• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2020

Embedded Systems and Artificial Intelligence: Proceedings of Esai 2019, Fez, Morocco by
Mobile Security: Schwachstellen Verstehen Und Angriffsszenarien Nachvollziehen by Westhoff, Dirk
Blockchain: An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Mone by Jones, Herbert
Practical Mobile Forensics - Fourth Edition by Mahalik, Heather, Tamma, Rohit, Skulkin, Oleg
Modern Theories and Practices for Cyber Ethics and Security Compliance by
Safety and Security Issues in Technical Infrastructures by
Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities by Rahalkar, Sagar
Days of Pandemic by Aldred, Andrew
Securing Blockchain Networks like Ethereum and Hyperledger Fabric: Learn advanced security configurations and design principles to safeguard Blockchai by Parisi, Alessandro
Ethical Hacking: Best Tips and Tricks of Ethical Hacking by Lewis, Elijah
Cybersecurity: Best Tips and Tricks to Learn and Secure Your Cyber Networks by Lewis, Elijah
A Hacker I Am Vol 2 by Ford, Craig
A Hacker I Am Vol 2 by Ford, Craig
IBM i Security Administration and Compliance by Woodbury, Carol
NetScaler Hacks: 10 Hacks for the Citrix NetScaler ADC/MPX/SDX - Extend the life of this hardware with amazing ideas for legacy Citrix by Moses, Joseph
Safety and Security Issues in Technical Infrastructures by
Modern Theories and Practices for Cyber Ethics and Security Compliance by
Digital Forensics with Kali Linux - Second Edition: Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux by Parasram, Shiva V. N.
Information Systems: 16th European, Mediterranean, and Middle Eastern Conference, Emcis 2019, Dubai, United Arab Emirates, December 9-10, 2 by
Machine Learning for Networking: Second Ifip Tc 6 International Conference, Mln 2019, Paris, France, December 3-5, 2019, Revised Selected Papers by
Cyber Law in Australia by Cho, George
The Cybersecurity Body of Knowledge: The Acm/Ieee/Ais/Ifip Recommendations for a Complete Curriculum in Cybersecurity by Shoemaker, Daniel, Kohnke, Anne, Sigler, Ken
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems by Beyer, Betsy, Adkins, Heather, Blankinship, Paul
Secure Yourself: Staying Safe in a Digital World by Fousekis, Dimitri
Datenschutz - Wer hat den schwarzen Peter?: Aufgabenverteilung im Datenschutzmanagement by Pauls, Birgit
Security Infrastructure Technology for Integrated Utilization of Big Data: Applied to the Living Safety and Medical Fields by
Cross-Industry Use of Blockchain Technology and Opportunities for the Future by
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence by Oettinger, William
Top Hacking Techniques & Terms: A must knowledge for everyone to stay protected from cyber attacks by Mohammed, Sarfaraz
Applied Machine Learning/Neural Networks: Offensive Security by Atkins, Christopher
Security in Computing and Communications: 7th International Symposium, Sscc 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers by
Measuring Cybersecurity and Cyber Resiliency by Snyder, Don, Mayer, Lauren A., Weichenberg, Guy
CCNA Certification Study Guide and Practice Tests Kit: Exam 200-301 by Lammle, Todd, Buhagiar, Jon
Intelligent Information Processing X: 11th Ifip Tc 12 International Conference, Iip 2020, Hangzhou, China, July 3-6, 2020, Proceedings by
Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method? by Rokas, Liutauras
Unhackable: Your Online Security Playbook: Recreating Cyber Security in an Unsecure World by Mansour, George
Cyber Weapons of Mass Psychological Destruction: And the People Who Use Them by Sethi, Vikram
Cyber Weapons of Mass Psychological Destruction: and the People Who Use Them by Sethi, Vikram
Etica hacker: Guía Completa Para Principiantes Para Aprender Sobre las Estrategias Eficaces de la Ética Hacker(Libro En Español/Spanish version) by Lewis, Elijah
Ciberseguridad: Guía completa para principiantes aprende todo de la ciberseguridad de la Aa la Z(Libro En Español/Spanish version) by Lewis, Elijah
How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools by Tierney, Shane, Schmid, Jon, Best, Katharina Ley
Ethical Hacking: Advanced and Effective Measures of Ethical Hacking by Lewis, Elijah
Advances in Cryptology - Eurocrypt 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa by
Advances in Cryptology - Eurocrypt 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa by
Advances in Cryptology - Eurocrypt 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa by
PCI Dss: An Integrated Data Security Standard Guide by Seaman, Jim
Cybersecurity: Advanced and Effective Measures to Secure Your Cyber Networks by Lewis, Elijah
Le répertoire secret d'une licorne connectée !: Petit calepin utile pour mémoriser vos codes d'accès pour internet -124 pages - Format 14x21.6 cm - Co by Nohicknohack, Editions
Build Your Own Blockchain: A Practical Guide to Distributed Ledger Technology by Hellwig, Daniel, Karlic, Goran, Huchzermeier, Arnd
Automatische Erkennung und Messung von IT-Sicherheitsaufwänden by Wittor, Sebastian
Stiennon On Security: Collected Essays Volume 1 by Stiennon, Richard
Blockchain for Non IT Professionals: An Example Driven, Metaphorical Approach by Srinivas Mahankali
Constructing Cybersecurity: Power, Expertise and the Internet Security Industry by Whiting, Andrew
The Modern Parent: Raising a great kid in the digital world by Oglethorpe, Martine
Recent Trends in Decision Science and Management: Proceedings of Icdsm 2019 by
Personal Data Protection and Legal Developments in the European Union by
Legal Regulations, Implications, and Issues Surrounding Digital Data by
Bitcoin Basics: A Beginner's Guide to Bitcoin and Blockchain by Gordon, Marc
Intro to Cybersecurity: A Practitioner's Study Guide by Evenden, David, Carrera, Dominic
Data Protection: Ensuring Data Availability by de Guise, Preston
Data Protection: Ensuring Data Availability by de Guise, Preston
Cybersecurity Fundamentals: A Real-World Perspective by Thakur, Kutub, Pathan, Al-Sakib Khan
Cybersecurity Fundamentals: A Real-World Perspective by Pathan, Al-Sakib Khan, Thakur, Kutub
Container Security: Fundamental Technology Concepts That Protect Containerized Applications by Rice, Liz
Digital Self-Defense: The Layperson's Guide to Digital Security by Fields, Justin
Cryptoeconomics: Igniting a New Era of Blockchain by Xu, Wei, Gong, Jian
You Can't Afford to Get Hacked: The must-have practical guide to keeping your household safe online by Roknifard, Amir, Pirotti, Amjad
Building an Anonymization Pipeline: Creating Safe Data by Emam, Khaled El, Arbuckle, Luk
Penetration Testing for Dummies by Shimonski, Robert
Cybersecurity essentials - Beginners guide: Step-by-step manual with ten methods to protect your privacy online by Costa, David, Amadio, Gianluca
Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications by Kävrestad, Joakim
Unhackable: Your Online Security Playbook: Recreating Cyber Security in an Unsecure World by Mansour, George
Unhackable: Your Online Security Playbook: Recreating Cyber Security in an Unsecure World by Mansour, George
Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation by Singh, Harpreet, Sharma, Himanshu
Cross-Industry Use of Blockchain Technology and Opportunities for the Future by
Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems by
Die Hard Guide to Command Line Programs and Hacker Culture Level 1: A Guide to using Command line based programs and Hacker Culture level 1 - Getting by Voice, Ray
Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications: 9th Eai International Conference, Cloudcomp 2019, and 4th Eai Internationa by
The Design of Rijndael: The Advanced Encryption Standard (Aes) by Daemen, Joan, Rijmen, Vincent
Three Little Hackers by Carey, Marcus J.
Ultimate GDPR Practitioner Guide (2nd Edition): Demystifying Privacy & Data Protection by Massey, Stephen R.
CCNP and CCIE Security Core Scor 350-701 Official Cert Guide by Santos, Omar
Combating Security Challenges in the Age of Big Data: Powered by State-Of-The-Art Artificial Intelligence Techniques by
Incident Handling and Response: A Holistic Approach for an efficient Security Incident Management. by Alex, Jithin
Data Science and Analytics: 5th International Conference on Recent Developments in Science, Engineering and Technology, Redset 2019, Gurugram, Ind by
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more. by Medlin, Richard
Password Authentication for Web and Mobile Apps: The Developer's Guide To Building Secure User Authentication by Chestnykh, Dmitry
Data and Applications Security and Privacy XXXIV: 34th Annual Ifip Wg 11.3 Conference, Dbsec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings by
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) by White, Gregory B., Sjelin, Natalie
Cybersecurity Threats, Malware Trends, and Strategies: Mitigate exploits, malware, phishing, and other social engineering attacks by Rains, Tim
Cryptocurrency in a Nutshell: The Basics of Blockchain and Cryptocurrency Part 1 by Somlok, Greg
Cyber Threat Intelligence for the Internet of Things by Bou-Harb, Elias, Neshenko, Nataliia
Devsecops for .Net Core: Securing Modern Software Applications by Zeeshan, Afzaal Ahmad
Learning by Practicing - Mastering TShark Network Forensics: Moving From Zero to Hero by Alleyne, Nik
Data Security in Cloud Storage by Shen, Xuemin Sherman, Xu, Chunxiang, Zhang, Yuan
Reversible Steganography and Authentication Via Transform Encoding by Mandal, Jyotsna Kumar
Dot Con: The Art of Scamming a Scammer by Veitch, James
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World by Menn, Joseph
Engineering Psychology and Cognitive Ergonomics. Cognition and Design: 17th International Conference, Epce 2020, Held as Part of the 22nd Hci Internat by
Cyber Security Cryptography and Machine Learning: Fourth International Symposium, Cscml 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings by
Red Teaming Around Your Backyard While Drinking Our Juice in The Hood: Cyber Intelligence Report: 202 by Medlin, Richard, Sharma, Nitin, Casey, Justin
The Palgrave Handbook of International Cybercrime and Cyberdeviance by
The Palgrave Handbook of International Cybercrime and Cyberdeviance by
Thoughts on cyber security by Desmyter, Quinten
Threat Hunting, Hacking, and Intrusion Detection: SCADA, Dark Web, and APTs by Sharma, Nitin, Ma, James, Medlin, Richard
Computer and Network Security by
Security Rights in Intellectual Property by
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks by
Personal Data Protection and Legal Developments in the European Union by
Legal Regulations, Implications, and Issues Surrounding Digital Data by
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations by Haber, Morey J.
Network Availability of Internet Services: Threats and Defenses by Stavrou, Angelos
Security Risk Management for the Internet of Things: Technologies and Techniques for Iot Security, Privacy and Data Protection by
Digital Downfall: Technology, Cyberattacks and the End of the American Republic by Taylor, Hugh
Internet Password Keeper by
Artificial Intelligence in Hci: First International Conference, Ai-Hci 2020, Held as Part of the 22nd Hci International Conference, Hcii 2020, Copenha by
Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environme by Rising, Peter
Web Security for Developers: Real Threats, Practical Defense by McDonald, Malcolm
IC-Bct 2019: Proceedings of the International Conference on Blockchain Technology by
Introduction to Online Safety: A practical Guide to Cybersecurity by Jacob, John G.
Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data by Hoptroff, Richard, Emam, Khaled El, Mosquera, Lucy
The Art of Hacking: Ancient Wisdom for Cybersecurity Defense by May, Ken
Introduction to FortiGate Part-1 Infrastructure: Fortinet Network Security Introduction (Black and White Edition) by Howard, Daniel
Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach by Schauer, Stefan, König, Sandra, Rass, Stefan
The Domains of Identity: A Framework for Understanding Identity Systems in Contemporary Society by Young, Kaliya
The Domains of Identity: A Framework for Understanding Identity Systems in Contemporary Society by Young, Kaliya
Hci for Cybersecurity, Privacy and Trust: Second International Conference, Hci-CPT 2020, Held as Part of the 22nd Hci International Conference, Hcii 2 by
Applied Approach to Privacy and Security for the Internet of Things by
Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems by
Developing a Cybersecurity Immune System for Industry 4.0 by Petrenko, Sergei
Applied Approach to Privacy and Security for the Internet of Things by
Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies by
Information Systems Security and Privacy: 5th International Conference, Icissp 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Pa by
Secure Html programming and website building: learn coding for website building in less than 24 hrs. by Ramesh Kumar, Sri Rekha
Cybersecurity for Information Professionals: Concepts and Applications by
Cybersecurity for Information Professionals: Concepts and Applications by
Guida al Pentesting: ed. 2020 by Caranti, Milo
Linux for Hackers: Tips and Tricks of Using Linux Theories for Hacking by Vance, William
Practical Data Security by
Introduction to Criminal Justice Information Systems by Ioimo, Ralph
The Re-Evolution of American Street Gangs by
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits by Tiller, James S.
Blockchain Technology and Applications by Banafa, Ahmed
Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastru by
Linux Command: Logical and Systematic Approach to Linux Administration by Vance, William
Linux for Hackers: The Advanced Guide on Kali Linux Operating System by Vance, William
Unclassified and Secure: A Defense Industrial Base Cyber Protection Program for Unclassified Defense Networks by Adgie, Mary Kate, Gonzales, Daniel, Harting, Sarah
Linux Command: Advanced Methods and Strategies to Shell Scripting by Vance, William
Securing and Sustaining the Olympic City: Reconfiguring London for 2012 and Beyond by Fussey, Pete, Hobbs, Dick, Coaffee, Jon
Mathematical Foundations of Public Key Cryptography by Xu, Guangwu, Wang, Xiaoyun, Wang, Mingqiang
Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare by
Securing Cyber-Physical Systems by
Security and Data Reliability in Cooperative Wireless Networks by Hassan, Emad
Biometrics in a Data Driven World: Trends, Technologies, and Challenges by
Statistical Methods in Computer Security by
Location Privacy in Wireless Sensor Networks by Lopez, Javier, Cuellar, Jorge, Rios, Ruben
Empirical Research for Software Security: Foundations and Experience by
Introduction to Certificateless Cryptography by Vasilakos, Athanasios V., Xiong, Hu, Qin, Zhen
Analysis and Design of Networked Control Systems Under Attacks by Guo, Lei, Yuan, Yuan, Yang, Hongjiu
Intrusion Detection and Prevention for Mobile Ecosystems by
Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations by Hu, Fei
Infinity Ethical Hacking: Learn basic to advance hacks by Sapp, Arthur S.
How Hacks Happen: and how to protect yourself by Germanos, Mark Anthony, Cracker, Brad
Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain by Moriarty, Kathleen M.
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks by
Cybercrime Investigations: A Comprehensive Resource for Everyone by Merzon, Antonia, Bandler, John
Professional Security Management: A Strategic Guide by Swanson, Charles
Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, Dimva 2020, Lisbon, Portugal, June 24-26, 2020, Proc by
Cybersecurity, Hacking, and Espionage - a beginners guide by Vaid, Abhinav
Vulnerability Assessment: The Missing Manual for the Missing Link by Johnston, Rg
Progress in Cryptology - Africacrypt 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 - 22, 2020, Proceedings by
Operacion Bitcoins: Login Infernal by Antonioli, Maria Gloria, Hill, Alberto Daniel
Cyber Warfare: A Documentary and Reference Guide by Springer, Paul
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk by Gorecki, Andrew
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats by Tumbarello, Matt, Dunkerley, Mark
Humorous Cryptograms: 300 Large Print Puzzles To Keep You Entertained (Large Print Edition) by Nest, Game
Near Miss: : 10 Ways Your IT Guy is Failing to Protect You & Putting Your Business at Risk by Lacy, Brent
Computer Security and Encryption: An Introduction by Chauhan, S. R., Jangra, S.
Cybersecurity essentials by Winowicz, Pawel
Information Fusion in Distributed Sensor Networks with Byzantines by Abrardo, Andrea, Barni, Mauro, Kallas, Kassem
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks by Galluccio, Ettore, Lombari, Gabriele, Caselli, Edoardo
Blockchain: Empowering Secure Data Sharing by Shen, Meng, Zhu, Liehuang, Xu, Ke
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) by White, Gregory B., Sjelin, Natalie
Code-Based Cryptography: 8th International Workshop, Cbcrypto 2020, Zagreb, Croatia, May 9-10, 2020, Revised Selected Papers by
Financial Cryptography and Data Security: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Paper by
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM by Sabillon, Regner
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage by Steffens, Timo
Networking for Dummies by Lowe, Doug
Active Shooter Response Training: Lone Wolf to Coordinated Attacks by Hyderkhan, Scott
Active Shooter Response Training: Lone Wolf to Coordinated Attacks by Hyderkhan, Scott
Adapt and Overcome: What Business Owners Need to Do to Keep Employees, Clients and Infrastructure Safe During a Time of Crisis by Lam, Chee, Morgan, Jeri, Hornung, Bryan
Cybersecurity: 3 in 1- Beginner's Guide+ Tips and tricks+ Advanced and Effective measures to secure your Cyber Networks by Lewis, Elijah
Ethical Hacking: 3 in 1- Beginner's Guide+ Tips and Tricks+ Advanced and Effective measures of Ethical Hacking by Lewis, Elijah
Security of Cyber-Physical Systems: Vulnerability and Impact by
Large-Scale Data Streaming, Processing, and Blockchain Security by
Social Network Analysis and Law Enforcement: Applications for Intelligence Analysis by Burcher, Morgan
Identity and Data Protection for the Average Person by Pasono, Michael
Advances in Communication, Devices and Networking: Proceedings of Iccdn 2019 by
Credit Card Fraud Detection and Analysis through Machine Learning by Sharma, Anand, Goyal, Yogita
Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm by Landeck, Mika
See More