• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2020

Practical Artificial Intelligence and Blockchain: A guide to converging blockchain and AI to build smart applications for new economies by Kumble, Ganesh Prasad
Cyber Security Education: Principles and Policies by
Cyber Security Education: Principles and Policies by
China and Middle East Conflicts: Responding to War and Rivalry from the Cold War to the Present by Burton, Guy
Evolutionary Computing and Mobile Sustainable Networks: Proceedings of Icecmsn 2020 by
Data Science and Security: Proceedings of Idscs 2020 by
Open Source Intelligence and Cyber Crime: Social Media Analytics by
Ciberseguridad: Los mejores consejos y trucos para aprender y proteger sus redes cibernéticas by Lewis, Elijah
Ética Hacker: Los Mejores consejos y trucos de la ética hacker by Lewis, Elijah
Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications by
Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications by
Modeling and Design of Secure Internet of Things by
Distributed Denial of Service Attacks: Real-World Detection and Mitigation by Özçelik, İlker, Brooks, Richard
Distributed Denial of Service Attacks: Real-World Detection and Mitigation by Özçelik, İlker, Brooks, Richard
Testing and Securing Web Applications by Johnson, Greg, Das, Ravi
Testing and Securing Web Applications by Johnson, Greg, Das, Ravi
Online Predators, an Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena by Lee, Jeffrey A.
Innovations and Interdisciplinary Solutions for Underserved Areas: 4th Eai International Conference, Intersol 2020, Nairobi, Kenya, March 8-9, 2020, P by
Beginners Guide To Ethical Hacking And Cyber Security by Ojha, Abhinav
Financial Cryptography and Data Security: FC 2020 International Workshops, Asiausec, Codefi, Voting, and Wtsc, Kota Kinabalu, Malaysia, February 14, 2 by
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM by Sabillon, Regner
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps by
Information Security and Privacy: 25th Australasian Conference, Acisp 2020, Perth, Wa, Australia, November 30 - December 2, 2020, Proceedings by
Transdisciplinary Perspectives on Risk Management and Cyber Intelligence by
Real-Time and Retrospective Analyses of Cyber Security by Bird, David Anthony
Implementing Cryptography Using Python by Bray, Shannon W.
Advances in Cryptology - Crypto 2020: 40th Annual International Cryptology Conference, Crypto 2020, Santa Barbara, Ca, Usa, August 17-21, 2020, Procee by
Advances in Cryptology - Crypto 2020: 40th Annual International Cryptology Conference, Crypto 2020, Santa Barbara, Ca, Usa, August 17-21, 2020, Procee by
Human Aspects of Information Security and Assurance: 14th Ifip Wg 11.12 International Symposium, Haisa 2020, Mytilene, Lesbos, Greece, July 8-10, 2020 by
Advances in Cryptology - Crypto 2020: 40th Annual International Cryptology Conference, Crypto 2020, Santa Barbara, Ca, Usa, August 17-21, 2020, Procee by
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment by Blum, Dan
Fully Homomorphic Encryption in Real World Applications by Chatterjee, Ayantika, Aung, Khin Mi Mi
Improving Image Quality in Visual Cryptography by Xiang, Yong, Hua, Guang, Yan, Bin
ICT Systems Security and Privacy Protection: 34th Ifip Tc 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings by
Advances in Digital Forensics XV: 15th Ifip Wg 11.9 International Conference, Orlando, Fl, Usa, January 28-29, 2019, Revised Selected Papers by
Women Securing the Future with Tippss for Iot: Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things by
Blockchain Technology in Internet of Things by Gai, Keke, Li, Meng, Zhu, Liehuang
Handbook of Multimedia Information Security: Techniques and Applications by
Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments by
Security and Privacy Trends in the Industrial Internet of Things by
Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles by
Ética Hacker: Medidas avanzadas y efectivas de ética hacker by Lewis, Elijah
Advanced WordPress Security: Go beyond the basics and stop sophisticated attacks by Stokley, Grant
Large-Scale Data Streaming, Processing, and Blockchain Security by
Ciberseguridad: Medidas avanzadas y efectivas para asegurar sus redes cibernéticas by Lewis, Elijah
Security, Privacy and Trust in the Iot Environment by
Deep Reinforcement Learning: Frontiers of Artificial Intelligence by Sewak, Mohit
Multimedia Big Data Computing for Iot Applications: Concepts, Paradigms and Solutions by
Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceedings of the 15th International Conference on Iih-Msp in Conjunctio by
Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceedings of the 15th International Conference on Iih-Msp in Conjunctio by
Privacy Technologies and Policy: 8th Annual Privacy Forum, Apf 2020, Lisbon, Portugal, October 22-23, 2020, Proceedings by
Digital Privacy: Internet Security to Stop Big Companies from Tracking and Selling Your Data by Capra, Chris, Faster, Eric
Gut Gepackt - Kein Bit Zu Viel: Kompression Digitaler Daten Verständlich Erklärt by Manz, Olaf
Storing Digital Binary Data in Cellular DNA: The New Paradigm by Termanini, Rocky
Decoding Blockchain for Business: Understand the Tech and Prepare for the Blockchain Future by Van Hijfte, Stijn
On Thin Ice by Cybersecurity Experts, Leading
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography by Ciesla, Robert
Gcih Giac Certified Incident Handler All-In-One Exam Guide by Mitropoulos, Nick
Security Protocols XXVII: 27th International Workshop, Cambridge, Uk, April 10-12, 2019, Revised Selected Papers by
The Coupling of Safety and Security: Exploring Interrelations in Theory and Practice by
I'll Take Some Coffee with My French Vanilla Creamer: Sudoku Puzzle Book for Adults ... Difficulty--Medium Level, with Solutions by Policeman, Coffee
Investigations and the Art of the Interview by Sebyan Black, Inge, Fennelly, Lawrence J.
FortiGate - Guía de resolución de problemas by Wiśniewski, Hubert
Advances in Information and Computer Security: 15th International Workshop on Security, Iwsec 2020, Fukui, Japan, September 2-4, 2020, Proceedings by
Applied Cryptography and Network Security: 18th International Conference, Acns 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I by
Critical Information Infrastructures Security: 15th International Conference, Critis 2020, Bristol, Uk, September 2-3, 2020, Proceedings by
Transactions on Computational Collective Intelligence XXXV by
13th International Conference on Computational Intelligence in Security for Information Systems (Cisis 2020) by
The Pocket Guide to Cyber Security by H, James, D, Usha
Transdisciplinary Perspectives on Risk Management and Cyber Intelligence by
HonorSociety.org Scam Alerts: How to Avoid the Top E-mail Scams: 10 Ways to Spot Real or Fake E-mails by Moradian, Mike
Intelligent and Cloud Computing: Proceedings of ICICC 2019, Volume 2 by
Applied Cryptography and Network Security: 18th International Conference, Acns 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II by
Security and Cryptography for Networks: 12th International Conference, Scn 2020, Amalfi, Italy, September 14-16, 2020, Proceedings by
La Sicurezza delle Reti Grandi e Distribuite: Difendi la tua organizzazione dagli attacchi informatici e dagli Hacker utilizzando le migliori strategi by Cocco, Fabrizio
Cybersecurity: A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phish by Kiser, Quinn
Handbook of Research on Cyber Crime and Information Privacy, VOL 1 by
Handbook of Research on Cyber Crime and Information Privacy, VOL 2 by
Blockchain Applications in IoT Security by
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps by
Bitcoin in International Monetary Relations. New Innovation or Old Imperialism? by Trump, Carl Philipp
Edge Computing: Models, Technologies and Applications by
Advance Metadata Fair: The Retention and Disclosure of 4g, 5g and Social Media Location Information, for Law Enforcement and National Securit by Shanapinda, Stanley
Mastering Blockchain - Third Edition: A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, a by Bashir, Imran
Research Anthology on Combating Denial-of-Service Attacks by
Android Apps Security: Mitigate Hacking Attacks and Security Breaches by Gunasekera, Sheran
Beginning Ethereum and Solidity with React by Lim, Greg
The Ghidra Book: The Definitive Guide by Nance, Kara, Eagle, Chris
Business Process Management: Blockchain and Robotic Process Automation Forum: BPM 2020 Blockchain and Rpa Forum, Seville, Spain, September 13-18, 2020 by
ICT Systems Security and Privacy Protection: 35th Ifip Tc 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings by
Beginners Guide To Ethical Hacking and Cyber Security by Ojha, Abhinav
Caesura in Cryptography [Paperback]: My first Workshop about Encryption - An Introduction with Teaching and Learning Material for School, University a by Ackermann, Evelyn, Klein, Michael
Real-Time and Retrospective Analyses of Cyber Security by Bird, David Anthony
Practical Blockchains and Cryptocurrencies: Speed Up Your Application Development Process and Develop Distributed Applications with Confidence by Garewal, Karan Singh
Computer Networking and Cybersecurity: A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protecti by Kiser, Quinn
Cloud Security Auditing by Madi, Taous, Wang, Yushun, Majumdar, Suryadipta
Advances in Digital Forensics XVI: 16th Ifip Wg 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers by
AWS Certified Security - Specialty Exam Guide: Build your cloud security knowledge and expertise as an AWS Certified Security Specialist (SCS-C01) by Scott, Stuart
Managing Resources for Futuristic Wireless Networks by
Security and Privacy From a Legal, Ethical, and Technical Perspective by
Computer Security Threats by
Cyber Defense Mechanisms: Security, Privacy, and Challenges by
Kubernetes: The Ultimate Guide to Master Kubernetes by Neal, Clint
Information Security Education. Information Security in Action: 13th Ifip Wg 11.8 World Conference, Wise 13, Maribor, Slovenia, September 21-23, 2020, by
Cybersecurity in the Electricity Sector: Managing Critical Infrastructure by Leszczyna, Rafal
Handbook of Vascular Biometrics by
Intrusion Detection Honeypots by Sanders, Chris
Computer Security - Esorics 2020: 25th European Symposium on Research in Computer Security, Esorics 2020, Guildford, Uk, September 14-18, 2020, Procee by
Artificial Intelligence and Security: 6th International Conference, Icais 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I by
Computer Security - Esorics 2020: 25th European Symposium on Research in Computer Security, Esorics 2020, Guildford, Uk, September 14-18, 2020, Procee by
Ciberseguridad para la Familia: El Firewall eres tu by Vergara, Edwin
Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles by
Comptia Security+ Certification Study Guide: Network Security Essentials by Sheikh, Ahmed F.
Trust, Privacy and Security in Digital Business: 17th International Conference, Trustbus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceeding by
Blockchain - Icbc 2020: Third International Conference, Held as Part of the Services Conference Federation, Scf 2020, Honolulu, Hi, Usa, Septe by
Managing Information Technology by
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World by Foltz, Kevin E., Simpson, William R., Institute for Defense Analyses
97 Things about Ethics Everyone in Data Science Should Know: Collective Wisdom from the Experts by Franks, Bill
Konzeption einer Blockchain-Schnittstelle. Organisationsübergreifende Workflows in Workflow Management Systemen by Krüger, Daniel
Hcispp Healthcare Information Security and Privacy Practitioner All-In-One Exam Guide by Murphy, Sean P.
Accountability and Privacy in Network Security by Ge, Jingguo, Ma, Yuxiang, Wu, Yulei
Security and Trust Management: 16th International Workshop, STM 2020, Guildford, Uk, September 17-18, 2020, Proceedings by
Comptia Cysa+ Practice Tests: Exam Cs0-002 by Chapple, Mike, Seidl, David
Cloud Computing Security: Concepts and Practice by
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming by Arcuri, Jennifer, Hickey, Matthew
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity by Carey, Marcus J., Jin, Jennifer
Cognitive Modeling for Automated Human Performance Evaluation at Scale by Yuan, Haiyue, Li, Shujun, Rusconi, Patrice
Blockchain Technology and Applications by
Cloud Computing - Cloud 2020: 13th International Conference, Held as Part of the Services Conference Federation, Scf 2020, Honolulu, Hi, Usa, Septem by
Blockchain Applications in IoT Security by
Advances in Smart Grid Technology: Select Proceedings of Peccon 2019--Volume II by
Security Infrastructure Technology for Integrated Utilization of Big Data: Applied to the Living Safety and Medical Fields by
The Art of War for Computer Security by Madsen, Tom
Web Services - Icws 2020: 27th International Conference, Held as Part of the Services Conference Federation, Scf 2020, Honolulu, Hi, Usa, Septem by
Building an Effective Security Program by Williams, Chris, Donaldson, Scott, Siegel, Stanley
Customer Data and Privacy: The Insights You Need from Harvard Business Review by Review, Harvard Business, Burt, Andrew, Morey, Timothy
Database Systems for Advanced Applications: 25th International Conference, Dasfaa 2020, Jeju, South Korea, September 24-27, 2020, Proceedings, Part II by
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware by Saldanha, Anoop, Mohanta, Abhijit
Ética Hacker: 3 en 1- Guía para principiantes + Consejos y trucos + Medidas avanzadas y efectivas de ethical hacking by Lewis, Elijah
Launching Exploits: One Small Vulnerability For A Company, One Giant Heap for Port Bind by Ferreira, Frederico, Medlin, Richard, Belbase, Vishal M.
Ciberseguridad: 3 en 1 Guía para principiantes + Consejos y trucos + Medidas avanzadas y efectivas para proteger sus cyber networks by Lewis, Elijah
Automotive Cyber Security: Introduction, Challenges, and Standardization by Shrestha, Rakesh, Kim, Shiho
Electronic Voting: 5th International Joint Conference, E-Vote-Id 2020, Bregenz, Austria, October 6-9, 2020, Proceedings by
Managing Resources for Futuristic Wireless Networks by
Advancements in Security and Privacy Initiatives for Multimedia Images by
Privilege Escalation: A Stairway to Heaven by Belbase, Vishal M., Mp, Ambadi, Sharma, Nitin
Blockchain, Big Data and Machine Learning: Trends and Applications by
Security and Privacy in Social Networks and Big Data: 6th International Symposium, Socialsec 2020, Tianjin, China, September 26-27, 2020, Proceedings by
Datensicherheit: Technische Und Organisatorische Schutzmaßnahmen Gegen Datenverlust Und Computerkriminalität by Lenhard, Thomas H.
Mobile Radio Communications and 5g Networks: Proceedings of Mrcn 2020 by
Computational Science and Its Applications - Iccsa 2020: 20th International Conference, Cagliari, Italy, July 1-4, 2020, Proceedings, Part III by
Handbook of E-Business Security by
Cyberspace and Cybersecurity by Kostopoulos, George
Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level by
A History of Cyber Security Attacks: 1980 to Present by Middleton, Bruce
Real-World Electronic Voting: Design, Analysis and Deployment by
The Cio's Guide to Information Security Incident Management by Goucher, Wendy Fiona, Pemble, Matthew William Arthur
Analyzing and Securing Social Networks by Thuraisingham, Bhavani, Abrol, Satyen, Heatherly, Raymond
A Guide to the National Initiative for Cybersecurity Education (Nice) Cybersecurity Workforce Framework (2.0) by Sigler, Ken, Shoemaker, Dan, Kohnke, Anne
Guide to Pairing-Based Cryptography by
Access Control Management in Cloud Environments by Wang, Hua, Cao, Jinli, Zhang, Yanchun
Persönlichkeitsschutz in Social Networks: Technische Unterstützung Eines Grundrechtskonformen Angebots Von Social Networks by Nebel, Maxi
Data Analytics for Internal Auditors by Cascarino, Richard E.
Security in the Private Cloud by
Security in Iot-Enabled Spaces by
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies by Li, Chong, Qiu, Meikang
Applied Cloud Deep Semantic Recognition: Advanced Anomaly Detection by
The Routledge Companion to Risk, Crisis and Security in Business by
Bitcoin begreifen by Rosenbaum, Kalle
Google Cloud Professional Cloud Security Engineer Exam Practice Questions & Dumps: Exam Study Guide for Professional Cloud Security Engineer Exam Prep by Books, Quantic
Google Cloud Professional Cloud Developer Exam Practice Questions & Dumps: EXAM STUDY GUIDE FOR PROFESSIONAL CLOUD DEVELOPER Exam Prep LATEST VERSION by Books, Quantic
An Introduction to Crime and Crime Causation by Winters, Robert C., Globokar, Julie L., Roberson, Cliff
Information Security Policies, Procedures, and Standards: A Practitioner's Reference by Landoll, Douglas J.
Practical Cloud Security: A Cross-Industry View by Greer, Jr., Jackson, Kevin L.
Integrating a Usable Security Protocol Into User Authentication Services Design Process by Naqvi, Bilal, Braz, Christina, Seffah, Ahmed
Securing an It Organization Through Governance, Risk Management, and Audit by Sigler, Ken E.
Social Media Warfare: Equal Weapons for All by Erbschloe, Michael
Enterprise Level Security: Securing Information Systems in an Uncertain World by Simpson, William R.
Information Technology Control and Audit, Fifth Edition by Otero, Angel R.
Information Security Governance Simplified: From the Boardroom to the Keyboard by Fitzgerald, Todd
Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques by Girod, Robert J.
Protecting Mobile Networks and Devices: Challenges and Solutions by
Honeypots and Routers: Collecting Internet Attacks by Rehman, Habib-Ur, Mohammed, Mohssen
Multivariate Public Key Cryptosystems by Schmidt, Dieter S., Ding, Jintai, Petzoldt, Albrecht
Rising Threats in Expert Applications and Solutions: Proceedings of Ficr-Teas 2020 by
Kosten der IT-Sicherheit: Ein Ausgangspunkt für weitergehende Untersuchungen by Jurecz, Stefanie, Kirschner, Sascha, Grigat, Maximilian
The Complete Guide for CISA Examination Preparation by Cascarino, Richard E.
Cryptographic Obfuscation: A Survey by Horváth, Máté, Buttyán, Levente
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in Aws, Microsoft Azure, and Google Cloud by Calles, Miguel A.
The Complete Guide for CISA Examination Preparation by Cascarino, Richard E.
Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing by Grid, Alan
Sicherheit Und Kryptographie Im Internet: Theorie Und PRAXIS by Schwenk, Jörg
Cissp: Simple and Effective Strategies for Mastering Information Systems Security from A-Z by Schmidt, Walker
Stop The Cyber Bleeding: What Healthcare Executives and Board Members Must Know About Enterprise Cyber Risk Management (ECRM) How to Save Your by Chaput, Bob
Advanced Applications of Blockchain Technology by
Cyber Security by Zhou, Yu, Li, Jia, Ding, Li
Cyber Security by Zhou, Yu, Li, Jia, Ding, Li
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and S by
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and S by
Security in Computer and Information Sciences by Komnios, Ioannis, Tzovaras, Dimitrios, Romano, Luigi
See More