• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2024

Python Programming for Cybersecurity: A Comprehensive Handbook for Beginners by Bytebazzar Publications
"Securing the Cloud: Strategies for Protecting Your Digital Horizon" Navigating the Future Safely: Proven Strategies for Securing Your Digi by Pansuriya, Harsh, Pansuriya P., Harsh Hasmukbhai
Mastering SQL Injection: A Comprehensive Guide to Exploiting and Defending Databases by Martin, Evelyn
CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE - Volume 3: The Incident Commander by Clark, Colby A.
Comptia Security+ Guide to Network Security Fundamentals by Ciampa, Mark
IT Risk Management: Introduction to the main concepts and processes of IT Risk Management by Zuccari, Fabrizio
The Cybersecurity Spiral of Failure (and How to Break Out of It): Why large firms still struggle with cybersecurity and how to engineer real change dy by Gaillard, Jean-Christophe
Malware Reverse Engineering: Cracking The Code by Botwright, Rob
SSRF Exposed: Understanding and Preventing Attacks by Meyer, Christoph
Access Control and Security Monitoring of Multimedia Information Processing and Transmission by
Darknet: Expert Guide to Online Anonymity and Digital Secrecy by Knight, Ryan
Strategic Cybersecurity Mastery: Crafting a Resilient Defense: Building, Managing, and Excelling in the Modern Cyber Threat Landscape by Vo, Kong
Handbook of Face Recognition by
Mobile Application Development: Practice and Experience: 12th Industry Symposium in Conjunction with 18th Icdcit 2022 by
Critical Infrastructure Protection XVII: 17th Ifip Wg 11.10 International Conference, Iccip 2023, Arlington, Va, Usa, March 13-14, 2023, Revised Selec by
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in Us and UK National Cybersecurity by Montasari, Reza
Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research by Mannheimer, Sara
Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security by Botwright, Rob
Symmetric Cryptography, Volume 1: Design and Security Proofs by
Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions by
Emerging Information Security and Applications: 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings by
Frontiers in Cyber Security: 6th International Conference, Fcs 2023, Chengdu, China, August 21-23, 2023, Revised Selected Papers by
Das Ddr-Chiffriergerät T-310: Kryptographie Und Geschichte by Killmann, Wolfgang, Stephan, Winfried
Privacy Symposium 2023: Data Protection Law International Convergence and Compliance with Innovative Technologies (Dplicit) by
Collaborative Approaches for Cyber Security in Cyber-Physical Systems by
Cybersecurity for Modern Smart Grid Against Emerging Threats by Roomi, Muhammad M., Mashima, Daisuke, Chen, Yao
OSINT Cracking Tools: Maltego, Shodan, Aircrack-Ng, Recon-Ng by Botwright, Rob
Ccsp for Dummies: Book + 2 Practice Tests + 100 Flashcards Online by Deane, Arthur J.
Cyber Security Blueprint: Your Definitive Guide to Launching a Successful Career by Shaik, Afrin
Cognitive Computing - ICCC 2023: 7th International Conference Held as Part of the Services Conference Federation, Scf 2023 Shenzhen, China, December 1 by
Security, Privacy, and Applied Cryptography Engineering: 13th International Conference, Space 2023, Roorkee, India, December 14-17, 2023, Proceedings by
Defense In Depth: Network Security And Cyber Resilience by Botwright, Rob
Searchable Encryption: From Concepts to Systems by Wang, Cong, Ren, Kui
OSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre by Botwright, Rob
Ultimate Splunk for Cybersecurity by Sinha, Jit
Mastering Active Directory Attacks: Exploitation and Defense by Álvarez, Gabriel
Social Media Monetization Handbook: Leveraging Your Online Presence to Turn Likes and Followers into Income by Robson, Carl
Kali Linux CLI Boss: Novice To Command Line Maestro by Botwright, Rob
Becoming a Computational Thinker: Success in the Digital Age by Wang, Paul S.
Azure Security by Magusic, Bojan
Becoming a Computational Thinker: Success in the Digital Age by Wang, Paul S.
Building a Cyber Risk Management Program: Evolving Security for the Digital Age by Bapst, Brandon, Hicks, Terry Allan, Allen, Brian
Artificial Intelligence Ethics and International Law -: Practical Approaches to AI Governance by Abhivardhan
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data by Lee, Micah
Ethisches Hacken: Ein umfassendes Einsteigerbuch Leitfaden zum Erlernen der effektiven Strategien des ethischen Hackings by Lewis, Elijah
Mastering Web Application Penetration Testing: Techniques and Strategies by Delgado, Tomás
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Information Security Applications: 24th International Conference, Wisa 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers by
Continuous Biometric Authentication Systems: An Overview by Smith-Creasey, Max
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends by Kaur, Gurdip, Habibi Lashkari, Arash, Sharafaldin, Iman
Wireless Hacking Demystified: The Ultimate Penetration Testing Handbook by Fernándezea, Nicolás
Comptia Security+ Certification Kit: Exam Sy0-701 by Seidl, David, Chapple, Mike
Privacy-Preserving Computing: For Big Data Analytics and AI by Chen, Kai, Yang, Qiang
OWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks by Botwright, Rob
Comptia Security+ Practice Tests: Exam Sy0-701 by Seidl, David
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Online Traffic & Advertisements: Take Off Online by Mawking, Philippa
Mastering the Art of Social Engineering Penetration Testing by Reyes, Juan
Uncovering the Universe of Fundamental Classified Associations (Vpns): Investigating the Modernized Space Safely and Subtly by James, Qasi
Fortify and Shield: Security and Protection in Operating Systems: "Fortify and Shield: Elevating Security Standards for Robust Protection by Pansuriya, Harsh, Pansuriya P., Harsh Hasmukbhai
Cryptocoding Based on Quasigroups by Popovska-Mitrovikj, Aleksandra, Bakeva, Verica, Mechkaroska, Daniela
Mastering IoT Penetration Testing: A Comprehensive Guide by Sánchezes, Felipez
Mastering Mobile App Penetration Testing: A Comprehensive Guide by Vásquez, Lorenzo
PCI DSS Bootcamp The A-Z Information Security Guide by Publications, Book Wave
Crypto Champions: How DePINs are Building a Greener, Fairer World with Blockchain by Thompson, Lindsay M.
OSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith by Botwright, Rob
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition) by Sharma, Manish
Neon Reckoning: Shadows of Truth by Grigorovich, Liza, Bonari, Roman
Guardians of the Net: Guardians of the Net: A Complete Guide to Cybersecurity by Beatto, Sabat
Pentesting 101: Cracking Gadgets And Hacking Software by Botwright, Rob
Cyber Security for Next-Generation Computing Technologies by
Mastering Red Team Penetration Testing: Techniques and Tactics by Contreras, Iyad
Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms by
Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms by
Information Security Planning: A Practical Approach by Lincke, Susan
Identifying and Mitigating the Security Risks of Generative AI by Boyd, Brad, Bursztein, Elie, Barrett, Clark
The Black Box Hacker's Toolkit: Techniques for Successful Pen Testing by Reyes, Mikha'il
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses by Montasari, Reza
Internet of Things - Iciot 2023: 8th International Conference, Held as Part of the Services Conference Federation, Scf 2023, Shenzhen, China, December by
Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus by Flores-Flores, Juan Pablo, Martínez-Guerra, Rafael, Montesinos-García, Juan Javier
Security in Smart Home Networks by Shen, Meng, Yan, Zhu, Haojin
Navigating Cybersecurity: Defending Against Cyber Threats: Strategies for a Secure Online Environment by Larson, Olivia
Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices by Taylor, Andrew
Oracle Linux Cookbook: Embrace Oracle Linux and master Linux Server management by Thomsen, Erik B., Spindel, Jonathan, Benner, Erik
Advanced OSINT Strategies: Online Investigations And Intelligence Gathering by Botwright, Rob
Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark by Botwright, Rob
Guide to Computer Network Security by Kizza, Joseph Migga
Mastering Gray Box Penetration Testing: Balancing Knowledge and Discovery by Mendez, Aakif
Innovative Security Solutions for Information Technology and Communications: 16th International Conference, Secitc 2023, Bucharest, Romania, November by
The Nmap Handbook: A Deep Dive into Network Mapping and Scanning by Benowitz, Zachary
NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library by Botwright, Rob
Enhancing Performance, Efficiency, and Security Through Complex Systems Control by
Enhancing Performance, Efficiency, and Security Through Complex Systems Control by
Ethisches Hacken: Fortschrittliche und wirksame Maßnahmen des ethischen Hackings by Adler, Helene
Comprehensive Cybersecurity Handbook for Novice Readers: Introduction to Cybersecurity by Vatchinsky, Krasimir
Mastering Nessus: A Comprehensive Guide to Cybersecurity Assessment by Arenson, Avyaan
Trojan Exposed: Cyber Defense And Security Protocols For Malware Eradication by Botwright, Rob
Cyber Wise: An Insight into the World of Cyber Security by Allure, R.
Click and Connect: The Power of Digital Relationship Building by Sreekumar, V. T.
Secure Horizons An Introduction to Cybersecurity: Safeguarding the Digital Realm: A Comprehensive Guide to Cybersecurity by Pansuriya P., Harsh Hasmukbhai, Pansuriya, Pansuriya
Mastering Metasploit: A Comprehensive Guide to Cybersecurity Penetration Testing by Aronowitz, Zusman
Infinite Possibilities: A Guide to Manifesting Your Dreams by Sreekumar, V. T.
Futuristic e-Governance Security With Deep Learning Applications by
Futuristic e-Governance Security With Deep Learning Applications by
Cybersecurity Risks and Controls: Fundamentals of Organizational Cybersecurity by Messenger
Cybersecurity Risks and Controls: Fundamentals of Organizational Cybersecurity by Messenger
Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage by Chaput, Bob
Dora: A Guide to the EU Digital Operational Resilience ACT by
Weaponizing Cyberspace: Inside Russia's Hostile Activities by Sambaluk, Nicholas Michael
Mastering OpenVAS: A Comprehensive Guide to Cybersecurity Vulnerability Assessment by Hershkowitz, Yaakov
Unveiling the Core: A Comprehensive Guide to Operating System Design and Implementation: Unveiling the Core: A Comprehensive Journey into by Pansuriya P., Harsh Hasmukbhai
Hіddеn AI Guіdе fоr Bеgіnnеrѕ: AI uѕеѕ techniques from рrоbа by Lee, Billy
Advanced Smart Computing Technologies in Cybersecurity and Forensics by
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS by Duplys, Paul, Schmitz, Roland
The Software Developer's Guide to Linux: A practical, no-nonsense guide to using the Linux command line and utilities as a software developer by Sturm, Christian, Cohen, David
Cybersecurity tales: Cyber risk, what it is and how to manage it by Fausti, Marcello
Conquiste sua vaga em segurança da informação by Sobiecki, Fabio
Deterrence in the 21st Century: Statecraft in the Information Age by
Global Digital Data Governance: Polycentric Perspectives by
Global Digital Data Governance: Polycentric Perspectives by
Mastering Cybersecurity Ethics: Mastering Cybersecurity and Ethical Hacking: Defense and Offense in the Digital World by Conrad, Julian
Deterrence in the 21st Century: Statecraft in the Information Age by
Azure Penetration Testing: Advanced Strategies For Cloud Security by Botwright, Rob
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques by Nomani, Qamar
Anti-Spam Techniques Based on Artificial Immune System by Tan, Ying
Touchless Fingerprint Biometrics by Labati, Ruggero Donida, Piuri, Vincenzo, Scotti, Fabio
Multilevel Modeling of Secure Systems in Qop-ML by Księżopolski, Bogdan
Kubernetes Secrets Handbook: Design, implement, and maintain production-grade Kubernetes Secrets management solutions by Adams, Rom, Gkatziouras, Emmanouil, XI, Chen
Internet of Things - New Insights by
Ultimate Cyberwarfare for Evasive Cyber Tactics by Tan, Chang
Car Hacking Playbook: Revving Up Cyber Defense by Dworsky, Hannah
Triangle Mesh Watermarking and Steganography by Chen, Kejiang, Ma, Zehua, Zhou, Hang
Improving Security, Privacy, and Trust in Cloud Computing by
Cybersecurity Fundamentals Explained by MacKay, Brian
Artificial Intelligence Security and Privacy: First International Conference on Artificial Intelligence Security and Privacy, Ais&p 2023, Guangzhou, C by
Artificial Intelligence Security and Privacy: First International Conference on Artificial Intelligence Security and Privacy, Ais&p 2023, Guangzhou, C by
Red Team Blue Team: A White Hacking Reference by Kathy, Black Hat
Cybersecurity for Everyone by Franklin, Edward
Zero Trust Security Demystified: Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient N by Knowings, L. D.
Zero Trust Security Demystified: Your Roadmap to a Resilient Network and Unparalleled Data Protection by Knowings, L. D.
Kali Linux, Ethical Hacking And Pen Testing For Beginners by Bharat Nishad
Mastering Windows Security: Unveiling Hacking Techniques and Penetration Strategies by Bleich, Eden
NFT Masterclass: Exploring the Digital Future in Art, Investments, and Creativity. by Digitalis, Lex
Social Sector - Check What Awaits You by Gorsky, Patrick
CompTIA Cloud+ (Plus) Certification Practice Questions, Answers and Master the Exam by Mills, Jake T.
X86 Software Reverse-Engineering, Cracking, and Counter-Measures by Domas, Stephanie, Domas, Christopher
The IT Auditor's Playbook: Expert Guidance for Auditing & Consulting in the Digital Era by Cohan, Ofek
Fusion of Machine Learning Paradigms: Theory and Applications by
Legal Developments on Cybersecurity and Related Fields by
Evolution of Cross-Sector Cyber Intelligent Markets by
Decoding Threat Intelligence: Unveiling Cybersecurity's Hidden Patterns by Damrosch, Tuvya
Cybersecurity for Everyone (Hardcover Edition) by Franklin, Edward
Under Pressure: Empowering Cyber Security Incident Responders by Phair, Nigel
Cyber Security Risk Management Essentials: Safeguarding in the Digital Era by Ehrlich, Yonah
Crypto Fundamentals: Unlocking the world of cryptocurrencies: essential concepts and strategies by Stone, Aiden
Defending APIs: Uncover advanced defense techniques to craft secure application programming interfaces by Domoney, Colin
Power Systems Cybersecurity: Methods, Concepts, and Best Practices by
NIST Cloud Security: Cyber Threats, Policies, And Best Practices by Botwright, Rob
AI Powered Data Privacy & Data Protection For Small Businesses by Arefin, Sabira
AI and the Battlefield: Friend or Foe? by Woldemariam, Abebe-Bard Ai
Cyber Wargaming: Research and Education for Security in a Dangerous Digital World by
Cyber Wargaming: Research and Education for Security in a Dangerous Digital World by
Privacy Computing: Theory and Technology by Li, Fenghua, Li, Hui, Niu, Ben
Proceedings of Fifth International Conference on Computer and Communication Technologies: Ic3t 2023, Volume 1 by
Emerging Technologies and Security in Cloud Computing by
Cybersecurity Measures for Logistics Industry Framework by
Cybersecurity Measures for Logistics Industry Framework by
Strengthening Industrial Cybersecurity to Protect Business Intelligence by
Emerging Technologies and Security in Cloud Computing by
Digital Transformation in African SMEs: Emerging Issues and Trends by
Unter dem Radar: Ausgewählte Artikel und Interviews zu Datenschutz, Informationstechnologie, Netzpolitik und Hacking (PB) by
Trading in Local Energy Markets and Energy Communities: Concepts, Structures and Technologies by
Content Distribution for Mobile Internet: A Cloud-Based Approach by Li, Zhenhua, Dai, Yafei, Chen, Guihai
Crypto Wealth Navigation: Cryptocurrency investment fundamentals: building wealth in the digital age by Wells, Alexander
Introduction to SBOM and VEX: Software Bill of Materials and Vulnerability Exploitability Exchange by Alrich, Tom
Dawn of Distrust: Technological Threads Weaving a Trustless Society by Maxwell J Aromano
Facial Recognition in Airports: The Rise of Facial Recognition in Air Travel by Wilson, David
Being Less "Hackable": for Seniors and "Non-Techies" by Johnson, Brenda Lynn
Hidden Traps of the Internet: Building and Protecting Your Online Platform by Mohr, Judy L.
Survival in a Silicon Dawn: Navigating a Hostile A.I. World Takeover by Intelligence, Artificial
Selected Areas in Cryptography - Sac 2023: 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers by
Debugging Playbook: System Testing, Error Localization, And Vulnerability Remediation by Botwright, Rob
Building a Cyber Risk Management Program: Evolving Security for the Digital Age by Allen, Brian, Hicks, Terry Allan, Bapst, Brandon
The Language of Deception: Weaponizing Next Generation AI by Hutchens, Justin
The Language of Deception: Weaponizing Next Generation AI by Hutchens, Justin
Advanced Techniques of Artificial Intelligence in It Security Systems by Korytkowski, Marcin
Building a Cyber Risk Management Program: Evolving Security for the Digital Age by Allen, Brian, Hicks, Terry Allan, Bapst, Brandon
Bent Functions and Permutation Methods: Binary and Multiple-Valued Bent Functions by Stankovic, Milena, Stankovic, Radomir S., Moraga, Claudio
Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware by Tobias, Marc Weber
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Grimes, Roger A.
See Yourself in Cyber: Security Careers Beyond Hacking by Adams, Ed
The GPT-4 Crypto Revolution: Pioneering Profit in a Digital Age by Wilder, Zane
Building Cybersecurity Applications with Blockchain and Smart Contracts by
Multimedia Watermarking: Latest Developments and Trends by
Decision Making and Security Risk Management for Iot Environments by
Blockchain Beyond Bitcoin: A deep dive into the emerging technologies and innovations that are powered by blockchain such as smart contracts dece by Franklin, Edward
Boost Your Business with Instagram: Expert Techniques to Increase Leads, Sales and Revenue with an Optimized Instagram Presence by Robson, Carl
Trustworthy AI: From Theory to Practice by Catak, Ferhat Ozgur, Kuzlu, Murat
See More