• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2023

Progress in Cryptology - Indocrypt 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings by
The Security & Privacy Acceptance Framework (Spaf) by Das, Sauvik, Faklaris, Cori, Hong, Jason I.
Criptología Digital (Digital Cryptology) by Thomas, Rachael L.
Disconnect: Why We Get Pushed to Extremes Online and How to Stop It by Guiao, Jordan
Security Awareness: Applying Practical Cybersecurity in Your World by Ciampa, Mark
Datenschutz: Einführung in Technischen Datenschutz, Datenschutzrecht Und Angewandte Kryptographie by Petrlic, Ronald, Sorge, Christoph, Ziebarth, Wolfgang
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in Us and UK National Cybersecurity by Montasari, Reza
Secure It Systems: 27th Nordic Conference, Nordsec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings by
Cryptography, Codes and Cyber Security: First International Conference, I4cs 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings by
Mobile Health Applications: Rechtliche Rahmenbedingungen Von Gesundheits-Apps by Reitebuch, Lukas
Internet of Things - Iciot 2022: 7th International Conference, Held as Part of the Services Conference Federation, Scf 2022, Honolulu, Hi, Usa, Decemb by
Algorithmic Bias: Verzerrungen Durch Algorithmen Verstehen Und Verhindern: Ein Leitfaden Für Entscheider Und Data Scientists by Bär, Tobias
Geprüfte Schutz- Und Sicherheitskraft (Ihk): Lehrbuch Für Prüfung Und PRAXIS by Schwarz, Robert
Sachkunde Im Bewachungsgewerbe (Ihk): Lehrbuch Für Prüfung Und PRAXIS by Schwarz, Robert
Science of Cyber Security - Scisec 2022 Workshops: Ai-Cryptosec, Ta-Bc-Nft, and Mathsci-Qsafe 2022, Matsue, Japan, August 10-12, 2022, Revised Selecte by
Mobile Application Development: Practice and Experience: 12th Industry Symposium in Conjunction with 18th Icdcit 2022 by
Cybersecurity - Data Protection and Strategies: First Edition by Palmer, Wesley
Collaborative Approaches for Cyber Security in Cyber-Physical Systems by
Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications by
Cybersecurity - Data Protection and Strategies: First Edition by Palmer, Wesley
Emerging Information Security and Applications: Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings by
Space Rogue: How the Hackers Known as L0pht Changed the World by Thomas, Cris
Space Rogue: How the Hackers Known as L0pht Changed the World by Thomas, Cris
Securing Delay-Tolerant Networks with Bpsec by Birrane, Edward J., Heiner, Sarah, McKeever, Ken
Searchable Encryption: From Concepts to Systems by Ren, Kui, Wang, Cong
Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment by Miller, Richie
Cybersecurity Design Principles: Building Secure Resilient Architecture by Miller, Richie
CISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance by Miller, Richie
CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance by Miller, Richie
Cissp: Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans by Miller, Richie
Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies by Natwick, Dwayne
Archives and Records: Privacy, Personality Rights, and Access by Čtvrtník, Mikulás
Archives and Records: Privacy, Personality Rights, and Access by Čtvrtník, Mikulás
Critical Infrastructure Protection XV: 15th Ifip Wg 11.10 International Conference, Iccip 2021, Virtual Event, March 15-16, 2021, Revised Selected Pap by
Protecting Privacy Through Homomorphic Encryption by
Preference-Based Spatial Co-Location Pattern Mining by Zhou, Lihua, Wang, Lizhen, Fang, Yuan
Connecting the Internet of Things: Iot Connectivity Standards and Solutions by Chun, Anthony, Kumar, Anil, Hussain, Jafer
Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control by
Security and Organization within IoT and Smart Cities by
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World by Foltz, Kevin E., Simpson, William R., Institute for Defense Analyses
Routledge Companion to Global Cyber-Security Strategy by
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends by Sharafaldin, Iman, Kaur, Gurdip, Habibi Lashkari, Arash
Securing Kubernetes Secrets by Block, Andrew, Bueno, Alex
Asymmetric Cryptography: Primitives and Protocols by Pointcheval, David
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks by Ali, Ikram, Chen, Yong, Faisal, Mohammad
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Cambric, Shinesa, Ratemo, Michael
Machine Learning for Cyber Security: 4th International Conference, Ml4cs 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I by
Machine Learning for Cyber Security: 4th International Conference, Ml4cs 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part II by
Machine Learning for Cyber Security: 4th International Conference, Ml4cs 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part III by
Cybersecurity Jobs: Resume Marketing by Brown, Bruce
Cybersecurity Jobs & Career Paths by Brown, Bruce
量子通信之殇: 量子通信工程化失败的原因&#21 by Xu, Lingyu
Analysis of the BEM Code of Professional Guidelines by Hezam, Bandar
Cybersecurity Essentials Made Easy: A No-Nonsense Guide to Cyber Security For Beginners by Paula, Daniel
Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus by Martínez-Guerra, Rafael, Montesinos-García, Juan Javier, Flores-Flores, Juan Pablo
Security in Smart Home Networks by Meng, Yan, Zhu, Haojin, Shen
Digitale Kompetenz: Grundlagen Der Künstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing Und Deren Anwendungen Für Die Digita by Lang, Volker
The Compliance Formula by Cybersecurity Experts, Leading
Silicon Valley Cybersecurity Conference: Third Conference, Svcc 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers by
Information Technology Law in Australia by Cho, George
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio by Hardt, Robert, Pandit, Parth
Handbook of Research on Current Trends in Cybersecurity and Educational Technology by
Fraud Prevention, Confidentiality, and Data Security for Modern Businesses by
Fraud Prevention, Confidentiality, and Data Security for Modern Businesses by
Cryptoeconomics: Igniting a New Era of Blockchain by Gong, Jian, Xu, Wei
Learn AAVE DeFi Protocol: 100+ Coding Q&A by Cakal, Yasin Hasan
Combinatorics and Number Theory of Counting Sequences by Mezo, Istvan
Acquiring Card Payments by Dubinsky, Ilya
Introduction to Coding Theory by Bierbrauer, Jurgen
Secrets of a Cyber Security Architect by Schoenfield, Brook S. E.
Secure, Resilient, and Agile Software Development by Merkow, Mark
Cryptography: Theory and Practice by Paterson, Maura, Stinson, Douglas Robert
Cryptology: Classical and Modern by Klima, Richard, Klima, Richard E., Sigmon, Neil
An Introduction to Number Theory with Cryptography by Kraft, James, Washington, Lawrence
Cbap(r) Certification and Babok(r) Study Guide by Jonasson, Hans
Windows 11 Datenschutzfibel: Alle Datenschutzeinstellungen finden und optimal einstellen by Gieseke, Wolfram
Compliance Made Easy by Cybersecurity Experts, Leading
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls That Derail Us by Metcalf, Leigh, Dykstra, Josiah, Spafford, Eugene
Así Es Como Me Dicen Que Acabará El Mundo by Perlroth, Nicole
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Computer Performance Engineering: 18th European Workshop, Epew 2022, Santa Pola, Spain, September 21-23, 2022, Proceedings by
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats to your organization by Rains, Tim
Quantum Computers: A Complete Guide to Explain in Easy Way(Mathematical Principle and Transition to the Classical Discrete) by Price, Carlos
Application Security Program Handbook by Fisher, Derek
Blockchain Beginners: Smart Contracts: A Simple Overview and Guide To Smart Contracts by Lab, Nan00t's
Machine Learning for Cyber Agents: Attack and Defence by Abaimov, Stanislav, Martellini, Maurizio
Digital Forensics and Watermarking: 21st International Workshop, Iwdw 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers by
Smart Card Research and Advanced Applications: 21st International Conference, Cardis 2022, Birmingham, Uk, November 7-9, 2022, Revised Selected Papers by
Trends and Future Directions in Security and Emergency Management by
Social Networking Sites, Body Image and Wellbeing: The Roles of Social by Walker, Mary
Der Persoenlichkeitsschutz im Internet im europaeischen, deutschen und rumaenischen Recht - Bestandsaufnahme, Kritik und Zukunftsperspektiven in recht by Sammel, Denisa-Lavinia
Social Engineering and Digital Defense Survival Guide for the Everyday Person: Tools & Tactics to Protect Your Privacy and Identity from Cybercriminal by Danielson, Henry, Baker, James J.
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Netzwerk- Und Datensicherheit: Eine Praktische Einführung by Kappes, Martin
Emerging Technologies for Authorization and Authentication: 5th International Workshop, Etaa 2022, Copenhagen, Denmark, September 30, 2022, Revised Se by
Cyber Security: How to Protect Your Business by Himilsbach, Sven
Handbuch Unternehmenssicherheit: Umfassendes Sicherheits-, Kontinuitäts- Und Risikomanagement Mit System by Müller, Klaus-Rainer
Triangle Mesh Watermarking and Steganography by Zhou, Hang, Chen, Kejiang, Ma, Zehua
Hacking With Kali Linux: The Complete Beginner's Guide about Kali Linux for Beginners (Step by Step Guide to Learn Kali Linux for Hackers) by Lee, Michael
Nordic Artificial Intelligence Research and Development: 4th Symposium of the Norwegian AI Society, Nais 2022, Oslo, Norway, May 31 - June 1, 2022, Re by
Privacy and Safety in Online Learning by
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime by Nearchou, Nearchos
Basics on Public Key Infrastructure (PKI) by Scholtens, A.
Security and Privacy in Communication Networks: 18th Eai International Conference, Securecomm 2022, Virtual Event, October 2022, Proceedings by
Information Security Applications: 23rd International Conference, Wisa 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers by
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies by Parker, Carey
Access Control Models and Architectures for Iot and Cyber Physical Systems by Bhatt, Smriti, Alshehri, Asma Hassan, Gupta, Maanak
Medical Information Processing and Security: Techniques and Applications by
Fusion of Machine Learning Paradigms: Theory and Applications by
Iapp Cipm Certified Information Privacy Manager Study Guide by Chapple, Mike, Shelley, Joe
Security as Code: Devsecops Patterns with AWS by Das, Bk Sarthak, Chu, Virginia
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back by Schneier, Bruce
Sicherheit am PC und im Internet: Cyberangriffe erkennen und sich schützen by B, Mark
Threats: What Every Engineer Should Learn from Star Wars by Shostack, Adam
Cybersecurity All-In-One for Dummies by Winkler, Ira, Beaver, Kevin, Steinberg, Joseph
Power Systems Cybersecurity: Methods, Concepts, and Best Practices by
Decision and Game Theory for Security: 13th International Conference, Gamesec 2022, Pittsburgh, Pa, Usa, October 26-28, 2022, Proceedings by
The 10 Most Famous Hacks in History (Hardcover Edition) by Kathy, Black Hat
Digital Blood on Their Hands: The Ukraine Cyberwar Attacks by Jenkinson, Andrew
Digital Blood on Their Hands: The Ukraine Cyberwar Attacks by Jenkinson, Andrew
Linux Essentials for Hackers & Pentesters: Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Commands by Advocate Team, Linux
Software Security: Concepts & Practices by Kumar, Rajeev, Ahmad Khan, Raees, Ahmad Khan, Suhel
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures by Windley, Phillip
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom by Shoemaker, Daniel, Sigler, Ken, Shoemaker, Tamara
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom by Shoemaker, Daniel, Sigler, Ken, Shoemaker, Tamara
Content Distribution for Mobile Internet: A Cloud-Based Approach by Li, Zhenhua, Dai, Yafei, Chen, Guihai
Advanced Communication and Intelligent Systems: First International Conference, Icacis 2022, Virtual Event, October 20-21, 2022, Revised Selected Pape by
Trading in Local Energy Markets and Energy Communities: Concepts, Structures and Technologies by
Ubiquitous Security: Second International Conference, Ubisec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers by
Blockchain for Everyone: A Guide for Absolute Newbies by Herrmann, Noah
Metaverse Investing: The Ultimate Guide by Herrmann, Noah
Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization by Sehgal, Kunal, Thymianis, Nikolaos
Crypto Investing Guide: The Ultimate Safe and Secure Guide by Herrmann, Noah
Monitoring and Protection of Critical Infrastructure by Unmanned Systems by
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities by Strout, Benjamin
Computer Security. Esorics 2022 International Workshops: Cybericps 2022, Secpre 2022, Spose 2022, Cps4cip 2022, Cdt&secomane 2022, Eis 2022, and Secas by
Privacy, Security and Forensics in the Internet of Things (Iot) by
Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers by
A Proactive Network Surveillance Framework by Singh, Maninder
IT-Sicherheit by Eckert, Claudia
Certified Information Security Manager Cism Study Guide by Cism
Certified Information Security Manager Cism Study Guide by Cism
International Conference on Cyber Security, Privacy and Networking (Icspn 2022) by
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Perlroth, Nicole
Privacy in the Digital Age: Digital Communication and Personal Data by
Sicheres Homeoffice: Herausforderungen nachhaltiger Sicherheit by Penner, Marco, Karunakumar, Saghana, Keuntje, Jörg-Michael
Rust for Network Programming and Automation: Learn to Design and Automate Networks, Performance Optimization, and Packet Analysis with low-level Rust by Anderson, Brian
Employee-Centric It: Advancing the Digital Era Through Extraordinary It Experience by Ghibril, Mark
Data Privacy Management, Cryptocurrencies and Blockchain Technology: Esorics 2022 International Workshops, Dpm 2022 and CBT 2022, Copenhagen, Denmark, by
Information Retrieval and Natural Language Processing: A Graph Theory Approach by Ghotkar, Archana S., Sonawane, Sheetal S., Mahalle, Parikshit N.
Applications of Encryption and Watermarking for Information Security by
Applications of Encryption and Watermarking for Information Security by
Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program by Brown, Jason
Secure Multimodal Biometric Authentication System Involving Ear, Fingerprint and Voice Recognition in Cloud Computing by Parimala, R.
Parent Handbook for Online Safety: Practical Ideas, Activities, & Information for Your Family by Miller, Dana L. C.
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back by Schneier, Bruce
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide 9th Edition: 9th Edition by Stewart, James Michael, Gibson, Darril, Chapple, Mike
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks by Tevault, Donald a.
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks by Tevault, Donald a.
Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program by Tang, Alan
Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program by Tang, Alan
Personal Security Data in an Increasingly Digital World by Mardon, Austin, Aldada, Suhaib, Cara, Julia
Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level by Huijbregts, Paul, Anich, Joe, Graves, Justen
Technological Trends in the AI Economy: International Review and Ways of Adaptation by
Adversarial Machine Learning: Attack Surfaces, Defence Mechanisms, Learning Theories in Artificial Intelligence by Yang, Xinghao, Liu, Bo, Sreevallabh Chivukula, Aneesh
Cybersecurity for Main Street: Cyber Fit in 21 Days by Westerheim, Ann
Blockchain for Real World Applications by Garg, Rishabh
Transformations Through Blockchain Technology: The New Digital Revolution by
Cyber Deception: Techniques, Strategies, and Human Aspects by
Windows APT Warfare: Identify and prevent Windows APT attacks effectively by Ma, Sheng-Hao
Passive and Active Measurement: 24th International Conference, Pam 2023, Virtual Event, March 21-23, 2023, Proceedings by
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs by Torres, Nestor N., Almoailu, Ahmed, Soper, Ryan
Behavior-based Authentication to Protect System Services From Malicious Attacks by Muthumanickam, K.
Behavioral Game Theory Analysis of Cybersecurity With Deception and Ids by Aggarwal, Palvi
Security and Privacy in Federated Learning by Yu, Shui, Cui, Lei
Recent Innovations in Computing: Proceedings of Icric 2021, Volume 1 by
Personality and Data Protection Rights on the Internet: Brazilian and German Approaches by
Hardening Windows 11 by Nomer Cissp, Russell D.
Mastering Go Network Automation: Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter by Taylor, Ian
Mastering C++ Network Automation: Run Automation across Configuration Management, Container Orchestration, Kubernetes, and Cloud Networking by Barbara, Justin
The Phantom CISO: Time to step out of the shadow by Khan, Mishaal, Zahid, Hisham
The Technology Doesn't Matter: Prioritizing the People in It Business Alignment by Lockett, Rachel
A-Z Password Book: Individual Letter Tabs to Quickly Access Login Information by Zeitgeist
The Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness by Lapointe, Lise
The Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness by Lapointe, Lise
Cost Estimating Framework for U.S. Marine Corps Joint Cyber Weapons by McKernan, Megan, Wilson, Bradley, Goughnour, Thomas
PKI Implementation and Infrastructures by Ashbourn, Julian
PKI Implementation and Infrastructures by Ashbourn, Julian
Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems: Iccces 2022 by
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family by Payton, Theresa, Claypoole, Ted
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender by Sandbu, Marius
The Book on Testing: For a World that Runs on Software by Rodov, Alex
Privacy and Data Protection in Law Israel by Rachum-Twaig, Omri, Birnhack, Michael
Privacy and Data Protection Law in Brazil by Pinheiro, Patricia Peck
Never Be Scammed Again: Knowing the Psychology of Scams, Becoming Cybersmart, Discovering Simple Strategies to outsmart today's Con Artists, a by Udeh, Prosper
Information Technology Law in India by Fatima, Talat
Threats: What Every Engineer Should Learn from Star Wars by Shostack, Adam
Threats: What Every Engineer Should Learn from Star Wars by Shostack, Adam
See More