance, William
Linux Command: A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z by Vance, William
Linux Command: A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z by Vance, William
Linux for Hackers: A Comprehensive Beginners Guide to the World of Hacking Using Linux by Vance, William
Protect Your Identity: Step-by-Step Guide and Workbook by Kerskie, Carrie
Adaptive Autonomous Secure Cyber Systems by
Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm: Trends, Advances, and Future Prospects by Sniatala, Pawel, Amini, M. Hadi, Boroojeni, Kianoosh G.
Handbook of Research on Intrusion Detection Systems by
Passwort Manager: Nie wieder Passwort vergessen - Ordne deine Zugangsdaten sicher - Offline auf Papier und immer greifbar by D, Abc by
Cyberwarfare: Targeting America, Our Infrastructure and Our Future by Bell, Larry
The Ethics of Cybersecurity by
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques by Troia, Vinny
J'ai une mémoire de Poisson Rouge carnet de mots de passe pour internautes et informaticiens: Index répertoire - Format pratique - Grande taille de ca by Alphabétique, Répertoire
Cryptocurrencies: An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin Basics Including M by Jones, Herbert
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit dekorativen Blum by Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Narwal Illus by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Eulen Illust by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs - by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von Internet Zugangsdaten und PINs - Mit süßer by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Alpaka Illus by Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von Internet Zugangsdaten und PINs - Mit dek by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs - by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Lama Illustr by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs - by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Elefanten Il by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Fuchs Illust by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Einhorn Illu by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs - by Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten Mit süßer Faultier Illus by Schutz, Thorsten
Kali Linux: Advanced Methods and Strategies to Learn Kali Linux by Thorpe, Ethan
The Essential Guide to Cybersecurity for SMBs by Hayslip, Gary
Information Security and Cryptology - Icisc 2019: 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers by
Implementing Computational Intelligence Techniques for Security Systems Design by
The Networknomicon, or SNMP Mastery by Alhazred, Abdul, Lucas, Michael W.
SNMP Mastery by Lucas, Michael W.
SNMP Mastery by Lucas, Michael W.
Criptomonedas: Cómo lucrar del bitcoin, ethereum para aprendices (Guía para entender el litecoin, bitcoin y más.) by Mota, Peer
Criptomoneda: Consejos exitosos sobre el comercio en criptomoneda (Una guía completa para invertir e intercambiar en blockchains) by Soliz, Bart
Criptomonedas: Comercio e inversión en bitcoin litecoin y otras más (Métodos de comercio e inversión en bitcoin) by Mora, Pablo
Criptomoneda: Un curso completo de intercambio e inversiones digitales (Aprendizaje sistemático acerca de invertir y comerciar en cr by Baez, Elido
Criptomoneda: La guía definitiva para el comercio en criptomonedas (Haga una gran cantidad de dinero con criptomonedas) by Luna, Jair
Networking Hacking: 2 books in 1: Networking for Beginners, Hacking with Kali Linux: Easy Guide to Learn Cybersecurity, Wireless, LTE, Net by Mach, Dylan
Penetration Testing: Penetration Testing: A Hands-On Guide For Beginners by Wallace, Connor
Writing a Cybersecurity Accreditation Package: A 21st Century NIST-based & CMMC Roadmap by Russo Cissp-Issap, Mark a.
Information and Communications Security: 21st International Conference, Icics 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers by
Spatial Computing by Shekhar, Shashi, Vold, Pamela
Smart Card Research and Advanced Applications: 18th International Conference, Cardis 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selec by
The World of Hacking: Meet The Digital World by Goyal, Parth
Trusted Computing and Information Security: 13th Chinese Conference, Ctcis 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers by
Home-Office und die Bedeutung des arbeitsrechtlichen Datenschutzes für Unternehmen by Hebing, Madlen
Computer Security: Esorics 2019 International Workshops, Iosec, Mstec, and Finsec, Luxembourg City, Luxembourg, September 26-27, 2019, Re by
Cyber Security of Industrial Control Systems in the Future Internet Environment by
Mastering Linux Security and Hardening by Tevault, Donald a.
Computer Security: Esorics 2019 International Workshops, Cybericps, Secpre, Spose, and Adiot, Luxembourg City, Luxembourg, September 26-2 by
Information Security Theory and Practice: 13th Ifip Wg 11.2 International Conference, Wistp 2019, Paris, France, December 11-12, 2019, Proceedings by
Cyber Security of Industrial Control Systems in the Future Internet Environment by
Cyber Warfare - Truth, Tactics, and Strategies by Cunningham, Chase
Game of hacking with terminal: The only way to stop a hacker is to think like one. by Mr N. Ravi Kiran
Ciso Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers by Fitzgerald, Todd
Cross-Cultural Design by Akpem, Senongo
Designing a Hipaa-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events by Thompson, Eric C.
AWS Security Cookbook by Kanikathottu, Heartin
Innovative Security Solutions for Information Technology and Communications: 12th International Conference, Secitc 2019, Bucharest, Romania, November by
Implementing Computational Intelligence Techniques for Security Systems Design by
Security Operations in Practice by Sheward, Mike
Qos Routing Algorithms for Wireless Sensor Networks by T, Shiv Prakash, Kumaraswamy, M., Venugopal, K. R.
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting by Alrabaee, Saed, Shirani, Paria, Debbabi, Mourad
Blockchain Cybersecurity, Trust and Privacy by
Data Visualization: Trends and Challenges Toward Multidisciplinary Perception by
Testbeds and Research Infrastructures for the Development of Networks and Communications: 14th Eai International Conference, Tridentcom 2019, Changsha by
Comando de Linux: Una guía completa para principiantes para aprender los reinos del comando Linux desde A-Z by Vance, William
Time Override: Prophetic Images from the Future Decoded by Clearfield, Dylan
Secure Knowledge Management in Artificial Intelligence Era: 8th International Conference, Skm 2019, Goa, India, December 21-22, 2019, Proceedings by
Linux para hackers: Una guía completa para principiantes para el mundo del hackeo utilizando Linux by Vance, William
Cyberkriminalität. Bedeutung, Auswirkungen auf digitalisierte Produktions- und Logistikprozesse und Abwehrmaßnahmen by Danner, Sofie
Cyber Security Practitioner's Guide by
Notebook: A cute and discrete password book to keep your log in details safe and close at hand at all times (Large Print Edition) by Summers, Faith V.
Cyber Security: Essential principles to secure your organisation by Calder, Alan
Cybersecurity Law, Standards and Regulations: 2nd Edition by Schreider, Tari
Coding Theory by
Wsdm'19: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining by Wsdm'19
Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Windi by
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), by
WordPress Security for Webmaster 2020: How to Stop Hackers Breaking into Your Website by Williams, Andy
21st Century Prometheus: Managing Cbrn Safety and Security Affected by Cutting-Edge Technologies by
Digital Forensics and Watermarking: 18th International Workshop, Iwdw 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers by
Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments by Dall'acqua, Luisa, Gironacci, Irene M.
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, VOL 1 by
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, VOL 2 by
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, VOL 3 by
Cyber Security Guide: "Art of Hacking" by Security, The Hard
Wasec: Web Application Security for the everyday software engineer: Everything a web developer should know about application by Nadalin, Alessandro
Kali Linux: 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux by Thorpe, Ethan
Conoce todo sobre Hacking y seguridad de páginas Web by Barbero Muñoz, Carlos a., Ramos Varón, Antonio Ángel
Design and Analysis of Security Protocol for Communication by
Hacking Connected Cars: Tactics, Techniques, and Procedures by Knight, Alissa
The Implant by Ivey, Robert L.
Conoce todo sobre Kali Linux by Santo Orcero, David
Conoce todo sobre Seguridad Digital e Informática by Maíllo Fernández, Juan Andres
Rethinking InfoSec: Thoughts on why today's Information Security doesn't work, and how we can do better. by Van Der Gaast, Greg
Cyber Security in India: Education, Research and Training by
Handbook of Big Data Privacy by
Cyber Law in Bangladesh by Karim, Mohammad Ershadul
Cyber Law in Czech Republic by Donát, Josef, Polcák, Radim, Čermák, Jiří
Codaspy'19: Proceedings of the 2019 International Symposium on Data and Application Security and Privacy by Codaspy'19
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), by
Impact of Digital Transformation on Security Policies and Standards by
Conoce todo sobre Seguridad Informática. Básico by Gómez Vieites, Álvaro
Gray Day Gray Day: My Undercover Mission to Expose America's First Cyber Spy My Undercover Mission to Expose America's First Cyber Spy by O'Neill, Eric
Differential Privacy for Dynamic Data by Le Ny, Jerome
Ispd'19: Proceedings of the 2019 International Symposium on Physical Design by Ispd'19
Securing Cloud Services: A pragmatic guide by Newcombe, Lee
Post-Quantum Cryptography: 11th International Conference, Pqcrypto 2020, Paris, France, April 15-17, 2020, Proceedings by
Seguridad Informática - Manual Principiantes: Un excelente manual para acercarse al mundo de la ciberseguridad personal by Ruggero, Placido
Hack Proof Your Business, Volume 2: Featuring 14 IT Experts Nationwide by Brown, Chuck, Bunnell, Bill, Tomlinson, Chuck
Cybersecurity Attacks - Red Team Strategies by Rehberger, Johann
Visual Communication for Cybersecurity by Van Deursen, Nicole
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership by Carey, Marcus J., Jin, Jennifer
Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! by Dodson, Adam
CyberGuardian(TM): A SecureTheVillage Guide for Residents by Krantz, Steve
Web Penetration Testing: Step-By-Step Guide by Shatob, Radhi
21 oppituntia: Mitä olen oppinut pudottuani Bitcoinin kaninkoloon by
Cryptology for Engineers: An Application-Oriented Mathematical Introduction by Schmied, Robert
Foundations and Practice of Security: 12th International Symposium, Fps 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers by
Handbook of Research on Multimedia Cyber Security by
Information Security and Cryptology: 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers by
Learn Azure Sentinel: Integrate Azure security with artificial intelligence to build secure cloud systems by Bushey, Gary, Diver, Richard
Cyber Strategy: Risk-Driven Security and Resiliency by Siegel, Carol A., Sweeney, Mark
Cyber Strategy: Risk-Driven Security and Resiliency by Sweeney, Mark, Siegel, Carol A.
Cyber Crisis Management: Das Praxishandbuch Zu Krisenmanagement Und Krisenkommunikation by Kaschner, Holger
Cyber Defence in the Age of Ai, Smart Societies and Augmented Humanity by
Big Data Analytics and Computing for Digital Forensic Investigations by
See More