• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2021

Machine Learning Approaches in Cyber Security Analytics by Emmanuel, Sabu, Thomas, Tony, P. Vijayaraghavan, Athira
SSL/TLS Under Lock and Key: A Guide to Understanding SSL/TLS Cryptography by Schatten, Jeremy, Baka, Paul
Mastering Python for Networking and Security - Second Edition: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome network by Ortega, José Manuel
Cryptography in the Information Society by Ryabko, Boris, Fionov, Andrey
Mike Meyers' Comptia Security+ Certification Passport, Sixth Edition (Exam Sy0-601) by Dunkerley, Dawn
Computational Data and Social Networks: 9th International Conference, Csonet 2020, Dallas, Tx, Usa, December 11-13, 2020, Proceedings by
Comptia Security+ Certification Practice Exams, Fourth Edition (Exam Sy0-601) by LaChance, Daniel, Clarke, Glen E.
It-Prüfung, Datenschutzaudit Und Kennzahlen Für Die Sicherheit: Neue Ansätze Für Die It-Revision by
Chatbots: Aufbau Und Anwendungsmöglichkeiten Von Autonomen Sprachassistenten by Kohne, Andreas, Kleinmanns, Philipp, Rolf, Christian
Technology-Augmented Perception and Cognition by
Fog/Edge Computing for Security, Privacy, and Applications by
Building Decentralized Trust: Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers by
Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction by Shakarian, Paulo, Alvari, Hamidreza, Shaabani, Elham
Quantum Cryptography: From Key Distribution to Conference Key Agreement by Grasselli, Federico
The Truth about Social Media by Gulshan, Priyanka
Cybsersecurity Fundamentals 1 by Jony, Tapon Mahamud
Gdpr and Biobanking: Individual Rights, Public Interest and Research Regulation Across Europe by
Machine Learning in Cyber Security: Network Traffic Classification based on Class Weight-based K-NN Classifier (CWK-NN) by Hijazi, Mohamad Osama, Khalife, Jawad
Artificial Intelligence controlling Cyber Security by Odayan, Kershlin
Unhackable: Workbook by Mansour, George
Boolean Functions for Cryptography and Coding Theory by Carlet, Claude
Blockchains for Network Security: Principles, Technologies and Applications by
Mastering Linux Device Driver Development: Write custom device drivers to support computer peripherals in Linux operating systems by Madieu, John
Combating the Exploitation of Children in Cyberspace: Emerging Research and Opportunities by
Research Anthology on Artificial Intelligence Applications in Security, VOL 1 by
Research Anthology on Artificial Intelligence Applications in Security, VOL 2 by
Research Anthology on Artificial Intelligence Applications in Security, VOL 3 by
Research Anthology on Artificial Intelligence Applications in Security, VOL 4 by
Information Security and Optimization by
Cybersecurity and Legal-Regulatory Aspects by
Multimedia Security: Algorithm Development, Analysis and Applications by
Viral Bs: Medical Myths and Why We Fall for Them by Yasmin, Seema
Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de by Kiser, Quinn
How To Crack Bitcoin Wallets For Million Dollar Bounty by Raman, Venkata
Security of Ubiquitous Computing Systems: Selected Topics by
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Espinosa, Christian
Cyberspace Mimic Defense: Generalized Robust Control and Endogenous Security by Wu, Jiangxing
Privacy in Dynamical Systems by
Introduction to the Darknet: Darknet 101 by Hoffer, Martin
Tor Anonymity Network 101: An Introduction to The Most Private Part of The Internet by Gates, Steven
Senior Cyber: Best Security Practices for Your Golden Years by Schober, Scott N., Schober, Craig W.
Cyber Security: 17th China Annual Conference, Cncert 2020, Beijing, China, August 12, 2020, Revised Selected Papers by
Business Process Management Workshops: BPM 2020 International Workshops, Seville, Spain, September 13-18, 2020, Revised Selected Papers by
Senior Cyber: Best Security Practices for Your Golden Years by Schober, Scott N.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) by Bochman, Andrew A., Freeman, Sarah
How to Destroy Surveillance Capitalism by Doctorow, Cory
Blockchain Technology and Application: Third Ccf China Blockchain Conference, Cbcc 2020, Jinan, China, December 18-20, 2020, Revised Selected Papers by
Security and Privacy in New Computing Environments: Third Eai International Conference, Spnce 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings by
Adversary-Aware Learning Techniques and Trends in Cybersecurity by
Digital Transformation for a Sustainable Society in the 21st Century: I3e 2019 Ifip Wg 6.11 International Workshops, Trondheim, Norway, September 18-2 by
Practical Network Security Monitoring: Using Free Software by Graham, Elizabeth
Machine Learning and Intelligent Communications: 5th International Conference, Mlicom 2020, Shenzhen, China, September 26-27, 2020, Proceedings by
Enterprise Information Security Risk Assessment: Practical Guide, Techniques and Tools by Ntemngwa, Celestin
Intrusion Detection: A Data Mining Approach by SenGupta, Nandita, Sil, Jaya
Smart Blockchain: Third International Conference, Smartblock 2020, Zhengzhou, China, October 23-25, 2020, Proceedings by
Sustainable Communication Networks and Application: Proceedings of Icscn 2020 by
CompTIA Pentest+ (Practice Exams) by Karamagi, Robert
AWS Certified Security Study Guide: Specialty (Scs-C01) Exam by Neto, Marcello Zillo, Santana, Gustavo A. a., Sapata, Fernando
Comptia Security+ Study Guide: Exam Sy0-601 by Seidl, David, Chapple, Mike
Internet of Things Security: Principles and Practice by Tang, Qinghao, Du, Fan
Design and Cryptanalysis of Zuc: A Stream Cipher in Mobile Telephony by Mukherjee, Chandra Sekhar, Roy, Dibyendu, Maitra, Subhamoy
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Pro by Grid, Alan
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Pro by Grid, Alan
Routledge Companion to Global Cyber-Security Strategy by
Smart Card Research and Advanced Applications: 19th International Conference, Cardis 2020, Virtual Event, November 18-19, 2020, Revised Selected Paper by
Poc or Gtfo, Volume 3 by Laphroaig, Manul
Consumer Identity & Access Management: Design Fundamentals by Moffatt, Simon
Fortigate Security Pocket Guide by Shmueli, Ofer
Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed and Trusted Industry Environment by
Echtzeit 2020: Kommunikationssicherheit Im Internet Der Dinge (Iot) by
Cryptography Arithmetic: Algorithms and Hardware Architectures by Omondi, Amos R.
Game Theory for Cyber Deception: From Theory to Applications by Zhu, Quanyan, Pawlick, Jeffrey
Practical Paranoia macOS 11 Security Essentials by Mintz, Marc Louis
Penetration Testing Step By Step Guide by Shatob, Radhi
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Espinosa, Christian
Comptia Security+ Practice Tests: Exam Sy0-601 by Seidl, David
Comptia Security+ Review Guide: Exam Sy0-601 by Stewart, James Michael
Quantum Communication Networks by Deppe, Christian, Bassoli, Riccardo, Boche, Holger
Innovative Security Solutions for Information Technology and Communications: 13th International Conference, Secitc 2020, Bucharest, Romania, November by
Advances in Cyber Security: Second International Conference, Aces 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers by
Adaptive Autonomous Secure Cyber Systems by
Security, Privacy, and Anonymity in Computation, Communication, and Storage: 13th International Conference, Spaccs 2020, Nanjing, China, December 18-2 by
Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm: Trends, Advances, and Future Prospects by Amini, M. Hadi, Boroojeni, Kianoosh G., Sniatala, Pawel
Constructive Side-Channel Analysis and Secure Design: 11th International Workshop, Cosade 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected by
Practical Paranoia iOS 14 Security Essentials by Mintz, Marc Louis
Security, Privacy, and Anonymity in Computation, Communication, and Storage: Spaccs 2020 International Workshops, Nanjing, China, December 18-20, 2020 by
Information Security and Cryptology - Icisc 2020: 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings by
Digital Forensics and Cyber Crime: 11th Eai International Conference, Icdf2c 2020, Boston, Ma, Usa, October 15-16, 2020, Proceedings by
CMOS Analog IC Design for 5g and Beyond by
Limitations and Future Applications of Quantum Cryptography by
Fault-Tolerant Distributed Transactions on Blockchain by Hellings, Jelle, Sadoghi, Mohammad, Gupta, Suyash
Comptia Security+ Certification Kit: Exam Sy0-601 by Chapple, Mike, Seidl, David
Security in Computing and Communications: 8th International Symposium, Sscc 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers by
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography by Mittelbach, Arno, Fischlin, Marc
Security Essentials by Lavender, Linda K.
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK(TM) Framework and open source tools by Costa-Gazcón, Valentina
Digital Forensics and Watermarking: 19th International Workshop, Iwdw 2020, Melbourne, Vic, Australia, November 25-27, 2020, Revised Selected Papers by
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Pro by Grid, Alan
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Pro by Grid, Alan
Cybersecurity: Learn Information Technology Security: How to Protect Your Data From Hacker Attacks While You are Browsing the Interne by Grid, Alan
Cybersecurity: Learn Information Technology Security: How to Protect Your Data From Hacker Attacks While You are Browsing the Interne by Grid, Alan
Network Penetration Testing by Shatob, Radhi
Data Protection Officer by Edvardsen, Sofia, Johnssén, Filip
Cybersecurity ABCs: Delivering Awareness, Behaviours and Culture Change by Davis, Adrian, Hallas, Bruce, Barker, Jessica
Ich hacke Technik: Ein Lei[td]faden durch die [hochsichere] Technik des 21. Jahrhunderts by Faithful, Stacey
Cookie Policy. Rechtliche Grundlagen und Bedeutung im Marketing by Anonymous
Ocp Oracle Certified Professional Java Se 11 Developer Practice Tests: Exam 1z0-819 and Upgrade Exam 1z0-817 by Selikoff, Scott, Boyarsky, Jeanne
Phishing Attacks: Advanced Attack Techniques 2 by Atkins, Christopher
Crafting Test-Driven Software with Python: Write test suites that scale with your applications' needs and complexity using Python and PyTest by Molina, Alessandro
Mastering Veeam Backup & Replication 10: Protect your virtual environment and implement cloud backup using Veeam technology by Childerhose, Chris
Introduction to Cyber Forensic Psychology: Understanding the Mind of the Cyber Deviant Perpetrators by
The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks by Calder, Alan
Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, Cps4cip 2020, Guildford, Uk, September 18, 2020, Revise by
Guide to Cybersecurity - Part 1: A complete book for Ethical Hackers by Dey, Prashant Kumar
Handbook of Research on Digital Transformation and Challenges to Data Security and Privacy by
Hacking with Kali-Linux: Quick start for beginners by B, Mark
Assembly Language Laboratory Work by Silaghi, Marius
Arithmetic and Algebraic Circuits by Castillo Morales, Encarnación, Parrilla Roure, Luis, Lloris Ruiz, Antonio
Cryptocurrency: A Beginner's Guide To Understanding And Winning With Fintech by Reznor, Eliot P.
Ransomware Revolution: The Rise of a Prodigious Cyber Threat by Ryan, Matthew
Big Breaches: Cybersecurity Lessons for Everyone by Daswani, Neil, Elbayadi, Moudy
Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents by Ozkaya, Erdal
Practical AI for Cybersecurity by Das, Ravi
Practical AI for Cybersecurity by Das, Ravi
Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives by Sahoo, Somya Ranjan, Gupta, Brij B.
Foundations and Practice of Security: 13th International Symposium, Fps 2020, Montreal, Qc, Canada, December 1-3, 2020, Revised Selected Papers by
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications by Mehta, Deep
Zero Trust Security: An Enterprise Guide by Garbis, Jason, Chapman, Jerry W.
Qos Routing Algorithms for Wireless Sensor Networks by Kumaraswamy, M., Venugopal, K. R., T, Shiv Prakash
Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures by Gupta, Brij B., Dahiya, Amrita
Heterogeneous Cyber Physical Systems of Systems by
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting by Debbabi, Mourad, Shirani, Paria, Alrabaee, Saed
Book of Anonymity by Collective, Anon
Cybersecurity Now by Sachs, Amir, Hughes, Fred, McCracken, George
Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector by
Practical Paranoia Chromebook Security Essentials by Mintz, Marc Louis
Cybersecurity Lessons from CoVID-19 by Slade, Robert
Blockchain Cybersecurity, Trust and Privacy by
Secure It Systems: 25th Nordic Conference, Nordsec 2020, Virtual Event, November 23-24, 2020, Proceedings by
Data Visualization: Trends and Challenges Toward Multidisciplinary Perception by
Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, C by Kiser, Quinn
Network Security and Cryptography by Karamagi, Robert
Hack1ng stories: [Volume 1] by DuBois, Julien
Data Protection and Privacy in Healthcare: Research and Innovations by
Challenging Online Propaganda and Disinformation in the 21st Century by
Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Windi by
Cybersecurity Readiness: A Holistic and High-Performance Approach by Chatterjee, Dave
Password Book With Alphabetical Tabs: Email Address Book with Tabs Alphabetical Password Book Organizer Internet Password Logbook Password Journal by Harrlez, Iris Lorry
Information Security and Cryptology: 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers by
Redes de ordenadores y ciberseguridad: Una guía sobre los sistemas de comunicación, las conexiones a Internet, la seguridad de las redes, protección c by Kiser, Quinn
The Secure Board: How To Be Confident That Your Organisation Is Cyber Safe by Leibel, Anna, Pales, Claire
Sicherheit in vernetzten Systemen: 28. DFN-Konferenz by
Intelligent Technologies and Applications: Third International Conference, Intap 2020, Gjøvik, Norway, September 28-30, 2020, Revised Selected Papers by
Revolutionary Applications of Blockchain-Enabled Privacy and Access Control by
Exclusive M1 Macbook Pro User Guide: An Exhaustive Step By Step Guide in Mastering the New Apple M1 Chip with MacOS Big Sur by Eleazar, Michael
Palo Alto Cortex XSOAR: A Practical Guide by Alex, Jithin
Secure Searchable Encryption and Data Management by Gupta, Brij B., Mamta
The Cyber-Elephant in the Boardroom: Cyber-Accountability with the Five Pillars of Security Framework by Gorge, Mathieu
Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, C by Kiser, Quinn
Cybersecurity in the COVID-19 Pandemic by Okereafor, Kenneth
Blockchain Technology for Iot Applications by
Cyber Security in India: Education, Research and Training by
Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector by
Handbook of Big Data Privacy by
Blockchain Technology for Data Privacy Management by
Security by Design: Security Engineering Informationstechnischer Systeme by Lunkeit, Armin, Zimmer, Wolf
AI and Deep Learning in Biometric Security: Trends, Potential, and Challenges by
Equity of Cybersecurity in the Education System: High Schools, Undergraduate, Graduate and Post-Graduate Studies. by Esin, Joseph O.
The Doctor's In: Treating America's Greatest Cyber Security Threat by Weinberger, Alan D.
Real Fake by Watts, Clint, Haque, Farid
Beginners Guide to Cybersecurity for Senior Citizens: A comprehensive guide to protecting yourself cyber attacks and identity theft in 2021 by Tindall, Mason
Blockchain Technology and Innovations in Business Processes by
Network Programming with Go: Code Secure and Reliable Network Services from Scratch by Woodbeck, Adam
Redes de ordenadores y ciberseguridad: Una guía sobre los sistemas de comunicación, las conexiones a Internet, la seguridad de las redes, protección c by Kiser, Quinn
Concise Encyclopedia of Coding Theory by
Computer Vision and Image Processing: 5th International Conference, Cvip 2020, Prayagraj, India, December 4-6, 2020, Revised Selected Papers, Part I by
Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining by Zolfaghari, Behrouz, Bibak, Khodakhast, Koshiba, Takeshi
Guide To Hacking: Give You Few Of The Most Important Steps Essential To Be A Hacker: How To Hack Smartphones by Deloe, Keeley
Risk Management Framework 2.0 Workbook by Broad, James
Modern Cryptography with Proof Techniques and Implementations by Lee, Wai Kong, Oun Hwang, Seong, Kim, Intae
Hacking Book: Learning A Bit Of Hacking Can Be The Way To Keep Your Network Safe: Basic Concepts Of Hacking by Bainter, Gerri
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition by Kernighan, Brian W.
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition by Kernighan, Brian W.
Steps By Step To Hacker: Focus On Skills And Attitude That Is Required To Become A Hacker: The Basic Of Hacking by Purtlebaugh, Charlie
Cryptographic Methods by Amsaad, Fathi, Alajlan, Abrar, Razaque, Abdul
Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics by Wyant, R. T., Burns, Thomas
Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program by Lyons, Sean
New Developments in Biological and Chemical Terrorism Countermeasures by
Introduction to Cryptography by Saraswat, Vishal, Sahu, Rajeev A., Padhye, Sahadeo
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition by Sachowski, Jason
Counter Terrorism Issues: Case Studies in the Courtroom by Castagnera, James Ottavio
Cryptographic Methods by Amsaad, Fathi, Alajlan, Abrar, Razaque, Abdul
Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard by Susanto, Heru, Almunawar, Mohammad Nabil
Private Investigation and Homeland Security by Benny, Daniel J.
Strategic Security: Forward Thinking for Successful Executives by Perois, Jean
The Politics and Technology of Cyberspace by Steed, Danny
Wireless Network Security: Second Edition by Osterhage, Wolfgang
Extremist Propaganda in Social Media: A Threat to Homeland Security by Erbschloe, Michael
Routledge Handbook of South Asian Criminology by
Digital Forensics for Handheld Devices by Doherty, Eamon P.
See More