• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2022

No Domain: The John McAfee Tapes by Eglinton, Mark
Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication by Kaschner, Holger
Preference-Based Spatial Co-Location Pattern Mining by Fang, Yuan, Zhou, Lihua, Wang, Lizhen
Data Security: Technical and Organizational Protection Measures Against Data Loss and Computer Crime by Lenhard, Thomas H.
Critical Infrastructure Protection XV: 15th Ifip Wg 11.10 International Conference, Iccip 2021, Virtual Event, March 15-16, 2021, Revised Selected Pap by
Network and System Security: 15th International Conference, Nss 2021, Tianjin, China, October 23, 2021, Proceedings by
Protecting Privacy Through Homomorphic Encryption by
Event- And Data-Centric Enterprise Risk-Adjusted Return Management: A Banking Practitioner's Handbook by Kumar Kattumannil, Sudheesh, Subramanian R., Kannan
Building Decentralized Trust: Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers by
Fog/Edge Computing for Security, Privacy, and Applications by
Technology-Augmented Perception and Cognition by
Computer-Mediated Communication by
Super Secreto - The Third Epoch of Cryptography: Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone by Tenzer, Theo
Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO by Ozkaya, Erdal
GDPR and Biobanking: Individual Rights, Public Interest and Research Regulation across Europe by
والدین حقیقی ، فرزندان م&#1580 by Monshizadeh, Mohammad
Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications by Ristic, Ivan
Green Computing in Network Security: Energy Efficient Solutions for Business and Home by
Library Patrons' Privacy: Questions and Answers by Beckstrom, Matthew A., Lund, Brady D., Valenti, Sandra J.
Multimedia Security: Algorithm Development, Analysis and Applications by
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks by Ali, Ikram, Chen, Yong, Faisal, Mohammad
Cyberspace Safety and Security: 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings by
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Cloud by Ipsale, Maurizio, Gilioli, Mirko
Emerging Information Security and Applications: Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected by
The Crypto Kid by Shembekar, Jackson
Emerging Technologies for Authorization and Authentication: 4th International Workshop, Etaa 2021, Darmstadt, Germany, October 8, 2021, Revised Select by
Blockchain for 5g Healthcare Applications: Security and Privacy Solutions by
Safety and Security Engineering IX by
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense by Payne, Bryson
Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity by Olson, Scott, Garber, Leeza
Conflicts, Crimes and Regulations in Cyberspace by
Expressing Information Flow Properties by Myers, Andrew C., Kozyri, Elisavet, Chong, Stephen
Information Systems Security and Privacy: 6th International Conference, Icissp 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers by
Digital Forensics and Watermarking: 20th International Workshop, Iwdw 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers by
Cyber Security: 18th China Annual Conference, Cncert 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers by
Mobile Internet Security: 5th International Symposium, Mobisec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers by
Adversary-Aware Learning Techniques and Trends in Cybersecurity by
Data Privacy Management, Cryptocurrencies and Blockchain Technology: Esorics 2021 International Workshops, Dpm 2021 and CBT 2021, Darmstadt, Germany, by
Privacy Is Power: Why and How You Should Take Back Control of Your Data by Veliz, Carissa
The Development of Blockchain Technology: Research on the Development of Electronic Information Engineering Technology in China by Center for Electronics and Information Studies Chinese Acade
Sustainable Communication Networks and Application: Proceedings of Icscn 2020 by
Microsoft Sentinel in Action - Second Edition: Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions by Bushey, Gary, Perkins, John, Diver, Richard
Trends and Future Directions in Security and Emergency Management by
Machine Learning for Cyber Agents: Attack and Defence by Abaimov, Stanislav, Martellini, Maurizio
Security, Privacy, and Applied Cryptography Engineering: 11th International Conference, Space 2021, Kolkata, India, December 10-13, 2021, Proceedings by
Topics in Cryptology - Ct-Rsa 2022: Cryptographers' Track at the Rsa Conference 2022, Virtual Event, March 1-2, 2022, Proceedings by
The Cybersecurity Mindset: A Virtual and Transformational Thinking Mode by Hart, Dewayne
The Cybersecurity Mindset: A Virtual and Transformational Thinking Mode by Hart, Dewayne
Game Theory for Cyber Deception: From Theory to Applications by Pawlick, Jeffrey, Zhu, Quanyan
Cryptography and Steganography. A multilayer Data Security Approach by Patni, Jagdish Chandra, Sharma, Hitesh Kumar
Cyber Arms: Security in Cyberspace by Abaimov, Stanislav, Martellini, Maurizio
Handbook of Digital Face Manipulation and Detection: From Deepfakes to Morphing Attacks by
Handbook of Digital Face Manipulation and Detection: From Deepfakes to Morphing Attacks by
Advanced Security Testing with Kali Linux by Dieterle, Daniel W.
Proceedings of the International Conference on Applied Cybersecurity (Acs) 2021 by
(Isc)2 Sscp Systems Security Certified Practitioner Official Study Guide by Wills, Mike
Artificial Intelligence and Cybersecurity: Advances and Innovations by
Understanding Network Hacks: Attack and Defense with Python 3 by Ballmann, Bastian
Quantum Communication Networks by Bassoli, Riccardo, Boche, Holger, Deppe, Christian
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security by
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security by
Access Control Models and Architectures for Iot and Cyber Physical Systems by Alshehri, Asma Hassan, Gupta, Maanak, Bhatt, Smriti
Mathematics in Cyber Research by
ACE - CISSP - Essential Approach To The Exam by Hazra, Sabyasachi
CMOS Analog IC Design for 5g and Beyond by
Computer Security. Esorics 2021 International Workshops: Cybericps, Secpre, Adiot, Spose, Cps4cip, and Cdt&secomane, Darmstadt, Germany, October 4-8, by
DNSSEC Mastery, 2nd Edition by Lucas, Michael W.
DNSSEC Mastery, 2nd Edition by Lucas, Michael W.
The Impact of the General Data Protection Regulation (GDPR) on the Online Advertising Market by Jin, Yuxi, Miller, Klaus M., Skiera, Bernd
Blockchain - Icbc 2021: 4th International Conference, Held as Part of the Services Conference Federation, Scf 2021, Virtual Event, December 10 by
Illumination of Artificial Intelligence in Cybersecurity and Forensics by
Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass th by Hedberg, Viktor, Darr, Shabaz
Modern Socio-Technical Perspectives on Privacy by
Silicon Valley Cybersecurity Conference: Second Conference, Svcc 2021, San Jose, Ca, Usa, December 2-3, 2021, Revised Selected Papers by
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography by Mittelbach, Arno, Fischlin, Marc
Modern Socio-Technical Perspectives on Privacy by
Mastering Veeam Backup & Replication - Second Edition: Secure backup with Veeam 11 for defending your data and accelerating your data protection strat by Childerhose, Chris
Practical Security for Agile and DevOps by Merkow, Mark S.
Practical Security for Agile and DevOps by Merkow, Mark S.
Artificial Intelligence and Mobile Services - Aims 2021: 10th International Conference, Held as Part of the Services Conference Federation, Scf 2021, by
Wing-Level Mission Assurance for a Cyber-Contested Environment by Mayer, Lauren A., Brosmer, Jonathan Lee, Snyder, Don
Parenting for the Digital Generation: A Guide to Digital Education and the Online Environment by Garon, Jon M.
Data Privacy: A Runbook for Engineers by Bhajaria, Nishant
Information Systems: 18th European, Mediterranean, and Middle Eastern Conference, Emcis 2021, Virtual Event, December 8-9, 2021, Proceeding by
Agile Security Operations: Engineering for agility in cyber defense, detection, and response by Hettema, Hinne
Cyber-Physical Systems and Industry 4.0: Practical Applications and Security Management by
Privacy, Security and Forensics in the Internet of Things (Iot) by
Web Services - Icws 2021: 28th International Conference, Held as Part of the Services Conference Federation, Scf 2021, Virtual Event, December 1 by
Cyber Law in Israel by Hallevy, Gabriel
The Security Hippie by Engel, Barak
The Security Hippie by Engel, Barak
Cloud Computing Security: Foundations and Research Directions by Chakraborti, Anrin, Curtmola, Reza, Katz, Jonathan
Secure Knowledge Management in the Artificial Intelligence Era: 9th International Conference, Skm 2021, San Antonio, Tx, Usa, October 8-9, 2021, Proce by
Information Retrieval and Natural Language Processing: A Graph Theory Approach by Mahalle, Parikshit N., Ghotkar, Archana S., Sonawane, Sheetal S.
Arithmetic and Algebraic Circuits by Castillo Morales, Encarnación, Parrilla Roure, Luis, Lloris Ruiz, Antonio
The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire by Singh, Glen D.
Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency by Paxton, Paul
Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency by Paxton, Paul
Ransomware Revolution: The Rise of a Prodigious Cyber Threat by Ryan, Matthew
Ubiquitous Security: First International Conference, Ubisec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers by
Cloud Computing - Cloud 2021: 14th International Conference, Held as Part of the Services Conference Federation, Scf 2021, Virtual Event, December 1 by
Public-Key Cryptography - Pkc 2022: 25th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2 by
Public-Key Cryptography - Pkc 2022: 25th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2 by
Exploring Blockchain in Healthcare: Implementation and Impact of Distributed Database Across Pharmaceutical Supply Chain, Drugs Administration, Health by Srivastava, Anurag
Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser by Segala, Alessandro
Authorization and Access Control: Foundations, Frameworks, and Applications by R. Shinde, Gitanjali, N. Mahalle, Parikshit, S. Bhong, Shashikant
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition: Apply a proactive approach to secure your cyber infrastructure and enhance you by Velu, Vijay Kumar
The Future of Financial Systems in the Digital Age: Perspectives from Europe and Japan by
The Future of Financial Systems in the Digital Age: Perspectives from Europe and Japan by
Principles of Information Security by
Frontiers in Cyber Security: 4th International Conference, Fcs 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers by
Codeknacker Gegen Codemacher: Die Faszinierende Geschichte Der Verschlüsselung by Schmeh, Klaus
Forensic Data Collections 2.0: The Guide for Defensible & Efficient Processes by Fried, Robert B.
Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption by Bertaccini, Massimo
CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam by Birch, Mark
Forensic Data Collections 2.0: The Guide for Defensible & Efficient Processes by Fried, Robert B.
Anarchy of Cyberterrorism: What you should know about Cyber Crimes, Cyber Espionage, Cyber Attack, Cyberwarfare & Social Engineering by Alaofin, Tunde
Anarchy of Cyberterrorism: What you should know about Cyber Crimes, Cyber Espionage, Cyber Attack, Cyberwarfare & Social Engineering by Alaofin, Tunde
Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 by
Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 by
Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 by
Proceedings of the Seventh International Conference on Mathematics and Computing: ICMC 2021 by
Introduction to Cryptography by
The Internet: A Practical Guide for Beginners by Fong, Keith
Understanding Cryptography by
Transformations Through Blockchain Technology: The New Digital Revolution by
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ E Communication by Lawson, Sean T., Gehl, Robert W.
Smart Card Research and Advanced Applications: 20th International Conference, Cardis 2021, Lübeck, Germany, November 11-12, 2021, Revised Selected Pap by
Cloud Security for Dummies by Coombs, Ted
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition by Harper, Allen, Sims, Stephen, Linn, Ryan
Cybersecurity: Ethics, Legal, Risks, and Policies by Priyadarshini, Ishaani, Cotton, Chase
The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks by Wittkop, Jeremy
Challenging Online Propaganda and Disinformation in the 21st Century by
Recent Innovations in Computing: Proceedings of Icric 2021, Volume 1 by
Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy, and pass the SC- by Natwick, Dwayne
Applications and Techniques in Information Security: 12th International Conference, Atis 2021, Virtual Event, December 16-17, 2021, Revised Selected P by
Cybersecurity Measures for E-Government Frameworks by
Real-Time Applications of Machine Learning in Cyber-Physical Systems by
Real-Time Applications of Machine Learning in Cyber-Physical Systems by
Cybersecurity Measures for E-Government Frameworks by
Personality and Data Protection Rights on the Internet: Brazilian and German Approaches by
Code-Based Cryptography: 9th International Workshop, Cbcrypto 2021 Munich, Germany, June 21-22, 2021 Revised Selected Papers by
Advanced Windows Memory Dump Analysis with Data Structures: Training Course Transcript and WinDbg Practice Exercises with Notes, Fourth Edition by Vostokov, Dmitry, Software Diagnostics Services
Security and Privacy in New Computing Environments: 4th Eai International Conference, Spnce 2021, Virtual Event, December 10-11, 2021, Proceedings by
Multimedia Security 1: Authentication and Data Hiding by Puech, William
The United States of Anonymous: How the First Amendment Shaped Online Speech by Kosseff, Jeff
Privacy-Preserving Machine Learning by Liu, Zheli, Li, Jin, Li, Ping
Security in Iot: The Changing Perspective by
The Cybersecurity to English Dictionary: 5th Edition by Meeuwisse, Raef
The Cybersecurity to English Dictionary: 5th Edition by Meeuwisse, Raef
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security Stack for by Anich, Joe, Stuart, Trevor
Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory by Skulkin, Oleg, Ostrovskaya, Svetlana
Zabbix 6 IT Infrastructure Monitoring Cookbook - Second Edition: Explore the new features of Zabbix 6 for designing, building, and maintaining your Za by Baekel, Brian Van, Liefting, Nathan
Blockchain Technology for Iot Applications by
NFT (Non-Fungible Token) For Beginners: THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like Ethereum, BSC, And Flow by Streamings, Megalodona
Cryptocurrency Trading: A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN by Streamings, Megalodona
Implementing Devsecops with Docker and Kubernetes: An Experiential Guide to Operate in the Devops Environment for Securing and Monitoring Container Ap by Ortega Candel, Jose Manuel
Python for Cybersecurity: Using Python for Cyber Offense and Defense by Poston, Howard E.
The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning by Smith-Ruiu, Justin
KAT - A Kid's Guide to Staying Safe Online: A Kid's Guide to Staying Safe Online by Trafficking, Kids Against
The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity by Munk, Tine
Linux Command Line and Shell Scripting Techniques: Master practical aspects of the Linux command line and then use it as a part of the shell scripting by Dakic, Vedran, Redzepagic, Jasmin
Tor Browser: Learn How to Claim Your Privacy in the Internet World and Hide Your Ip (Hide Your Ip Address and Ensure Internet Priva by Robson, Joseph
It Security Controls: A Guide to Corporate Standards and Frameworks by Viegas, Virgilio, Kuyucu, Oben
Selected Topics in Information Security Research and Teaching by Al-Janabi, Sufyan
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation by
Cryptocurrency for Beginners: How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins by Pascall, Zeph
Comptia Pentest+ Certification for Dummies by Clarke, Glen E.
Making Sense of Cyber Capabilities for Small States: Case Studies from the Asia-Pacific by Domingo, Francis C.
Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, Cosade 2022, Leuven, Belgium, April 11-12, 2022, Proceedings by
Selected Areas in Cryptography: 28th International Conference, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers by
Blockchain Technology and Innovations in Business Processes by
Advances in Data Computing, Communication and Security: Proceedings of I3cs2021 by
Blockchain, Big Data and Machine Learning: Trends and Applications by
Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects by Summers, Akira
Privacy and Identity Management. Between Data Protection and Security: 16th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Privacy by
Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects by Summers, Akira
Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency by Wagner, Isabel
Metaverse: A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Be by Fraley, Harper
Super Secreto - Verschlüsselung für alle: Abhörsicher in die Dritte Epoche der Kryptographie. (Tutorial- & Taschenbuch-Ausgabe zur Einführung in die s by Tenzer, Theo
Data Ethics and Challenges by Tiwari, Kapil, Shukla, Samiksha, George, Jossy P.
Fundamentals of Adopting the Nist Cybersecurity Framework: Part of the Create, Protect, and Deliver Digital Business Value Series by Moskowitz, David, Nichols, David
The Social Hacking Dictionary by Kathy, Black Hat
Multimedia Forensics by
Multimedia Forensics by
Privacy and Identity Management: 15th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Rev by
Cyber Security: Critical Infrastructure Protection by
Information Science and Applications: Proceedings of Icisa 2020 by
Digital Transformation with Dataverse: Become a Citizen Developer and Lead the Digital Transformation Wave with Microsoft Teams and Power Platform by Brooke, Aaron
Cybersecurity and Local Government by Mateczun, Laura K., Forno, Richard F., Norris, Donald F.
Deep Learning for Security and Privacy Preservation in Iot by
Security and Privacy: Select Proceedings of Icsp 2020 by
Information Security Technologies in the Decentralized Distributed Networks by
Comptia Pentest+ Certification All-In-One Exam Guide, Second Edition (Exam Pt0-002) by Nutting, Raymond, Linn, Heather
Password Log Book and Internet Addresses I Can't Remember by Read Me Press, Pick Me
Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience by Donalds, Charlette, Barclay, Corlane, Osei-Bryson, Kweku-Muata
Cyber Security primer for managers by Osunkoya, Ph. D. Ola
Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools by
Secret Colors by Kleppmann, Martin
Data Driven Approach Towards Disruptive Technologies: Proceedings of Midas 2020 by
See More