• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2024

CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE - Volume 3: The Incident Commander by Clark, Colby A.
Comptia Security+ Guide to Network Security Fundamentals by Ciampa, Mark
IT Risk Management: Introduction to the main concepts and processes of IT Risk Management by Zuccari, Fabrizio
Access Control and Security Monitoring of Multimedia Information Processing and Transmission by
Malware Reverse Engineering: Cracking The Code by Botwright, Rob
The Cybersecurity Spiral of Failure (and How to Break Out of It): Why large firms still struggle with cybersecurity and how to engineer real change dy by Gaillard, Jean-Christophe
Darknet: Expert Guide to Online Anonymity and Digital Secrecy by Knight, Ryan
Strategic Cybersecurity Mastery: Crafting a Resilient Defense: Building, Managing, and Excelling in the Modern Cyber Threat Landscape by Vo, Kong
Handbook of Face Recognition by
Mobile Application Development: Practice and Experience: 12th Industry Symposium in Conjunction with 18th Icdcit 2022 by
Critical Infrastructure Protection XVII: 17th Ifip Wg 11.10 International Conference, Iccip 2023, Arlington, Va, Usa, March 13-14, 2023, Revised Selec by
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in Us and UK National Cybersecurity by Montasari, Reza
Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research by Mannheimer, Sara
Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security by Botwright, Rob
Cybersecurity for Modern Smart Grid Against Emerging Threats by Chen, Yao, Roomi, Muhammad M., Mashima, Daisuke
Symmetric Cryptography, Volume 1: Design and Security Proofs by
Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions by
Emerging Information Security and Applications: 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings by
Frontiers in Cyber Security: 6th International Conference, Fcs 2023, Chengdu, China, August 21-23, 2023, Revised Selected Papers by
Das Ddr-Chiffriergerät T-310: Kryptographie Und Geschichte by Killmann, Wolfgang, Stephan, Winfried
Privacy Symposium 2023: Data Protection Law International Convergence and Compliance with Innovative Technologies (Dplicit) by
Collaborative Approaches for Cyber Security in Cyber-Physical Systems by
Ccsp for Dummies: Book + 2 Practice Tests + 100 Flashcards Online by Deane, Arthur J.
OSINT Cracking Tools: Maltego, Shodan, Aircrack-Ng, Recon-Ng by Botwright, Rob
Cyber Security Blueprint: Your Definitive Guide to Launching a Successful Career by Shaik, Afrin
Cognitive Computing - ICCC 2023: 7th International Conference Held as Part of the Services Conference Federation, Scf 2023 Shenzhen, China, December 1 by
Security, Privacy, and Applied Cryptography Engineering: 13th International Conference, Space 2023, Roorkee, India, December 14-17, 2023, Proceedings by
Defense In Depth: Network Security And Cyber Resilience by Botwright, Rob
Ultimate Splunk for Cybersecurity by Sinha, Jit
Searchable Encryption: From Concepts to Systems by Ren, Kui, Wang, Cong
OSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre by Botwright, Rob
Mastering Active Directory Attacks: Exploitation and Defense by Álvarez, Gabriel
Social Media Monetization Handbook: Leveraging Your Online Presence to Turn Likes and Followers into Income by Robson, Carl
Kali Linux CLI Boss: Novice To Command Line Maestro by Botwright, Rob
Becoming a Computational Thinker: Success in the Digital Age by Wang, Paul S.
Becoming a Computational Thinker: Success in the Digital Age by Wang, Paul S.
Azure Security by Magusic, Bojan
Building a Cyber Risk Management Program: Evolving Security for the Digital Age by Bapst, Brandon, Hicks, Terry Allan, Allen, Brian
Artificial Intelligence Ethics and International Law -: Practical Approaches to AI Governance by Abhivardhan
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data by Lee, Micah
Ethisches Hacken: Ein umfassendes Einsteigerbuch Leitfaden zum Erlernen der effektiven Strategien des ethischen Hackings by Lewis, Elijah
Wireless Hacking Demystified: The Ultimate Penetration Testing Handbook by Fernándezea, Nicolás
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Information Security Applications: 24th International Conference, Wisa 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers by
Continuous Biometric Authentication Systems: An Overview by Smith-Creasey, Max
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends by Habibi Lashkari, Arash, Kaur, Gurdip, Sharafaldin, Iman
Comptia Security+ Practice Tests: Exam Sy0-701 by Seidl, David
OWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks by Botwright, Rob
Comptia Security+ Certification Kit: Exam Sy0-701 by Chapple, Mike, Seidl, David
Privacy-Preserving Computing: For Big Data Analytics and AI by Yang, Qiang, Chen, Kai
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Computer Security - Esorics 2023: 28th European Symposium on Research in Computer Security, the Hague, the Netherlands, September 25-29, 2023, Proceed by
Online Traffic & Advertisements: Take Off Online by Mawking, Philippa
Cryptocoding Based on Quasigroups by Bakeva, Verica, Mechkaroska, Daniela, Popovska-Mitrovikj, Aleksandra
PCI DSS Bootcamp The A-Z Information Security Guide by Publications, Book Wave
Mastering Mobile App Penetration Testing: A Comprehensive Guide by Vásquez, Lorenzo
Crypto Champions: How DePINs are Building a Greener, Fairer World with Blockchain by Thompson, Lindsay M.
OSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith by Botwright, Rob
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition) by Sharma, Manish
Neon Reckoning: Shadows of Truth by Bonari, Roman, Grigorovich, Liza
Guardians of the Net: Guardians of the Net: A Complete Guide to Cybersecurity by Beatto, Sabat
Cyber Security for Next-Generation Computing Technologies by
Pentesting 101: Cracking Gadgets And Hacking Software by Botwright, Rob
Identifying and Mitigating the Security Risks of Generative AI by Barrett, Clark, Boyd, Brad, Bursztein, Elie
Mastering Red Team Penetration Testing: Techniques and Tactics by Contreras, Iyad
Information Security Planning: A Practical Approach by Lincke, Susan
Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms by
Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms by
The Black Box Hacker's Toolkit: Techniques for Successful Pen Testing by Reyes, Mikha'il
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses by Montasari, Reza
Internet of Things - Iciot 2023: 8th International Conference, Held as Part of the Services Conference Federation, Scf 2023, Shenzhen, China, December by
Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus by Martínez-Guerra, Rafael, Montesinos-García, Juan Javier, Flores-Flores, Juan Pablo
Security in Smart Home Networks by Meng, Yan, Zhu, Haojin, Shen
Oracle Linux Cookbook: Embrace Oracle Linux and master Linux Server management by Benner, Erik, Thomsen, Erik B., Spindel, Jonathan
Advanced OSINT Strategies: Online Investigations And Intelligence Gathering by Botwright, Rob
Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices by Taylor, Andrew
Navigating Cybersecurity: Defending Against Cyber Threats: Strategies for a Secure Online Environment by Larson, Olivia
Guide to Computer Network Security by Kizza, Joseph Migga
Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark by Botwright, Rob
Innovative Security Solutions for Information Technology and Communications: 16th International Conference, Secitc 2023, Bucharest, Romania, November by
The Nmap Handbook: A Deep Dive into Network Mapping and Scanning by Benowitz, Zachary
NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library by Botwright, Rob
Mastering Nessus: A Comprehensive Guide to Cybersecurity Assessment by Arenson, Avyaan
Rust for Blockchain Developers: A Comprehensive Guide to Build Decentralized Apps with Rust Programming by Krum, Jose
Enhancing Performance, Efficiency, and Security Through Complex Systems Control by
Enhancing Performance, Efficiency, and Security Through Complex Systems Control by
Ethisches Hacken: Fortschrittliche und wirksame Maßnahmen des ethischen Hackings by Adler, Helene
Secure Horizons An Introduction to Cybersecurity: Safeguarding the Digital Realm: A Comprehensive Guide to Cybersecurity by Pansuriya, Pansuriya, Pansuriya P., Harsh Hasmukbhai
Mastering Metasploit: A Comprehensive Guide to Cybersecurity Penetration Testing by Aronowitz, Zusman
Click and Connect: The Power of Digital Relationship Building by Sreekumar, V. T.
Cyber Wise: An Insight into the World of Cyber Security by Allure, R.
Trojan Exposed: Cyber Defense And Security Protocols For Malware Eradication by Botwright, Rob
Advanced Golang Networking: Build High-Availability, Fault-Tolerant Networks with GO Programming by Krum, Jose
Infinite Possibilities: A Guide to Manifesting Your Dreams by Sreekumar, V. T.
Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage by Chaput, Bob
Futuristic e-Governance Security With Deep Learning Applications by
Futuristic e-Governance Security With Deep Learning Applications by
Cybersecurity Risks and Controls: Fundamentals of Organizational Cybersecurity by Messenger
Cybersecurity Risks and Controls: Fundamentals of Organizational Cybersecurity by Messenger
Unveiling the Core: A Comprehensive Guide to Operating System Design and Implementation: Unveiling the Core: A Comprehensive Journey into by Pansuriya P., Harsh Hasmukbhai
Mastering OpenVAS: A Comprehensive Guide to Cybersecurity Vulnerability Assessment by Hershkowitz, Yaakov
Weaponizing Cyberspace: Inside Russia's Hostile Activities by Sambaluk, Nicholas Michael
Dora: A guide to the EU digital operational resilience act by Pattison, Andrew
Hіddеn AI Guіdе fоr Bеgіnnеrѕ: AI uѕеѕ techniques from рrоbа by Lee, Billy
Advanced Smart Computing Technologies in Cybersecurity and Forensics by
Cybersecurity tales: Cyber risk, what it is and how to manage it by Fausti, Marcello
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS by Schmitz, Roland, Duplys, Paul
The Software Developer's Guide to Linux: A practical, no-nonsense guide to using the Linux command line and utilities as a software developer by Cohen, David, Sturm, Christian
Conquiste sua vaga em segurança da informação by Sobiecki, Fabio
Deterrence in the 21st Century: Statecraft in the Information Age by
Global Digital Data Governance: Polycentric Perspectives by
Global Digital Data Governance: Polycentric Perspectives by
Deterrence in the 21st Century: Statecraft in the Information Age by
Mastering Cybersecurity Ethics: Mastering Cybersecurity and Ethical Hacking: Defense and Offense in the Digital World by Conrad, Julian
Anti-Spam Techniques Based on Artificial Immune System by Tan, Ying
Touchless Fingerprint Biometrics by Piuri, Vincenzo, Scotti, Fabio, Labati, Ruggero Donida
Ultimate Cyberwarfare for Evasive Cyber Tactics by Tan, Chang
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques by Nomani, Qamar
Multilevel Modeling of Secure Systems in Qop-ML by Ksiezopolski, Bogdan
Azure Penetration Testing: Advanced Strategies For Cloud Security by Botwright, Rob
Kubernetes Secrets Handbook: Design, implement, and maintain production-grade Kubernetes Secrets management solutions by Adams, Rom, Gkatziouras, Emmanouil, XI, Chen
Car Hacking Playbook: Revving Up Cyber Defense by Dworsky, Hannah
Triangle Mesh Watermarking and Steganography by Chen, Kejiang, Ma, Zehua, Zhou, Hang
Improving Security, Privacy, and Trust in Cloud Computing by
Cybersecurity Fundamentals Explained by MacKay, Brian
Artificial Intelligence Security and Privacy: First International Conference on Artificial Intelligence Security and Privacy, Ais&p 2023, Guangzhou, C by
Artificial Intelligence Security and Privacy: First International Conference on Artificial Intelligence Security and Privacy, Ais&p 2023, Guangzhou, C by
Mastering Windows Security: Unveiling Hacking Techniques and Penetration Strategies by Bleich, Eden
NFT Masterclass: Exploring the Digital Future in Art, Investments, and Creativity. by Digitalis, Lex
Red Team Blue Team: A White Hacking Reference by Kathy, Black Hat
Cybersecurity for Everyone by Franklin, Edward
Zero Trust Security Demystified: Your Roadmap to a Resilient Network and Unparalleled Data Protection by Knowings, L. D.
Zero Trust Security Demystified: Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient N by Knowings, L. D.
Kali Linux, Ethical Hacking And Pen Testing For Beginners by Bharat Nishad
Social Sector - Check What Awaits You by Gorsky, Patrick
CompTIA Cloud+ (Plus) Certification Practice Questions, Answers and Master the Exam by Mills, Jake T.
The IT Auditor's Playbook: Expert Guidance for Auditing & Consulting in the Digital Era by Cohan, Ofek
X86 Software Reverse-Engineering, Cracking, and Counter-Measures by Domas, Stephanie, Domas, Christopher
Decoding Threat Intelligence: Unveiling Cybersecurity's Hidden Patterns by Damrosch, Tuvya
Fusion of Machine Learning Paradigms: Theory and Applications by
Legal Developments on Cybersecurity and Related Fields by
Evolution of Cross-Sector Cyber Intelligent Markets by
Under Pressure: Empowering Cyber Security Incident Responders by Phair, Nigel
Cybersecurity for Everyone (Hardcover Edition) by Franklin, Edward
Defending APIs: Uncover advanced defense techniques to craft secure application programming interfaces by Domoney, Colin
Cyber Security Risk Management Essentials: Safeguarding in the Digital Era by Ehrlich, Yonah
Crypto Fundamentals: Unlocking the world of cryptocurrencies: essential concepts and strategies by Stone, Aiden
Power Systems Cybersecurity: Methods, Concepts, and Best Practices by
NIST Cloud Security: Cyber Threats, Policies, And Best Practices by Botwright, Rob
AI Powered Data Privacy & Data Protection For Small Businesses by Arefin, Sabira
AI and the Battlefield: Friend or Foe? by Woldemariam, Abebe-Bard Ai
Cyber Wargaming: Research and Education for Security in a Dangerous Digital World by
Cyber Wargaming: Research and Education for Security in a Dangerous Digital World by
Privacy Computing: Theory and Technology by Li, Fenghua, Li, Hui, Niu, Ben
Proceedings of Fifth International Conference on Computer and Communication Technologies: Ic3t 2023, Volume 1 by
Emerging Technologies and Security in Cloud Computing by
Cybersecurity Measures for Logistics Industry Framework by
Cybersecurity Measures for Logistics Industry Framework by
Emerging Technologies and Security in Cloud Computing by
Strengthening Industrial Cybersecurity to Protect Business Intelligence by
Digital Transformation in African SMEs: Emerging Issues and Trends by
Trading in Local Energy Markets and Energy Communities: Concepts, Structures and Technologies by
Content Distribution for Mobile Internet: A Cloud-Based Approach by Dai, Yafei, Chen, Guihai, Li, Zhenhua
Crypto Wealth Navigation: Cryptocurrency investment fundamentals: building wealth in the digital age by Wells, Alexander
Introduction to SBOM and VEX: Software Bill of Materials and Vulnerability Exploitability Exchange by Alrich, Tom
Dawn of Distrust: Technological Threads Weaving a Trustless Society by Maxwell J Aromano
Facial Recognition in Airports: The Rise of Facial Recognition in Air Travel by Wilson, David
Hidden Traps of the Internet: Building and Protecting Your Online Platform by Mohr, Judy L.
Being Less "Hackable": for Seniors and "Non-Techies" by Johnson, Brenda Lynn
Survival in a Silicon Dawn: Navigating a Hostile A.I. World Takeover by Intelligence, Artificial
Selected Areas in Cryptography - Sac 2023: 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers by
Debugging Playbook: System Testing, Error Localization, And Vulnerability Remediation by Botwright, Rob
Building a Cyber Risk Management Program: Evolving Security for the Digital Age by Allen, Brian, Hicks, Terry Allan, Bapst, Brandon
The Language of Deception: Weaponizing Next Generation AI by Hutchens, Justin
The Language of Deception: Weaponizing Next Generation AI by Hutchens, Justin
Advanced Techniques of Artificial Intelligence in It Security Systems by Korytkowski, Marcin
Building a Cyber Risk Management Program: Evolving Security for the Digital Age by Allen, Brian, Hicks, Terry Allan, Bapst, Brandon
Bent Functions and Permutation Methods: Binary and Multiple-Valued Bent Functions by Stankovic, Milena, Stankovic, Radomir S., Moraga, Claudio
Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware by Tobias, Marc Weber
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Grimes, Roger A.
See Yourself in Cyber: Security Careers Beyond Hacking by Adams, Ed
The GPT-4 Crypto Revolution: Pioneering Profit in a Digital Age by Wilder, Zane
Building Cybersecurity Applications with Blockchain and Smart Contracts by
Multimedia Watermarking: Latest Developments and Trends by
Decision Making and Security Risk Management for Iot Environments by
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals by Haqanee, Mansoor, Ramakrishnan, Ganesh
Blockchain Beyond Bitcoin: A deep dive into the emerging technologies and innovations that are powered by blockchain such as smart contracts dece by Franklin, Edward
Boost Your Business with Instagram: Expert Techniques to Increase Leads, Sales and Revenue with an Optimized Instagram Presence by Robson, Carl
Tiktok Marketing Mastery: How to Reach, Engage and Sell to 1 Billion TikTok Users by Robson, Carl
Trustworthy AI: From Theory to Practice by Catak, Ferhat Ozgur, Kuzlu, Murat
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You by Fagan, Peter
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You by Fagan, Peter
DDOS Attack: What it is, and how to stop it.: A Cybersecurity guide for 2024 by Kanegi, Takehiro, Van Der Post, Hayden
Smart Card Research and Advanced Applications: 22nd International Conference, Cardis 2023, Amsterdam, the Netherlands, November 14-16, 2023, Revised S by
Cybersecurity for Beginners: A Сomprehensive Guide on Protecting Against Digital Threats in the Modern World by Peterson, Liam
In Zero Trust We Trust by Naduvath, Avinash
Improving Security, Privacy, and Trust in Cloud Computing by
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies by Santos, Omar, Salam, Samer, Dahir, Hazim
Digital Dreams Have Become Nightmares: What We Must Do by Baecker, Ronald M.
See More