• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2022

It Convergence and Security: Proceedings of Icitcs 2021 by
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business by Finney, George
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide by Chapple, Mike, Seidl, David
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business by Finney, George
Digital Children: A Guide for Adults by Gray, Sandra Leaton, Phippen, Andy
Mind the Tech Gap: Addressing the Conflicts Between It and Security Teams by Robinson, Nikki
Mind the Tech Gap: Addressing the Conflicts Between It and Security Teams by Robinson, Nikki
Lightweight Cryptographic Techniques and Cybersecurity Approaches by
Achieving Amazing (Client) Relationships by Gifford, Frank
Trust, Privacy and Security in Digital Business: 19th International Conference, Trustbus 2022, Vienna, Austria, August 24, 2022, Proceedings by
White-Collar Crime Online: Deviance, Organizational Behaviour and Risk by Hamerton, Christopher, Gottschalk, Petter
Progress in Cryptology - Africacrypt 2022: 13th International Conference on Cryptology in Africa, Africacrypt 2022, Fes, Morocco, July 18-20, 2022, Pr by
Sensibilisation à la Cybersécurité: Manuel de L'employé by
Cyber Security Instinct: Reloaded!: Preface by DR. ALEKSANDR YAMPOLSKIY by Israel, Mauro
Security Testing with Raspberry Pi, Second Edition by Dieterle, Daniel W.
Secure Multi-Party Computation Against Passive Adversaries by Patra, Arpita, Choudhury, Ashish
Security and Privacy in Social Networks and Big Data: 8th International Symposium, Socialsec 2022, Xi'an, China, October 16-18, 2022, Proceedings by
Iot-Enabled Unobtrusive Surveillance Systems for Smart Campus Safety by Anagnostopoulos, Theodoros
Cyber-Security Threats and Response Models in Nuclear Power Plants by Smidts, Carol, Ray, Indrajit, Zhu, Quanyan
Collaborative Humanities Research and Pedagogy: The Networks of John Matthews Manly and Edith Rickert by
The Official (Isc)2 Ccsp Cbk Reference by Kraus, Aaron
System of Controls: I.T.'s Guide to Managing Cyber Risk by Reed, William D.
Security in Vehicular Networks: Focus on Location and Identity Privacy by Benarous, Leila, Batim, Salim, Mellouk, Abdelhamid
Advances in Cryptology - Crypto 2022: 42nd Annual International Cryptology Conference, Crypto 2022, Santa Barbara, Ca, Usa, August 15-18, 2022, Procee by
Advances in Cryptology - Crypto 2022: 42nd Annual International Cryptology Conference, Crypto 2022, Santa Barbara, Ca, Usa, August 15-18, 2022, Procee by
Advances in Cryptology - Crypto 2022: 42nd Annual International Cryptology Conference, Crypto 2022, Santa Barbara, Ca, Usa, August 15-18, 2022, Procee by
Advances in Cryptology - Crypto 2022: 42nd Annual International Cryptology Conference, Crypto 2022, Santa Barbara, Ca, Usa, August 15-18, 2022, Procee by
Innovative Security Solutions for Information Technology and Communications: 14th International Conference, Secitc 2021, Virtual Event, November 25-26 by
Cybersecurity Issues, Challenges, and Solutions in the Business World by
Cybersecurity Issues, Challenges, and Solutions in the Business World by
Advances in Digital Forensics XVII: 17th Ifip Wg 11.9 International Conference, Virtual Event, February 1-2, 2021, Revised Selected Papers by
Cism Certified Information Security Manager All-In-One Exam Guide, Second Edition by Gregory, Peter H.
Privacy Symposium 2022: Data Protection Law International Convergence and Compliance with Innovative Technologies (Dplicit) by
Casp+ Comptia Advanced Security Practitioner Certification Kit: Exam Cas-004 by Parker, Jeff T., Tanner, Nadean H.
Cyber Security Applications for Industry 4.0 by
Privacy and Data Protection Law in New Zealand by Roth, Paul, Stewart, Blair
European Privacy and Data Protection Law by Gryffroy, Pieter, Roex, Ruben, Dumortier, Jos
Information Technology Law in Jamaica by Foga, Nicole
Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications by
Microsoft Defender for Cloud by Janetscheck, Tom, Diogenes, Yuri
Financial Cryptography and Data Security: 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers by
Human Security in China: A Post-Pandemic State by
Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation by Lanza, Claudia
Ihr Untergang als Informationssicherheitsbeauftragter (ISB) by Naumann, Jacqueline
The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes by Buchanan, Marlon
Auditing It Infrastructures for Compliance by Weiss, Marty, Johnson, Robert, Solomon, Michael G.
Security Technologies and Social Implications by
How to Hack Like a Legend: Breaking Windows by Flow, Sparc
(Isc)2 Ccsp Certified Cloud Security Professional Official Practice Tests by Seidl, David, Chapple, Mike
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime by Golden, Daniel, Dudley, Renee
Network Protocols for Security Professionals: Probe and identify network-based vulnerabilities and safeguard against network protocol breaches by Khanna, Deepanshu, Orzach, Yoram
Ransomware and Cyber Extortion: Response and Prevention by Davidoff, Sherri, Durrin, Matt, Sprenger, Karen
Cyber Security: Issues and Current Trends by Tanwar, Sudeep, Dutta, Nitul, Jadav, Nilesh
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle by Chapple, Mike, Seidl, David
Secret Admirer: Behind the Curtains of a Parasocial Relationship by Lee, Celina, Singh, Anjali, Jafar, Samantha
Online Predators, an Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena by Lee, Jeffrey A.
The Auditor's Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance by Aghili, Shaun
The Auditor's Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance by Aghili, Shaun
The Art of Selling Cybersecurity by Raza, Mahdi, Mahdi, David
Metaverso y NFT: El descubrimiento de la Web 3.0, la inversión en tokens no fungibles, la realidad virtual, el criptojuego y el criptoarte by Newman, Donn
Building a Cyber Resilient Business: A cyber handbook for executives and boards by Chelly, Magda, Tan, Shamane, Tran, Hai
Guide to Data Privacy: Models, Technologies, Solutions by Torra, Vicenç
Cybersecurity in Intelligent Networking Systems by Xu, Shengjie, Qian, Yi, Hu, Rose Qingyang
Provable and Practical Security: 16th International Conference, Provsec 2022, Nanjing, China, November 11-12, 2022, Proceedings by
IT-Sicherheit by Hellmann, Roland
MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam Az-500 by Brathwaite, Shimon
Smart Cities: Cyber Situational Awareness to Support Decision Making by Neshenko, Nataliia, Bou-Harb, Elias, Furht, Borko
Crypto Currency Trading Tracker: Cryptocurrency Coin Tracker for Your Portofolio Investory Stock Trading Log Book by Apfel, Sasha
AI and Machine Learning for Network and Security Management by Wu, Yulei, Ge, Jingguo, Li, Tong
Security Strategies in Linux Platforms and Applications by Jang, Michael, Messier, Ric
Web3: The End of Business as Usual; The impact of Web 3.0, Blockchain, Bitcoin, NFTs, Crypto, DeFi, Smart Contracts and the by Cooke, G. C.
Cryptology and Network Security: 21st International Conference, Cans 2022, Abu Dhabi, United Arab Emirates, November 13-16, 2022, Proceedings by
Diving into Secure Access Service Edge: A technical leadership guide to achieving success with SASE at market speed by Ginn, Jeremiah
A European Perspective on Crisis Informatics: Citizens' and Authorities' Attitudes Towards Social Media for Public Safety and Security by Reuter, Christian
Security Strategies in Linux Platforms and Applications + Cloud Labs by Jang, Michael, Messier, Ric
Intelligent Computing and Applications: Proceedings of ICDIC 2020 by
The Small Business Owner's Guide to Protecting Your Business From Hackers by Skinner, Mike, Haxton, Patrick, de Prado, Carl
Iso/Iec 27001:2022: An Introduction to Information Security and the Isms Standard by Watkins, Steven
The Wires of War: Technology and the Global Struggle for Power by Helberg, Jacob
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century by Brathwaite, Shimon
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century by Brathwaite, Shimon
Linux Fundamentals by Blum, Richard
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers by Khairallah, Mustafa
Metaverse Investing & Marketing Book: Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and Future of the metaverse by Pauley, Doran
Red Hat Enterprise Linux 9 Administration - Second Edition: A comprehensive Linux system administration guide for RHCSA certification exam candidates by Requena, Pedro Ibáñez, Gómez, Pablo Iranzo, Colino, Miguel Pérez
CompTIA Network+ N10-008 Certification Guide - Second Edition: The ultimate guide to passing the N10-008 exam by Singh, Glen D.
Solving Identity Management in Modern Applications: Demystifying Oauth 2, Openid Connect, and Saml 2 by Wilson, Yvonne, Hingnikar, Abhishek
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud by Iyer, Sreekanth
Pro Encryption in SQL Server 2022: Provide the Highest Level of Protection for Your Data by McGiffen, Matthew
Information Security Practice and Experience: 17th International Conference, Ispec 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings by
Cybersecurity in Morocco by Maleh, Yassine, Maleh, Youness
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications: 9th International Conference, Fdse 202 by
Stream Ciphers in Modern Real-Time It Systems: Analysis, Design and Comparative Studies by Poluyanenko, Nikolay Alexandrovich, Kuznetsov, Alexandr Alexandrovich, Potii, Oleksandr Volodymyrovych
Privacy and Data Protection Law in Mexico by Velasco, Cristos, Maqueo, María Solange
Privacy and Data Protection Law in the Philippines by Dee, Celine Melanie a., Aguirre, Leandro Angelo Y.
Our Data, Ourselves: A Personal Guide to Digital Privacy, First Edition by Lipton, Jacqueline D.
Our Data, Ourselves: A Personal Guide to Digital Privacy, First Edition by Lipton, Jacqueline D.
Resistance to the Current: The Dialectics of Hacking by Maxigas, Soderberg, Johan
Principles and Practice of Blockchains by
Securing the Nation's Critical Infrastructures: A Guide for the 2021-2025 Administration by
Blockchain, Artificial Intelligence, and the Internet of Things: Possibilities and Opportunities by
Artificial Intelligence in Cyber Security: Impact and Implications: Security Challenges, Technical and Ethical Issues, Forensic Investigative Challeng by
Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications by Schwenk, Jörg
Challenges in the Iot and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats by
Crypto Currency Trading Tracker: Crypto Book for Everyone nvestory Stock Trading for Your Portofolio by Lowes, Josephine
Winning the National Security AI Competition: A Practical Guide for Government and Industry Leaders by Strickland, Frank, Whitlock, Chris
Managing the Insider Threat: No Dark Corners by Catrantzos, Nick
Managing the Insider Threat: No Dark Corners and the Rising Tide Menace by Catrantzos, Nick
Critical Infrastructure Protection XVI: 16th Ifip Wg 11.10 International Conference, Iccip 2022, Virtual Event, March 14-15, 2022, Revised Selected Pa by
Federated Learning: Fundamentals and Advances by Xu, Jinjin, Zhu, Hangyu, Jin, Yaochu
Cryptography and Network Security by Sampaio de Alencar, Marcelo
What Every Engineer Should Know about Cyber Security and Digital Forensics by Defranco, Joanna F., Maley, Bob
Information Security: 25th International Conference, Isc 2022, Bali, Indonesia, December 18-22, 2022, Proceedings by
What Every Engineer Should Know about Cyber Security and Digital Forensics by Defranco, Joanna F., Maley, Bob
Predictive Data Security Using AI: Insights and Issues of Blockchain, Iot, and Devops by
Information Security and Privacy: 27th Australasian Conference, Acisp 2022, Wollongong, Nsw, Australia, November 28-30, 2022, Proceedings by
Moderne Verfahren Der Kryptographie: Von Rsa Zu Zero-Knowledge Und Darüber Hinaus by Beutelspacher, Albrecht, Schwenk, Jörg, Wolfenstetter, Klaus-Dieter
Catfishing for Science: The Absurdity Behind Online Dating by Anonymous
Evolution of Smart Sensing Ecosystems with Tamper Evident Security by Ramani, Sanjeev Kaushik, Sniatala, Pawel, Iyengar, S. S.
Frontiers in Cyber Security: 5th International Conference, Fcs 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings by
Ethical Hacking: The Complete Beginner's Guide to Learning Ethical Hacking (A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking) by Ybarr, Alice
Handbook of Big Data Analytics and Forensics by
Blockchains: Decentralized and Verifiable Data Systems by Dinh, Tien Tuan Anh, Loghin, Dumitrel, Ruan, Pingcheng
Cloud Computing Fundamentals: Introduction To Microsoft Azure Az-900 Exam by Miller, Richie
Scam!: How to Avoid the Scams That Cost Victims Billions of Dollars Every Year (Large Print) (Large Print Edition) by Oje, Hope
Scam!: How to Avoid the Scams That Cost Victims Billions of Dollars Every Year by Oje, Hope
Azure Cloud Computing Az-900 Exam Study Guide: 4 In 1 Microsoft Azure Cloud Deployment, Security, Privacy & Pricing Concepts by Miller, Richie
Sachkunde Im Bewachungsgewerbe (Ihk) - Übungsbuch: 250 Fragen Mit Antworten Und 10 Übungsfälle Mit Lösungen by Schwarz, Robert
Computer Networking: Beginners Guide to Network Security & Network Troubleshooting Fundamentals by Miller, Richie
Computer Networking: Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals by Miller, Richie
Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid by Enoka, Seth
Losing the Cybersecurity War: And What We Can Do to Stop It by King, Steve
Losing the Cybersecurity War: And What We Can Do to Stop It by King, Steve
Network and System Security: 16th International Conference, Nss 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings by
Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, Space 2022, Jaipur, India, December 9-12, 2022, Proceedings by
Das Buch Satoshis: Die gesammelten Schriften des Bitcoin-Schöpfers by Champagne, Phil
Proofs, Arguments, and Zero-Knowledge by Thaler, Justin
Artificial Intelligence and Cybersecurity: Theory and Applications by
Wireless Penetration Testing: Up and Running: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOS Application Securit by Fiky, Ahmed Hashem El
Data Governance for Dummies by Reichental, Jonathan
Das Standard-Datenschutzmodell (Sdm): Einführung, Hintergründe Und Kontexte Zum Erreichen Der Gewährleistungsziele by Rost, Martin
Blockchain and Trustworthy Systems: 4th International Conference, Blocksys 2022, Chengdu, China, August 4-5, 2022, Revised Selected Papers by
Cyber Security: 19th China Annual Conference, Cncert 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers by
Oxidize eBPF: eBPF programming with Rust by Patil, Vishal
Information Systems Security: 18th International Conference, Iciss 2022, Tirupati, India, December 16-20, 2022, Proceedings by
Risk Analysis, Hazard Mitigation and Safety and Security Engineering XIII by
Internet and Web Application Security by Price, Ron, Harwood, Mike
Cyber Security: The complete guide to cyber threats and protection by Sutton, David
Ai-Enabled 6g Networks and Applications by
Rmf Isso: NIST 800-53 Controls by Brown, Bruce
A Practical Introduction to Security and Risk Management by Newsome, Bruce Oliver
Data Governance Success: Growing and Sustaining Data Governance by Mahanti, Rupa
The Role of Information in U.S. Concepts for Strategic Competition by Vasseur, Michael, Paul, Christopher, Schwille, Michael
Certified Information Security Manager Exam Prep Guide - Second Edition: Gain the confidence to pass the CISM exam using test-oriented study material by Doshi, Hemang
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments by Gunawardana, Kushantha
Cybersecurity and Privacy Law Handbook: A beginner's guide to dealing with privacy and security while keeping hackers at bay by Rocchi, Walter
Digital Forensics and Incident Response - Third Edition: Incident response tools and techniques for effective cyber threat response by Johansen, Gerard
Pocket Guide to Keeping your Kids Safe Online: A Practical and Concise Handbook for Parents by Vaiser, Nathalie
Cyberattaque: plongez au coeur du blackout !: Nouvelle édition augmentée by Vagabulle, Angeline, Renard
Network Behavior Analysis: Measurement, Models, and Applications by Xu, Kuai
Classical and Physical Security of Symmetric Key Cryptographic Algorithms by Baksi, Anubhab
Information Technology Law in South Africa by Merwe, Daniel Van Der
Privacy and Data Protection Law in United Kingdom by Savirimuthu, Joseph, Tzanou, Maria
Information Technology Law in Slovenia by Lutman, Karmen, Zavrsnik, Ales, Sarf, Pika
Information Technology Law in Hong Kong by Zhao, Yun
Set Up Your Own IPsec VPN, OpenVPN and WireGuard Server by Song, Lin
Burners and Black Markets by Henderson, Lance
Cyber Security and Operations Management for Industry 4.0 by
Security Assurance by Efficient Password Based Authentication by Chandok, Amanpreet Kaur
E-Voting Through Biometric Security System by Kumar, Sanjay
Improving the Security and Privacy of Edge Devices Through Blockchain by Leopoldina, Maria
Amazon FBA 2022: Step By Step Beginner Guide On How to Sell On Amazon for Cash, Finding Products and Building a Passive Income by Spike, Josh
The Invisibility Toolkit by Henderson, Lance
Web Services - Icws 2022: 29th International Conference, Held as Part of the Services Conference Federation, Scf 2022, Honolulu, Hi, Usa, Decemb by
Theory of Cryptography: 20th International Conference, Tcc 2022, Chicago, Il, Usa, November 7-10, 2022, Proceedings, Part I by
Theory of Cryptography: 20th International Conference, Tcc 2022, Chicago, Il, Usa, November 7-10, 2022, Proceedings, Part II by
Theory of Cryptography: 20th International Conference, Tcc 2022, Chicago, Il, Usa, November 7-10, 2022, Proceedings, Part III by
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance by Adamson, James, Williams, Branden
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance by Adamson, James, Williams, Branden
Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory by Federico, Giuseppe Di, Barcaroli, Fabrizio
Blockchain - Icbc 2022: 5th International Conference, Held as Part of the Services Conference Federation, Scf 2022, Honolulu, Hi, Usa, Decembe by
Practical Gitops: Infrastructure Management Using Terraform, Aws, and Github Actions by Salecha, Rohit
Internet of Everything: Key Technologies, Practical Applications and Security of Iot by Song, Hang
Small Business Cybersecurity Planning: An Owner's Step-by-Step Guide to Reducing Your Online Risk by Ruder, Robert
Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security by Stiennon, Richard, Forslund, Fredrik, Ernst, Russ B.
The Little Handbook of DFIR: Just some thoughts about Digital Forensics and Incident Response! by Fortuna, Andrea
Multi-Fractal Traffic and Anomaly Detection in Computer Communications by Li, Ming
Internet of Things and Cyber Physical Systems: Security and Forensics by
Emotions Online: Feelings and Affordances of Digital Media by Petersen, Alan
Emotions Online: Feelings and Affordances of Digital Media by Petersen, Alan
Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes by Mueller, John Paul
Java 9.0 to 17.0 Cookbook: A Roadmap with Instructions for the Effective Implementation of Features, Codes, and Programs (English Edition) by Jog, Mandar, Jog, Tejaswini
Intelligent Mobile Malware Detection by Thomas, Tony, John, Teenu, Surendran, Roopak
Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles by Choi, You-Jun, Guijarro, Jordi, Mhiri, Saber