• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2020

Security in Computer and Information Sciences by Komnios, Ioannis, Tzovaras, Dimitrios, Romano, Luigi
Principles of Security and Trust by Nielson, Flemming, Sands, David
Principles of Security and Trust by Nielson, Flemming, Sands, David
Iot Security Paradigms and Applications: Research and Practices by
Social, Cultural, and Behavioral Modeling: 13th International Conference, Sbp-Brims 2020, Washington, DC, Usa, October 18-21, 2020, Proceedings by
Cybersecurity: A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phish by Kiser, Quinn
Computer Networking and Cybersecurity: A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protecti by Kiser, Quinn
Padres Conectados: cómo compartir con los hijos el uso de la compu by Goux, María
A Contemporary Approach to Cybercrime by Dastgir, Ghulam, Rehman, Tansif Ur, Muhammad Irfan, Syed
Modern Network Architectures Network and System Protection by Velinov, Vladimir
Applied Cryptography and Network Security Workshops: Acns 2020 Satellite Workshops, Aiblock, Aihws, Aiots, Cloud S&p, Sci, Secmt, and Simla, Rome, Ita by
Lattice-Based Cryptosystems: A Design Perspective by Zhang, Zhenfeng, Zhang, Jiang
The Myth Of Security: Hackers' Inventions Will Win The Race for Information by Starling, Niels
The Myth Of Security: Hackers' Inventions Will Win The Race for Information by Starling, Niels
Security and Privacy in Digital Economy: First International Conference, Spde 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings by
Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges: Icbcc 2019, Umkc, Kansas City, USA by
New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA by Mohamed, Khaled Salah
Learn Blockchain by Building One: A Concise Path to Understanding Cryptocurrencies by Van Flymen, Daniel
Screen Time Log: Daily Track Kids Screenfree Digital Detox, Screen Activities Tracker, For Parents, Journal, Book by Newton, Amy
Deployable Machine Learning for Security Defense: First International Workshop, Mlhat 2020, San Diego, Ca, Usa, August 24, 2020, Proceedings by
The 2018 Yearbook of the Digital Ethics Lab by
Linking Sensitive Data: Methods and Techniques for Practical Privacy-Preserving Information Sharing by Schnell, Rainer, Christen, Peter, Ranbaduge, Thilina
Shue's, CompTIA Security+, Exam SY0-601, Study Supplement by Schumacher, Mark
GRU Cybervillains: The DOJ Indictment Against Six Russian Hackers by Department of Justice
Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication by Bock, Lisa
New Research on the Voynich Manuscript: Proceedings of a Seminar by National Security Agency
Scam Survivor: How One Victim Fought Back by Leakey, Jonathan A.
Ptfm: Purple Team Field Manual by Bryant, Tim
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Greenberg, Andy
Journal of The Colloquium for Information Systems Security Education (CISSE): Fall 2020 by
A Practical Guide to Digital Forensics Investigations by Hayes, Darren
Blockchain, Law and Governance by
Como entender la ciberseguridad desde la perspectiva de un Product Owner: Y no morir en el intento by Diaz Bautista, Miguel Angel
CompTIA: CompTIA Security+: SY0-501: Practice Exams SY0-501: 390 Top Notch Questions CompTIA Security + by Cromwell, Dennis
Können sich Kryptowährungen im bargeldlosen Zahlungsverkehr etablieren?: Bekanntheit, Akzeptanz und die Nutzung von Kryptowährungen in Deutschland by Wilhelm, Simon
Trust Management XIII: 13th Ifip Wg 11.11 International Conference, Ifiptm 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings by
Password Keeper: Keep Internet Passwords, Website Address and Usernames Information Logbook, Organizer Record Book, Notebook, Journal by Newton, Amy
Hacking Multifactor Authentication by Grimes, Roger A.
Technical Articles about the Voynich Manuscript by National Security Agency
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International C by
Security, Privacy and User Interaction by
Cyber Security: The Lifeline of Information and Communication Technology by Rohokale, Vandana, Prasad, Ramjee
Building Secure Firmware: Armoring the Foundation of the Platform by Yao, Jiewen, Zimmer, Vincent
Industrial Control Systems Security and Resiliency: Practice and Theory by
Provable and Practical Security: 14th International Conference, Provsec 2020, Singapore, November 29 - December 1, 2020, Proceedings by
Defense and Deception: Confuse and Frustrate the Hackers by Cardwell, Kevin
Hacking: A Comprehensive Guide to Computer Hacking and Cybersecurity by Griffin, Sam
Artificial Intelligence and the Law: Cybercrime and Criminal Liability by
Intelligent and Cloud Computing: Proceedings of ICICC 2019, Volume 1 by
The Personal Digital Resilience Handbook: An essential guide to safe, secure and robust use of everyday technology by Wild, David
Hacking: A Comprehensive Guide to Computer Hacking and Cybersecurity by Griffin, Sam
Device-Independent Quantum Information Processing: A Simplified Analysis by Arnon-Friedman, Rotem
Chroot your Red Hat/Centos 8 - Extreme Hardening. by de Oliveira, Renato Carlos
Mobile Internet Security: 4th International Symposium, Mobisec 2019, Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers by
Palo Alto Networks Certified Network Security Engineer (PCNSE) Exam Practice Questions & Dumps: Exam Practice Questions For Palo Alto Networks (PCNSE) by Books, Quantic
Computer Vision - Eccv 2020: 16th European Conference, Glasgow, Uk, August 23-28, 2020, Proceedings, Part XXIII by
Artificial Intelligence Paradigms for Smart Cyber-Physical Systems, 1 volume by
Smiling Security: The Cybersecurity Manager's Road to Success by Niemelä, Mikko, Koistinen, Pasi
The Bitcoin Standard: The Essential Guide to Bitcoin for Beginners, Discover How Strategies and Tips on How You Can Master Bitcoin and Earn Huge Profi by Damp, J. H.
Frontiers in Cyber Security: Third International Conference, Fcs 2020, Tianjin, China, November 15-17, 2020, Proceedings by
Advanced Communication Systems and Information Security: Second International Conference, Acosis 2019, Marrakesh, Morocco, November 20-22, 2019, Revis by
Cyber Security: Understand Hacking and Protect Yourself and Your Organization From Ever Getting Hacked by Studios, Hacking
Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats by Mukherjee, Aditya
Model-Driven Simulation and Training Environments for Cybersecurity: Second International Workshop, Mstec 2020, Guildford, Uk, September 14-18, 2020, by
A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities by Rahalkar, Sagar
Instructions for integrating logsource into SIEM Qradar by Du, David
Python Testing with Selenium: Learn to Implement Different Testing Techniques Using the Selenium Webdriver by Raghavendra, Sujay
Graphical Models for Security: 7th International Workshop, Gramsec 2020, Boston, Ma, Usa, June 22, 2020, Revised Selected Papers by
Instructions for Investigation Website Has Been Attacked by Du, David
70 Tips and Tricks for Mastering the Cissp Exam by Danturthi, R. Sarma
The Cybersecurity Maturity Model Certification (CMMC): A pocket guide by Gamble, William
Alice and Bob Learn Application Security by Janca, Tanya
The Darknet and Smarter Crime: Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy by Bancroft, Angus
Machine Learning for Cyber Security: Third International Conference, Ml4cs 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part II by
Machine Learning for Cyber Security: Third International Conference, Ml4cs 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part III by
Machine Learning for Cyber Security: Third International Conference, Ml4cs 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part I by
Die Blockchain und ihr Nutzen für Finanzinstitute by Kösling, Tim
Blockchain and Trustworthy Systems: Second International Conference, Blocksys 2020, Dali, China, August 6-7, 2020, Revised Selected Papers by
Business Information Systems Workshops: Bis 2020 International Workshops, Colorado Springs, Co, Usa, June 8-10, 2020, Revised Selected Papers by
Human-Centric Computing in a Data-Driven Society: 14th Ifip Tc 9 International Conference on Human Choice and Computers, Hcc14 2020, Tokyo, Japan, Sep by
Cognitive Superiority: Information to Power by Hartley III, Dean S., Jobson, Kenneth O.
Fintech: Hacking, Blockchain, Big Data, Cryptocurrency by Reznor, Eliot P.
Hackable: How to Do Application Security Right by Harrington, Ted
Konfliktmanagement Für Sicherheitsprofis: Auswege Aus Der "Buhmann-Falle" Für Informations- Und It-Sicherheitsbeauftragte, Datenschützer, Cisos Und Co by Klipper, Sebastian
Computer Vision - Eccv 2020: 16th European Conference, Glasgow, Uk, August 23-28, 2020, Proceedings, Part XIV by
Artificial Intelligence Paradigms for Smart Cyber-Physical Systems by
Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide: Begin a successful career in networking with 200-301 CCNA certification by Singh, Glen D.
Patientenorientierte Digitalisierung Im Krankenhaus: It-Architekturmanagement Am Behandlungspfad by Bender, Matthias, Mangiapane, Markus
Securing Docker: The Attack and Defense Way by Sharma, Nitin, Martin, Jeremy
Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing the Internet by Grid, Alan
Cissp: 3 in 1- Beginner's Guide] Tips and Tricks+ Simple and Effective Strategies to Learn Information Systems Security by Schmidt, Walker
Ressourcen schützen: Die Sicherung von Hardware und Software by Thaller, Georg Erwin
Mastering Corda: Blockchain for Java Developers by Sheikh, Jamiel
Contact Tracing in Post-Covid World: A Cryptologic Approach by Nandi, Mridul, Chakraborty, Pranab, Maitra, Subhamoy
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach by Zhu, Quanyan, Xu, Zhiheng
Cyber Attack Survival Manual: From Identity Theft to the Digital Apocalypse: And Everything in Between 2020 Paperback Identify Theft Bitcoin Deep Web by Selby, Nick, Vescent, Heather
Cybersecurity in Humanities and Social Sciences: A Research Methods Approach by
Blockchain with Hyperledger Fabric, Second Edition: Build decentralized applications using Hyperledger Fabric 2 by Desrosiers, Luc, Ramakrishna, Venkatraman, Gaur, Nitin
The Practice of Enterprise Modeling: 13th Ifip Working Conference, Poem 2020, Riga, Latvia, November 25-27, 2020, Proceedings by
Future Data and Security Engineering: 7th International Conference, Fdse 2020, Quy Nhon, Vietnam, November 25-27, 2020, Proceedings by
Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom Gilb by
Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects by Moyle, Ed, Kelley, Diana
Information Systems: 17th European, Mediterranean, and Middle Eastern Conference, Emcis 2020, Dubai, United Arab Emirates, November 25-26, by
Red Hat and It Security: With Red Hat Ansible, Red Hat Openshift, and Red Hat Security Auditing by Chatterjee, Rithik
She'll Be Right (Not!): A Cybersecurity Guide for Kiwi Business Owners by Watson, Dan
Innovations in Cybersecurity Education by
Privacy Vulnerabilities and Data Security Challenges in the IoT by
SSL/TLS Under Lock and Key: A Guide to Understanding SSL/TLS Cryptography by Baka, Paul, Schatten, Jeremy
The Pentester Blueprint: Starting a Career as an Ethical Hacker by Wylie, Phillip L., Crawley, Kim
Lattice-Based Public-Key Cryptography in Hardware by Sinha Roy, Sujoy, Verbauwhede, Ingrid
Security Standardisation Research: 6th International Conference, Ssr 2020, London, Uk, November 30 - December 1, 2020, Proceedings by
Information Security: 23rd International Conference, Isc 2020, Bali, Indonesia, December 16-18, 2020, Proceedings by
Pro Cryptography and Cryptanalysis: Creating Advanced Algorithms with C# and .Net by Mihailescu, Marius Iulian, Nita, Stefania Loredana
Federated Learning: Privacy and Incentive by
Fintech and Data Privacy in Germany: An Empirical Analysis with Policy Recommendations by Dorfleitner, Gregor, Hornuf, Lars
Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (Smartcyber 202 by
Algorithms for Data and Computation Privacy by Liu, Alex X., Li, Rui
Network Hacks - Intensivkurs: Angriff Und Verteidigung Mit Python 3 by Ballmann, Bastian
Applications and Techniques in Information Security: 11th International Conference, Atis 2020, Brisbane, Qld, Australia, November 12-13, 2020, Proceed by
Password Logbook: With Easy Find Tabs by
MentalTheft by Newton, Paul, Lawrence, Jesse, Ivory, Diane
Cciso Certified Chief Information Security Officer All-In-One Exam Guide by Genung, Jordan, Bennett, Steven
You Can Stop Stupid: Stopping Losses from Accidental and Malicious Actions by Brown, Tracy Celaya, Winkler, Ira
Security and Trust Issues in Internet of Things: Blockchain to the Rescue by
Tor Anonymity Network 101: En introduktion til den mest private del af internettet by Gates, Steven
SELinux System Administration - Third Edition: Implement mandatory access control to secure applications, users, and information flows on Linux by Vermeulen, Sven
Cybersecurity in Digital Transformation: Scope and Applications by Möller, Dietmar P. F.
New Dimensions of Information Warfare by Di Pietro, Roberto, Raponi, Simone, Caprolu, Maurantonio
Emerging Technologies for Authorization and Authentication: Third International Workshop, Etaa 2020, Guildford, Uk, September 18, 2020, Proceedings by
AWS Penetration Testing: Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap by Helmus, Jonathan
The Lognormality Principle and Its Applications in E-Security, E-Learning and E-Health by
Advances in Cryptology - Asiacrypt 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, by
Advances in Cryptology - Asiacrypt 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, by
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion by Abelson, Hal, Ledeen, Ken, Lewis, Harry
31 Days Before Your CCNP and CCIE Enterprise Core Exam by Gargano, Patrick
Advances in Cryptology - Asiacrypt 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, by
Information Systems Security: 16th International Conference, Iciss 2020, Jammu, India, December 16-20, 2020, Proceedings by
Cryptology and Network Security: 19th International Conference, Cans 2020, Vienna, Austria, December 14-16, 2020, Proceedings by
It Convergence and Security: Proceedings of Icitcs 2020 by
Progress in Cryptology - Indocrypt 2020: 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings by
Pro Google Cloud Automation: With Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins by Pandey, Piyush, Sabharwal, Navin
Hackable: How to Do Application Security Right by Harrington, Ted
Guide to Pentesting: English edition 2020 by Caranti, Milo
Information Security Applications: 21st International Conference, Wisa 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers by
Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments by Anonymous
Strafbarkeitsrisiken bei White-Hat und Grey-Hat-Hacking by Beer, Sascha
Programming Hyperledger Fabric: Creating Enterprise Blockchain Applications by Jain, Siddharth
Cybersecurity for Everyone by Skillicorn, David B.
Digital Forensic Investigation of Internet of Things (Iot) Devices by
Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security by Dorsel, Richard
The Cyber Security Handbook: Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) by Calder, Alan
The Cyber Security Handbook: Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) by Calder, Alan
DevSecOps: A leader's guide to producing secure software without compromising flow, feedback and continuous improvement by Wilson, Glenn
Proceedings of the Sixth International Conference on Mathematics and Computing: ICMC 2020 by
Sustainable Logistics and Production in Industry 4.0: New Opportunities and Challenges by
Mathematical Theory of Advanced Computing by Osterhage, Wolfgang W.
Combating the Exploitation of Children in Cyberspace: Emerging Research and Opportunities by
Hacking with Python and Kali-Linux: Develop your own Hackingtools with Python in Kali-Linux by Noors, Alicia, B, Mark
Security and Privacy in Communication Networks: 16th Eai International Conference, Securecomm 2020, Washington, DC, Usa, October 21-23, 2020, Proceedi by
Security and Privacy in Communication Networks: 16th Eai International Conference, Securecomm 2020, Washington, DC, Usa, October 21-23, 2020, Proceedi by
Authentication and Access Control: Practical Cryptography Methods and Tools by Boonkrong, Sirapat
Theory of Cryptography: 18th International Conference, Tcc 2020, Durham, Nc, Usa, November 16-19, 2020, Proceedings, Part II by
Theory of Cryptography: 18th International Conference, Tcc 2020, Durham, Nc, Usa, November 16-19, 2020, Proceedings, Part III by
My Cryptograms Puzzle Book: Large print cryptograms puzzle books for adults, 206 Cryptoqutes to stay sharp with Inspirational & motivational quote by Clevergame
Accountability in Computing: Concepts and Mechanisms by Wright, Rebecca N., Feigenbaum, Joan, Jaggard, Aaron D.
Critical Infrastructure Protection XIV: 14th Ifip Wg 11.10 International Conference, Iccip 2020, Arlington, Va, Usa, March 16-17, 2020, Revised Select by
Theory of Cryptography: 18th International Conference, Tcc 2020, Durham, Nc, Usa, November 16-19, 2020, Proceedings, Part I by
Crypto Wars: The Fight for Privacy in the Digital Age: A Political History of Digital Encryption by Jarvis, Craig
Crypto Wars: The Fight for Privacy in the Digital Age: A Political History of Digital Encryption by Jarvis, Craig
Comptia Security+ Guide to Network Security Fundamentals, Loose-Leaf Version by Ciampa, Mark
Comptia Security+ Guide to Network Security Fundamentals by Ciampa, Mark
Time Based Security: Adding Measurement, Detection, and Reaction Time to Cybersecurity. by Schwartau, Winn
Recent Advances in Security, Privacy, and Trust for Internet of Things (Iot) and Cyber-Physical Systems (Cps) by
Securing Iot and Big Data: Next Generation Intelligence by
Computer Security: Esorics 2020 International Workshops, Cybericps, Secpre, and Adiot, Guildford, Uk, September 14-18, 2020, Revised Selected Papers by
Okta Administration: Up and Running: Implement enterprise-grade identity and access management for on-premises and cloud apps by Vries, Henkjan de, Stjernlöf, Lovisa Stenbäcken
Critical Infrastructure Protection XIII: 13th Ifip Wg 11.10 International Conference, Iccip 2019, Arlington, Va, Usa, March 11-12, 2019, Revised Selec by
Blockchain: Hype or Innovation by Gayvoronskaya, Tatiana, Meinel, Christoph
Cyber Security on Azure: An It Professional's Guide to Microsoft Azure Security by Copeland, Marshall, Jacobs, Matthew
Limitations and Future Applications of Quantum Cryptography by
Privacy and Identity in a Networked Society: Refining Privacy Impact Assessment by Strauß, Stefan
Multimedia Security Handbook by
Perceived Privacy in Location-Based Mobile System by Poikela, Maija Elina
Network and System Security: 14th International Conference, Nss 2020, Melbourne, Vic, Australia, November 25-27, 2020, Proceedings by
Redesigning Wiretapping: The Digitization of Communications Interception by Fitsanakis, Joseph
CCNP Security Identity Management Sise 300-715 Official Cert Guide by Woland, Aaron, McNamara, Katherine
Introduction to Modern Cryptography by Katz, Jonathan, Lindell, Yehuda
Italian Philosophy of Technology: Socio-Cultural, Legal, Scientific and Aesthetic Perspectives on Technology by
Malware Analysis Using Artificial Intelligence and Deep Learning by
Internet of Things: Integration and Security Challenges by
Decision and Game Theory for Security: 11th International Conference, Gamesec 2020, College Park, MD, Usa, October 28-30, 2020, Proceedings by
Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, Space 2020, Kolkata, India, December 17-21, 2020, Proceedings by
Customer Data and Privacy: The Insights You Need from Harvard Business Review by Review, Harvard Business, Burt, Andrew, Morey, Timothy
Security Engineering: A Guide to Building Dependable Distributed Systems by Anderson, Ross
Threat Modeling: A Practical Guide for Development Teams by Tarandach, Izar, Coles, Matthew J.
Derecho y criminalistica en informática forense: delitos informáticos by Cabrera Pivaral, Carlos Enrique, López Toledo, Sabina, García, Sergio Alberto Ramírez
Manipulationssichere Cloud-Infrastrukturen: Nachhaltige Digitalisierung Durch Sealed Cloud Security by
Inclusive Security: Digital Security Meets Web Science by Coles-Kemp, Lizzie
Cisco Cybersecurity Operations Fundamentals Cbrops 200-201 Official Cert Guide by Santos, Omar
CompTIA Security+: SY0-601 Certification Guide - Second Edition: SY0-601 Certification Guide: Complete coverage of the new CompTIA Securi by Neil, Ian
See More