• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2022

Cyber Security primer for managers by Osunkoya, Ph. D. Ola
IoT Security Paradigms and Applications: Research and Practices by
Security and Artificial Intelligence: A Crossdisciplinary Approach by
Security, Privacy and Data Analytics: Select Proceedings of Ispda 2021 by
Risks and Security of Internet and Systems: 16th International Conference, Crisis 2021, Virtual Event, Ames, Usa, November 12-13, 2021, Revised Select by
Guide to Differential Privacy Modifications: A Taxonomy of Variants and Extensions by Pejó, Balázs, Desfontaines, Damien
Blockchain for 5g-Enabled Iot: The New Wave for Industrial Automation by
Security Issues and Privacy Threats in Smart Ubiquitous Computing by
Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux by Nastase, Ramon
Cyberdefense: Domain Name Systems as the Next Public Utility by Mackinder, Craig
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise by Minella, Jennifer
Pro Active Directory Certificate Services: Creating and Managing Digital Certificates for Use in Microsoft Networks by Hughes, Lawrence E.
The Official (Isc)2 Sscp Cbk Reference by Wills, Mike
Automotive Cybersecurity: Security-Bausteine Für Automotive Embedded Systeme by Wurm, Manuel
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them by Pillay, Rishalin
Cyber Storm by Cybersecurity Experts, Leading
Incident Response Techniques for Ransomware Attacks: Understand modern ransomware attacks and build an incident response strategy to work through them by Skulkin, Oleg
Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP by Estrin, Eyal
Competition and Restraint in Cyberspace: The Role of International Norms in Promoting U.S. Cybersecurity by Frederick, Bryan, Ellinger, Emily, Mazarr, Michael J.
Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic by
Next-Generation Enterprise Security and Governance by
The Definitive Guide to Security in Jakarta Ee: Securing Java-Based Enterprise Applications with Jakarta Security, Authorization, Authentication and M by Bais, Teo, Tijms, Arjan, Keil, Werner
Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic by
Recent Innovations in Computing: Proceedings of Icric 2021, Volume 2 by
Smart Systems for E-Health: Wban Technologies, Security and Applications by
Blockchain QuickStart Guide: Explore Cryptography, Cryptocurrency, Distributed Ledger, Hyperledger Fabric, Ethereum, Smart Contracts and Dapps by Amit Johri, Kalpesh Parikh
Cyber Security and Network Security by
Your Data, Their Billions: Unraveling and Simplifying Big Tech by Hoffman, Jane S.
High-Speed Networks: A Tutorial by Crichigno, Jorge, Bou-Harb, Elias, Kfoury, Elie
Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Sixth International Symposium on Software Reliability, Indu by
The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer by Carpenter, Perry, Roer, Kai
Security Issues for Wireless Sensor Networks by Dumka, Ankur, Verma, Parag, Bhardwaj, Anuj
Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic by Das, Ravi
CYBERSECURITY and HACKING for Beginners: The Essential Guide to Mastering Computer Network Security and Learning all the Defensive Actions to Protect by Huss, Robert M.
Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic by Das, Ravi
How to Be a Woman Online: Surviving Abuse and Harassment, and How to Fight Back by Jankowicz, Nina
Advances in Computing and Network Communications: Proceedings of Coconet 2020, Volume 1 by
Emerging Technologies for Computing, Communication and Smart Cities: Proceedings of Etccs 2021 by
Handbook of Research on Cyber Law, Data Protection, and Privacy by
Wireless Hacking With Kali Linux: Begin to Learn Fast How to Hack any Wireless Networks With this Penetration Test and Implementation Guide (2022 Cras by Delgado, Eugene
Evolution in Computational Intelligence: Proceedings of the 9th International Conference on Frontiers in Intelligent Computing: Theory and Application by
Privacy and Security Issues in Big Data: An Analytical View on Business Intelligence by
Architectural Wireless Networks Solutions and Security Issues by
Trends in Wireless Communication and Information Security: Proceedings of Ewcis 2020 by
Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an It Issue by
The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime by Dimaggio, Jon
Cybersecurity for Dummies by Steinberg, Joseph
Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an It Issue by
Hacking for Dummies by Beaver, Kevin
Metaverse: A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Be by Fraley, Harper
Mastering Azure Security - Second Edition: Keeping your Microsoft Azure workloads safe by Toroman, Mustafa, Janetscheck, Tom
Accelerating DevSecOps on AWS: Create secure CI/CD pipelines using Chaos and AIOps by Swaraj, Nikit
Blockchain Gaps: From Myth to Real Life by
Privacy Preservation in Iot: Machine Learning Approaches: A Comprehensive Survey and Use Cases by Qu, Youyang, Gao, Longxiang, Yu, Shui
Cybersecurity: A Practical Engineering Approach by Santos, Henrique M. D.
Digital Earth: Cyber Threats, Privacy and Ethics in an Age of Paranoia by
Implentation of Critical Information Infrastructure Protection Techniques against Cyber Attacks by Vincent, Torty
Ethically Hacking an Industrial Control System: Analyzing, Exploiting, Mitigating, and Safeguarding Industrial Processes for an Ethical Hacker by Ferrone, Sharon
Artificial Intelligence and the Law: Cybercrime and Criminal Liability by
China and Middle East Conflicts: Responding to War and Rivalry from the Cold War to the Present by Burton, Guy
Data Governance and Compliance: Evolving to Our Current High Stakes Environment by Mahanti, Rupa
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense by Dahj, Jean Nestor M.
Data Science for Fake News: Surveys and Perspectives by P, Deepak, Chakraborty, Tanmoy, Long, Cheng
Cyber Mission Thread Analysis: A Prototype Framework for Assessing Impact to Missions from Cyber Attacks to Weapon Systems by Bodine-Baron, Elizabeth, Goldfeld, Dahlia Anne, Snyder, Don
Cissp: Beginners Guide to Incident Management Processes (Cybersecurity and Ethical Hacking to Information Security Professionals) by Watley, Michael
Rmf Isso: Foundations (Guide) by Brown, Bruce
Computer Security: A Hands-on Approach by Du, Wenliang
Internet Security: A Hands-on Approach by Du, Wenliang
Computer & Internet Security: A Hands-on Approach by Du, Wenliang
An Interdisciplinary Approach to Modern Network Security by
Security Awareness for Dummies by Winkler, Ira
Policy Design in the Age of Digital Adoption: Explore how PolicyOps can drive Policy as Code adoption in an organization's digital transformation by Ferreira, Ricardo
Exam Ref Az-500 Microsoft Azure Security Technologies, 2/E by Diogenes, Yuri, Thomas, Orin
Itng 2022 19th International Conference on Information Technology-New Generations by
Blockchain and Other Emerging Technologies for Digital Business Strategies by
Digital Technologies in Teaching and Learning Strategies: Proceedings of Dttls-2021 by
Cyber-Sicherheit: Das Lehrbuch Für Konzepte, Prinzipien, Mechanismen, Architekturen Und Eigenschaften Von Cyber-Sicherheitssystemen in D by Pohlmann, Norbert
Mobile Forensics - The File Format Handbook: Common File Formats and File Systems Used in Mobile Devices by
Mobile Forensics - The File Format Handbook: Common File Formats and File Systems Used in Mobile Devices by
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence by Tiepolo, Gianluca
Introduction to the Cyber Ranges by Pandey, Bishwajeet, Ahmad, Shabeer
Hacking Artificial Intelligence: A Leader's Guide from Deepfakes to Breaking Deep Learning by Gibian, Davey
Emerging Technologies in Data Mining and Information Security: Proceedings of Iemis 2020, Volume 3 by
Using Computational Intelligence for the Dark Web and Illicit Behavior Detection by
Using Computational Intelligence for the Dark Web and Illicit Behavior Detection by
Secure Data Science: Integrating Cyber Security and Data Science by Khan, Latifur, Kantarcioglu, Murat, Thuraisingham, Bhavani
Handbook for Ctfers by Nu1l Team
The Right to Data Protection: Individual and Structural Dimensions of Data Protection in EU Law by Bieker, Felix
Recent Trends in Peripheral Security Systems by Rawat, Abhishek, Deb, Dipankar, Upadhyay, Jatin
Cybersecurity and High-Performance Computing Environments: Integrated Innovations, Practices, and Applications by
The Metrics Manifesto: Confronting Security with Data by Seiersen, Richard
5g and Beyond: The Future of Iot by
Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence by
Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence by
Cyber Security, Privacy and Networking: Proceedings of Icspn 2021 by
The Complete Guide to Scion: From Design Principles to Formal Verification by Basin, David, Chuat, Laurent, Legner, Markus
Towards a Wireless Connected World: Achievements and New Technologies by
Cyber Law in Bangladesh by Karim, Mohammad Ershadul
Blockchain Systems and Communication Networks: From Concepts to Implementation by Rehmani, Mubashir Husain
Yes, my Photos are Fake - and Why I do it: Catfishing in the First Person by Anonymous
Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and by
Fraud Investigation and Forensic Accounting in the Real World by Jennings, William L.
Fraud Investigation and Forensic Accounting in the Real World by Jennings, William L.
The Future of Open Data by
Die Zukunft Von Privatheit Und Selbstbestimmung: Analysen Und Empfehlungen Zum Schutz Der Grundrechte in Der Digitalen Welt by
Cism Certified Information Security Manager Study Guide by Chapple, Mike
The Future of Open Data by
Echtzeit 2021: Echtzeitkommunikation by
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900: Familiarize yourself with security, identity, and compliance in Microsoft 3 by Natwick, Dwayne
MS-700 Managing Microsoft Teams Exam Guide - Second Edition: Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification wi by Chamberlain, Nate, Rising, Peter
Mobile App Reverse Engineering: Get started with discovering, analyzing, and exploring the internals of Android and iOS apps by Mishra, Abhinav
Internet of Things: Security and Privacy in Cyberspace by
Quantum Computing Environments by
Energy Resilience and Climate Protection: Energy Systems, Critical Infrastructures, and Sustainability Goals by Krebs, Heinz-Adalbert, Hagenweiler, Patricia
Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance by
Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance by
ICT Systems Security and Privacy Protection: 37th Ifip Tc 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings by
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (Englis by Ozkaya, Erdal
Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N by
Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N by
Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N by
Competition in the Gray Zone: Countering China's Coercion Against U.S. Allies and Partners in the Indo-Pacific by McClintock, Bruce, Garafola, Cristina L., Lin, Bonny
Say What!? Communicate with Tact and Impact: What to say to get results at any point in an audit by Butera, Ann M.
Basiswissen IT Forensik by B, Mark
Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, Cscml 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings by
The Art of Cyber Security: A Practical Guide to Winning the War on Cyber Crime by
Cloud Native Security Cookbook: Recipes for a Secure Cloud by Armitage, Josh
Reinforcement Learning with Hybrid Quantum Approximation in the Nisq Context by Kunczik, Leonhard
Human Factors In Cybersecurity: Understanding Behavioral Biases and Vulnerabilities by Ejiofor, Oluomachi Eunice
Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS by Stevenson, James
Phishing Detection Using Content-Based Image Classification by Khandelwal, Shekhar, Das, Rik
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future by Mauro, Aaron
Sensemaking for Security by
Conversations About Physics Volume 1 by Burton, Howard
Curating a Literacy Life: Student-Centered Learning with Digital Media by Kist, William
Privacy-Preserving in Edge Computing by Gao, Longxiang, Luan, Tom H., Gu, Bruce
Research Anthology on Securing Medical Systems and Records, VOL 1 by
Research Anthology on Securing Medical Systems and Records, VOL 2 by
Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks by
Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks by
Curating a Literacy Life: Student-Centered Learning with Digital Media by Kist, William
Cyber Security Consultants Playbook by Rauschendorfer, David
Internet of Things Security: Architectures and Security Measures by Wu, Chuan-Kun
Security and Privacy Trends in Cloud Computing and Big Data by
Hardware Platform Security for Mobile Devices by Asokan, N., Gunn, Lachlan J., Ekberg, Jan-Erik
Artificial Intelligence and Security: 8th International Conference, Icais 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II by
Artificial Intelligence and Security: 8th International Conference, Icais 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part III by
Mastering Palo Alto Networks - Second Edition: Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS by 'Reaper', Tom Piens Aka
Safety, Security and Privacy for Cyber-Physical Systems by
Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, Icais 2022, Qinghai, China, Ju by
Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, Icais 2022, Qinghai, China, Ju by
Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, Icais 2022, Qinghai, China, Ju by
Gdpr: A Game of Snakes and Ladders: How Small Businesses Can Win at the Compliance Game by Alford, Samantha
Practical Social Engineering: A Primer for the Ethical Hacker by Gray, Joe
Advances in Computing and Network Communications: Proceedings of Coconet 2020, Volume 2 by
Many Hands in the Cookie Jar: Case Studies in Response Options to Cyber Incidents Affecting U.S. Government Networks and Implications for Future Res by Shokh, Yuliya, Balk, Jonathan, Hodgson, Quentin E.
Proceedings of International Conference on Network Security and Blockchain Technology: Icnsbt 2021 by
Cybercrime: Protecting your business, your family and yourself by Wade, Todd
Foundations and Practice of Security: 14th International Symposium, Fps 2021, Paris, France, December 7-10, 2021, Revised Selected Papers by
Ransomware and Cybercrime by Jenkinson, Andrew
Advances in Cybersecurity Management by
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics by
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs by Wilhoit, Kyle, Opacki, Joseph
The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs by Thompson, Jeremy, Copeland, William, Maurice, Chad
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics by
ICT Systems Security and Privacy Protection: 36th Ifip Tc 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings by
Applied Cryptography and Network Security: 20th International Conference, Acns 2022, Rome, Italy, June 20-23, 2022, Proceedings by
Intelligent Security Management and Control in the Iot by Chalouf, Mohamed-Aymen
Practical Industrial Cybersecurity: Ics, Industry 4.0, and Iiot by Brooks, Charles J., Craig, Philip A.
Cyber Crime Investigator's Field Guide by Middleton, Bruce
Computational Intelligence in Pattern Recognition: Proceedings of Cipr 2022 by
Evidence-Based Cybersecurity: Foundations, Research, and Practice by Pomerleau, Pierre-Luc, Maimon, David
Ethical Hacker's Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks by Rakshit, Samir Kumar
Spatial Grasp as a Model for Space-Based Control and Management Systems by Sapaty, Peter Simon
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation by Rossier, Samuel, Routin, David, Thoores, Simon
Security Analytics: A Data Centric Approach to Information Security by
Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunti by Martínez, Roberto
Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity by
Aiding Forensic Investigation Through Deep Learning and Machine Learning Frameworks by
Aiding Forensic Investigation Through Deep Learning and Machine Learning Frameworks by
Information and Communication Technology for Competitive Strategies (Ictcs 2021): Ict: Applications and Social Interfaces by
Challenges and Risks Involved in Deploying 6G and NextGen Networks by
Challenges and Risks Involved in Deploying 6G and NextGen Networks by
Cross-Industry Applications of Cyber Security Frameworks by
Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity by
Cross-Industry Applications of Cyber Security Frameworks by
OPNsense Beginner to Professional: Protect networks and build next-generation firewalls easily with OPNsense by Camargo, Julio Cesar Bueno de
CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide by Rajib, Nazmul
Handbook of Reinforcement Learning and Control by
Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, Dimva 2022, Cagliari, Italy, June 29 -July 1, 2022, by
Technology Development for Security Practitioners by
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? by Mattsson, Ulf
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? by Mattsson, Ulf
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices by Ozkaya, Erdal
Datenanonymisierung Im Kontext Von Künstlicher Intelligenz Und Big Data: Grundlagen - Elementare Techniken - Anwendung by Krebs, Heinz-Adalbert, Hagenweiler, Patricia
Cybersecurity and Identity Access Management by Rawal, Bharat S., Manogaran, Gunasekaran, Peter, Alexender
Relax: A Guide To True Cyber Security by Fanger, J. Kenneth
Trust, Security and Privacy for Big Data by
Agile Enterprise Risk Management: Risk-Based Thinking, Multi-Disciplinary Management and Digital Transformation by Wiener, Howard M.
Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World by
See More