• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2022

Artificial Intelligence: Ethical, Social and Security Impacts for the Present and the Future by
Ransomware and Cybercrime by Jenkinson, Andrew
Secure Multi-Party E-Commerce Protocols by Bîrjoveanu, Mirela, Bîrjoveanu, Cătălin V.
Security in Computer and Information Sciences: Second International Symposium, Eurocybersec 2021, Nice, France, October 25-26, 2021, Revised Selected by
Cybersecurity Awareness by
Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: Ic4s 2021 by
Cyber Security Meets Machine Learning by
Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets by Scott, Brett
Big Data and Social Media Analytics: Trending Applications by
Cyber Defenders' Career Guide by Miller, Alyssa
Information System Audit: How to Control the Digital Disruption by Peret, Philippe
Metaverse Mastery: Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art & Cryptocurrencies by Belford, Cameron
Vehicular AD Hoc Networks: Futuristic Technologies for Interactive Modelling, Dimensioning, and Optimization by
Navigate Testprep for Fundamentals of Information Systems Security with Cloud Labs by Solomon, Michael G., Kim, David
Fundamentals of Information Systems Security with Navigate Testprep by Kim, David, Solomon, Michael G.
Information Security Education for Cyber Resilience: 14th Ifip Wg 11.8 World Conference, Wise 2021, Virtual Event, June 22-24, 2021, Proceedings by
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 by
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 by
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 by
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities by Meredith, Dale
Proceedings of International Conference on Computing and Communication Networks: ICCCN 2021 by
Human Aspects of Information Security and Assurance: 15th Ifip Wg 11.12 International Symposium, Haisa 2021, Virtual Event, July 7-9, 2021, Proceeding by
Advances in Digital Forensics XVIII: 18th Ifip Wg 11.9 International Conference, Virtual Event, January 3-4, 2022, Revised Selected Papers by
Advances in Security, Networks, and Internet of Things: Proceedings from Sam'20, Icwn'20, Icomp'20, and Escs'20 by
Android Malware Detection Using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence by Karbab, Elmouatez Billah, Debbabi, Mourad, Derhab, Abdelouahid
The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software by Wardle, Patrick
Hacking APIs: Breaking Web Application Programming Interfaces by Ball, Corey J.
Agile Audit Transformation and Beyond by Deroche, Toby
Data and Applications Security and Privacy XXXVI: 36th Annual Ifip Wg 11.3 Conference, Dbsec 2022, Newark, Nj, Usa, July 18-20, 2022, Proceedings by
Theoretical Cybersecurity: Principles and Advanced Concepts by York, Wayne, Oakley, Jacob G., Butler, Michael
Security Compliance in Model-Driven Development of Software Systems in Presence of Long-Term Evolution and Variants by Peldszus, Sven Matthias
Socio-Technical Aspects in Security: 11th International Workshop, Stast 2021, Virtual Event, October 8, 2021, Revised Selected Papers by
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography: Efficient Modular Exponential Techniques by Vollala, Satyanarayana, Ramasubramanian, N., Tiwari, Utkarsh
Encyclopedia of Cryptography, Security and Privacy by
Active Directory Administration Cookbook - Second Edition: Proven solutions to everyday identity and authentication challenges for both on-premises an by Berkouwer, Sander
Artificial Intelligence for Cybersecurity by
Mobile Computing and Sustainable Informatics: Proceedings of Icmcsi 2022 by
Security Awareness Design in the New Normal Age by Goucher, Wendy F.
Digital Forensics in the Era of Artificial Intelligence by Moustafa, Nour
Digital Forensics in the Era of Artificial Intelligence by Moustafa, Nour
7 Rules To Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals by Joshi, Chirag D.
Think Like a Terrorist to Combat Terrorism and Radicalization in Prison by Spina, Francesca, Sturgeon, William P.
Think Like a Terrorist to Combat Terrorism and Radicalization in Prison by Sturgeon, William P., Spina, Francesca
Multimedia Security 2: Biometrics, Video Surveillance and Multimedia Encryption by Puech, William
Intelligent Communication Technologies and Virtual Mobile Networks: Proceedings of ICICV 2022 by
Kochbuch ISMS: Informationssicherheits-Management nach ISO 27001 by Ili, Thomas
Tagebuch ISMS: Die glückliche Zeit mit dem Informationssicherheit-Managementsystem by Ili, Thomas
Data Analytics for Cybersecurity by Janeja, Vandana P.
Microsoft Defender for Cloud Cookbook: Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture by Kranjac, Sasha
Cybercomplexity: A Macroscopic View of Cybersecurity Risk by Young, Carl S.
Human Aspects of Information Security and Assurance: 16th Ifip Wg 11.12 International Symposium, Haisa 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, by
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources by Hills, Christopher, Haber, Morey J., Chappell, Brian
Safety and Security of Cyber-Physical Systems: Engineering Dependable Software Using Principle-Based Development by Furrer, Frank J.
Obstructions in Security-Aware Business Processes: Analysis, Detection, and Handling by Holderer, Julius
Information Security and Cryptology - Icisc 2021: 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers by
Intelligent Technologies and Applications: 4th International Conference, Intap 2021, Grimstad, Norway, October 11-13, 2021, Revised Selected Papers by
The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer by Roer, Kai, Carpenter, Perry
The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer by Carpenter, Perry, Roer, Kai
Cyber and the City: Securing London's Banks in the Computer Age by Sweetman, Ashley
Personalized Privacy Protection in Big Data by Cui, Lei, Qu, Youyang, Nosouhi, Mohammad Reza
Surveillance and Surveillance Detection: A CIA Insider's Guide by Kiriakou, John
Assured Autonomy Survey by Rouff, Christopher, Watkins, Lanier
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career by Underhill, Ken, Foulon, Christophe, Hopkins, Tia
Cybersecurity Essentials: The Beginner's Guide by Johnson, Charles H., Jr.
Data Encryption Standard (DES) and Issues of DES and its Replacement by Ismail, Haitham
Learn Computer Forensics - Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence by Oettinger, William
Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Fifth International Symposium on Software Reliability, Indu by
Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach by Guilley, Sylvain, Ouladj, Maamar
Information Security Technologies for Controlling Pandemics by
Security Architecture � How & Why by Madsen, Tom
Managing Response to Significant Cyber Incidents: Comparing Event Life Cycles and Incident Response Across Cyber and Non-Cyber Events by Hodgson, Quentin E., Clark-Ginsberg, Aaron, Haldeman, Zachary
Russian Disinformation Efforts on Social Media by Cheravitch, Joe, Cohen, Raphael S., Treyger, Elina
Cybersecurity Public Policy: SWOT Analysis Conducted on 43 Countries by Fowler, Bradley, Maranga, Kennedy
Security Risk Models for Cyber Insurance by
Cybersecurity for Everyone by Skillicorn, David B.
Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms by Bajgoric, Nijaz, Turulja, Lejla, Ibrahimovic, Semir
Recent Advances in Security, Privacy, and Trust for Internet of Things (Iot) and Cyber-Physical Systems (Cps) by
The Etherik Spaceship by Doge, Scoobi
Practical Core Software Security: A Reference Framework by Merkow, Mark S., Ransome, James F., Misra, Anmol
Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications by Cawrey, Daniel, Lantz, Lorne
Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications by Cawrey, Daniel, Lantz, Lorne
Practical Core Software Security: A Reference Framework by Merkow, Mark S., Ransome, James F., Misra, Anmol
Luck Follows the Brave: From Refugee Camps, Abuse, and Suicide Loss to Living the Dream by Šibić, Aida
Luck Follows the Brave: From Refugee Camps, Abuse, and Suicide Loss to Living the Dream by Šibić, Aida
If It's Smart, It's Vulnerable by Hyppönen, Mikko
Comptia Linux+ Certification Kit: Exam Xk0-005 by Bresnahan, Christine, Suehring, Steve, Blum, Richard
How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO by Das, Ravi
How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO by Das, Ravi
Learn Wireshark - Second Edition: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark by Bock, Lisa
Understanding Cybersecurity Management in Fintech: Challenges, Strategies, and Trends by Habibi Lashkari, Arash, Kaur, Gurdip, Habibi Lashkari, Ziba
Ai-Enabled Threat Detection and Security Analysis for Industrial Iot by
The Personal Finance Guide for Tech Professionals: Building, Protecting, and Transferring Your Wealth by Taulli, Tom
Privacy and Data Protection in Software Services by
The Ciso's Next Frontier: Ai, Post-Quantum Cryptography and Advanced Security Paradigms by Badhwar, Raj
Executive's Guide to Cyber Risk: Securing the Future Today by Moyo, Siegfried
Holistic Approach to Quantum Cryptography in Cyber Security by
Unleashing the Art of Digital Forensics by
Advances in Information and Computer Security: 17th International Workshop on Security, Iwsec 2022, Tokyo, Japan, August 31 - September 2, 2022, Proce by
Blockchain Security in Cloud Computing by
Deadly Odds 5.0 by Wyler, Allen
Security and Cryptography for Networks: 13th International Conference, Scn 2022, Amalfi (Sa), Italy, September 12-14, 2022, Proceedings by
Your Short Guide to Security Systems by Everything Security Systems
The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing by Vishwanath, Arun
Practical Mathematical Cryptography by Gjøsteen, Kristian
Espionage & Encryption Super Pack: How to Be Invisible Online by Henderson, Lance
Security and Resilience of Cyber Physical Systems by
Mastering Windows Security and Hardening - Second Edition: Secure and protect your Windows environment from cyber threats using zero-trust security pr by Dunkerley, Mark, Tumbarello, Matt
Principles of Social Networking: The New Horizon and Emerging Challenges by
Cyber Law in Bulgaria by Zahariev, Martin, Dimitrov, George
Ethical Hacking: Learn About Effective Strategies of Ethical Hacking (A Complete Beginners Guide to Successful Ethical Hacking Career) by Ellis, John
Get in the Game: How to Level Up Your Business with Gaming, Esports, and Emerging Technologies by Stringfield, Jonathan
Get in the Game: How to Level Up Your Business with Gaming, Esports, and Emerging Technologies by Stringfield, Jonathan
Cybersecurity in Smart Homes: Architectures, Solutions and Technologies by Khatoun, Rida
Darknet by Henderson, Lance
Advancing Computational Intelligence Techniques for Security Systems Design by
Cryptocurrency for Beginners: How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins by Pascall, Zeph
Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman by
Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman by
Advanced Blockchain Technology: Frameworks and Enterprise-Level Practices by Liang, Xiubo, Cai, Liang, Li, Qilei
Cyber Security, Artificial Intelligence, Data Protection & the Law by Walters, Robert, Novak, Marko
Tor Darknet Bundle: Master the Art of Invisibility by Henderson, Lance
Cyber Warfare, Security and Space Research: First International Conference, Spacsec 2021, Jaipur, India, December 9-10, 2021, Revised Selected Papers by
Microsoft Azure Sentinel: Planning and Implementing Microsoft's Cloud-Native Siem Solution by Turpijn, Tiander, Diogenes, Yuri, Dicola, Nicholas
Security Analytics for the Internet of Everything by
Smart Card Security: Applications, Attacks, and Countermeasures by Quamara, Megha, Gupta, Brij B.
Cybersecurity and Privacy in Cyber Physical Systems by
Botnets: Architectures, Countermeasures, and Challenges by
Information Centric Networks (Icn): Architecture & Current Trends by Sarma, Hiren Kumar Deva, Jadeja, Rajendrasinh, Dutta, Nitul
The Cybersecurity Body of Knowledge: The Acm/Ieee/Ais/Ifip Recommendations for a Complete Curriculum in Cybersecurity by Shoemaker, Daniel, Kohnke, Anne, Sigler, Ken
Check Point Firewall Administration R81.10+: A practical guide to Check Point firewall deployment and administration by Yakovlev, Vladimir
A Beginner's Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals by Tewari, Aakanksha, Gupta, Brij B.
Vulnerability Management by Foreman, Park
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures by Chaudhary, Pooja, Gupta, Brij B.
Cybercrime Investigations: A Comprehensive Resource for Everyone by Merzon, Antonia, Bandler, John
Applications of Blockchain and Big Iot Systems: Digital Solutions for Diverse Industries by
Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Test by Mishra, Ashish
Smart Log Data Analytics: Techniques for Advanced Security Analysis by Skopik, Florian, Wurzenberger, Markus, Landauer, Max
Human Choice and Digital by Default: Autonomy Vs Digital Determination: 15th Ifip International Conference on Human Choice and Computers, Hcc 2022, To by
Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks by Wolff, Josephine
Windows and Linux Penetration Testing from Scratch - Second Edition: Harness the power of pen testing with Kali Linux for unbeatable hard-hitting resu by Bramwell, Phil
Cybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide by Clark, Kevin
Zero Trust Journey Across the Digital Estate by Kudrati, Abbas, Pillai, Binil A.
Zero Trust Journey Across the Digital Estate by Pillai, Binil A., Kudrati, Abbas
Cyber Security Threats and Challenges Facing Human Life by
Emerging Trends in Intelligent Systems & Network Security by
Cyber Security Awareness: Employee Handbook by Mullins, Michael
Metaverse: A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Be by Fraley, Harper
Convergence of Internet of Things and Blockchain Technologies by
Electronic Voting: 7th International Joint Conference, E-Vote-Id 2022, Bregenz, Austria, October 4-7, 2022, Proceedings by
Secure and Trusted Cyber Physical Systems: Recent Approaches and Future Directions by
Internet of Things, Artificial Intelligence and Blockchain Technology by
Iot Supply Chain Security Risk Analysis and Mitigation: Modeling, Computations, and Software Tools by Kieras, Timothy, Farooq, Junaid, Zhu, Quanyan
Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, Nfts, and Smart Contracts by Poston, Howard E.
Business Process Management: Blockchain, Robotic Process Automation, and Central and Eastern Europe Forum: BPM 2022 Blockchain, Rpa, and Cee Forum, Mü by
Hacking with Kali Linux: Learn Hacking with this Detailed Guide, How to Make Your Own Key Logger and How to Plan Your Attacks (2022 Crash Cours by Wilcher, Ollie
Advanced Circuits and Systems for Healthcare and Security Applications by
Nft for Beginners: Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for Newbies) by Badman, Shaun
Big Data Privacy and Security in Smart Cities by
The Complete Ethical Hacking Book: A Comprehensive Beginner's Guide to Learn and Master in Ethical Hacking by Thirumalesh
Data Governance and Data Management: Contextualizing Data Governance Drivers, Technologies, and Tools by Mahanti, Rupa
Cyberpredators and Their Prey by Shapiro, Lauren R.
Quantum Key Distribution Networks: A Quality of Service Perspective by Rass, Stefan, Mehic, Miralem, Fazio, Peppino
Cyberpredators and Their Prey by Shapiro, Lauren R.
Ultra-Dense Heterogeneous Networks by Wang, Qubeijian, Sun, Wen, Zhao, Nan
Russian Information Warfare: Assault on Democracies in the Cyber Wild West by Lilly, Bilyana
Citizen Privacy Framework: Case of a Fuzzy-Based Recommender System for Political Participation by Kaskina, Aigul
Windows Server 2022 Administration Fundamentals - Third Edition: A beginner's guide to managing and administering Windows Server environments by Dauti, Bekim
Enterprise-Grade It Security for Small and Medium Businesses: Building Security Systems, in Plain English by Cherry, Denny
Aws Security by Shields, Dylan
Innovations in Information and Communication Technologies: Proceedings of Iciict 2022 by
Secret Key Cryptography by Rubin, Frank
Practical Cloud Native Security with Falco: Risk and Threat Detection for Containers, Kubernetes, and Cloud by Grasso, Leonardo, Degioanni, Loris
Practical Cryptography by
Information Technology Law in Japan by Yanaga, Masao
Information Technology Law in the United States of America by Cunningham, McKay, Murphy, Timothy
Confidential Computing: Hardware Based Memory Protection by
Computer Security - Esorics 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, P by
Computer Security - Esorics 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, P by
Computer Security - Esorics 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, P by
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions by Omar, Marwan
Applied Cryptography and Network Security Workshops: Acns 2022 Satellite Workshops, Aiblock, Aihws, Aiots, Cimss, Cloud S&p, Sci, Secmt, Simla, Rome, by
Network Security: Private Communication in a Public World by Kaufman, Charlie, Perlman, Radia, Speciner, Mike
If It's Smart, It's Vulnerable by Hypponen, Mikko
If It's Smart, It's Vulnerable by Hypponen, Mikko
Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors by Gomzin, Slava
Introduction to Machine Learning with Applications in Information Security by Stamp, Mark
Artificial Intelligence and National Security by
Post-Quantum Cryptography: 13th International Workshop, Pqcrypto 2022, Virtual Event, September 28-30, 2022, Proceedings by
Perfect Secrecy in Iot: A Hybrid Combinatorial-Boolean Approach by Zolfaghari, Behrouz, Bibak, Khodakhast
Cyberspace Safety and Security: 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings by
Soft Computing for Security Applications: Proceedings of Icscs 2022 by
Emerging Technologies in Data Mining and Information Security: Proceedings of Iemis 2022, Volume 3 by
Science of Cyber Security: 4th International Conference, Scisec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers by
Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks by Thabet, Amr, Kleymenov, Alexey
Cybersecurity - Attack and Defense Strategies - Third Edition: Improve your security posture to mitigate risks and prevent attackers from infiltrating by Diogenes, Yuri, Ozkaya, Erdal
Telematics and Computing: 11th International Congress, Witcom 2022, Cancún, México, November 7-11, 2022, Proceedings by
Partially Homomorphic Encryption by Ödemiş Özger, Zeynep, Koç, Çetin Kaya, Özdemir, Funda
Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th Intern by
Big Data - Big Accountability: Erkennung Von Versicherungsbetrug Mit Big Data Nach Der Datenschutz-Grundverordnung by Herfurth, Constantin
Networking, Intelligent Systems and Security: Proceedings of Niss 2021 by
See More