• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2024

Exploring Altcoins and the Next Crypto Wave: Altcoins: Investing in the future of cryptocurrencies by Reyes, Ariana
Digital Dreams Have Become Nightmares: What We Must Do by Baecker, Ronald M.
Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part by
Earning Online: From Side Hustle to Full-Time Income by Sreekumar, V. T.
Secure Coding Practices: Fortifying Applications Against Cyber Threats by Kathy, Black Hat
Digital Defense Essential: A Beginner's Guide to Cybersecurity and Ethical Hacking Careers by Williams, Robert
Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part by
Security Without Obscurity: A Guide to PKI Operations by Stapleton, Jeff, Epstein, W. Clay
Security Without Obscurity: A Guide to PKI Operations by Stapleton, Jeff, Epstein, W. Clay
The Digital Revolution: How Technology is Reshaping Our World by Sreekumar, V. T.
Cybersecurity Issues and Challenges in the Drone Industry by
Txting 2 Talking: Disconnect to Reconnect by Hotte, Kathryn
Cybersecurity Issues and Challenges in the Drone Industry by
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls by Hodson, Christopher J.
PCI DSS Version 4.0: A guide to the payment card industry data security standard by Hancock, Stephen
Analyzing and Mitigating Security Risks in Cloud Computing by
Analyzing and Mitigating Security Risks in Cloud Computing by
Web Application Security: Exploitation and Countermeasures for Modern Web Applications by Hoffman, Andrew
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls by Hodson, Christopher J.
Acquiring Publicly Available Information Analytic Tools in a Proprietary Marketplace: Acquisition Recommendations for Army Cyber Command by Warren, Kristin, Marcellino, William, Schwille, Michael
Privacy and Data Protection Law in China by Shao, Guosong, Peng, Chengxin
Pen Testing from Contract to Report by Basta, Alfred, Basta, Nadine, Anwar, Waqar
Applied Cryptography and Network Security: 22nd International Conference, Acns 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Pa by
Microsoft Unified XDR and SIEM Solution Handbook: Modernize and build a unified SOC platform for future-proof security by Boddu, Raghu, Lamppu, Sami, Trent, Rod
Proceedings of Fifth International Conference on Computer and Communication Technologies: Ic3t 2023, Volume 2 by
Computer Security. Esorics 2023 International Workshops: Cyberics, Dpm, Cbt, and Secpre, the Hague, the Netherlands, September 25-29, 2023, Revised Se by
Applied Cryptography and Network Security: 22nd International Conference, Acns 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Pa by
Applied Cryptography and Network Security: 22nd International Conference, Acns 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Pa by
Declutter your Mind, Home and Digital Spaces by James, Andrew William
Killer Tech and the Drive to Save Humanity by Stross, Mark
Killer Tech and the Drive to Save Humanity by Stross, Mark
A Journey into Cybersecurity: Mastering cybersecurity: expert insights and best practices by Brooks, Cameron
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) by Kumar Chawdhury, Tarun, Gupta, Vipul, Banerjee, Joyanta
Infrastructure Attack Strategies for Ethical Hacking by Singh, Harpreet, Sharma, Himanshu
Innovative Machine Learning Applications for Cryptography by
Innovative Machine Learning Applications for Cryptography by
The Invisible Hand Economic Intelligence And Industrial Espionage by Truman, Davis
Technological Trends in the AI Economy: International Review and Ways of Adaptation by
Navigating Cyber Threats and Cybersecurity in the Logistics Industry by
Navigating Cyber Threats and Cybersecurity in the Logistics Industry by
Adversarial Multimedia Forensics by
Adversarial Machine Learning: Attack Surfaces, Defence Mechanisms, Learning Theories in Artificial Intelligence by Sreevallabh Chivukula, Aneesh, Yang, Xinghao, Liu, Bo
Why CISOs Fail by Engel, Barak
Why CISOs Fail by Engel, Barak
Navigating Cybersecurity and Ethical Hacking: The art of ethical hacking: exploring cybersecurity from within by Grayson, Lily
Blockchains: A Handbook on Fundamentals, Platforms and Applications by
Cyber Deception: Techniques, Strategies, and Human Aspects by
Implementando el Marco de Ciberseguridad NIST 2.0: Una Guía Completa para Profesionales de TI en PyMES by Fernandez Climent, Edgardo
Advanced Penetration Testing: Hacking Satellite Communication by Knowell, Richard
Security and Privacy in Federated Learning by Yu, Shui, Cui, Lei
Cyber Security and Digital Forensics: Select Proceedings of the International Conference, Redcysec 2023 by
Computer Security. Esorics 2023 International Workshops: Cps4cip, Adiot, Secassure, Wasp, Taurin, Prist-Ai, and Secai, the Hague, the Netherlands, Sep by
Software Supply Chain Security: Securing the End-To-End Supply Chain for Software, Firmware, and Hardware by Crossley, Cassie
The Werewolf at Dusk: And Other Stories by Small, David
A Non-Techie Beginners' Guide to Cybersecurity and Privacy: How Anyone Can Secure Their Digital Life, Protect Data, and Prevent Cyber Attacks in 5 Eas by Publishers, Teched
Algorithms of Armageddon: The Impact of Artificial Intelligence on Future Wars by Tangredi, Sam J., Galdorisi, George
Ubiquitous Security: Third International Conference, Ubisec 2023, Exeter, Uk, November 1-3, 2023, Revised Selected Papers by
Mastering Microsoft Intune - Second Edition: Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite by Brinkhoff, Christiaan, Larsen, Per
Introduction to Cybersecurity in the Internet of Things by Yu, Jing, Zhu, Liehuang, Gai, Keke
Optimal Spending on Cybersecurity Measures: DevOps by Kissoon, Tara
Optimal Spending on Cybersecurity Measures: DevOps by Kissoon, Tara
Auto Detailing Startup: The Art of Car Detailing Business - Strategies, Tools, and Tips for Building Your Profitable Auto Care Venture by Robson, Carl
The New SOC Analyst's Guidebook: Surviving Your First SOC by Somers, J. R.
Cyber Resilience Fundamentals by Kieseberg, Peter, Tjoa, Simon, Gafic, Melisa
Security-Driven Software Development: Learn to analyze and mitigate risks in your software projects by Olmsted, Aspen
Satoshi's Legacy: A Journey Through Bitcoin's White Paper: From Genesis to the Future of Digital Gold by Morgan, Jonathan T.
Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems: Iccces 2022 by
Cryptocurrency Unveiled: A Comprehensive Guide to Understanding Digital Currency by Singh, Inderbir
Critical Infrastructure Protection in the Light of the Armed Conflicts by
Ict: Smart Systems and Technologies: Proceedings of Ictcs 2023, Volume 4 by
Secure and Resilient Digital Transformation of Healthcare: First Workshop, Sunrise 2023, Stavanger, Norway, November 30, 2023, Proceedings by
Decoding Cryptocurrency: Navigating the crypto space: an introduction to virtual money and blockchain technology by Blake, Finnley
Artificial Intelligence for Cyber Defense and Smart Policing by
Europrivacy(TM)/(R): The first European Data Protection Seal by Turley, Alice
Decentralized Privacy Preservation in Smart Cities by Shen, Huang, Cheng
Walking the Tightrope: Security, Rights, and AI in Counter-Terrorism by Woldemariam, Abebe-Bard Ai
From Exposed to Secure: The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep Your Company Safe by Featuring Cybersecurity and Compliance Experts from Around t
Locksport: A Hackers Guide to Lockpicking, Impressioning, and Safe Cracking by Weyers, Jos, Burrough, Matt, Belgers, Walter
The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects by Fischer-Hübner, Simone, Karegar, Farzaneh
Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective by Luo, Xiaoyuan, Li, Xiaolei, Wang, Jiange
Secure Edge and Fog Computing Enabled AI for Iot and Smart Cities: Includes Selected Papers from International Conference on Advanced Computing & Next by
Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part I by
Passive and Active Measurement: 25th International Conference, Pam 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II by
Criptomonedas para Principiantes Todo lo que Necesitas saber sobre Blockchain, Bitcoin, Minería, Altcoins, Finanzas Descentralizadas, Inversión, NFTs, by Gómez, Eduardo Robledo
Tales from the Cyber Crypt by Firewall, Stella
Tales from the Cyber Crypt by Firewall, Stella
Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications by Clarke, Nathan, Birath, Marcus, Kävrestad, Joakim
Database and Application Security: A Practitioner's Guide by Danturthi, R. Sarma
Cybersecurity Unveiled: The art of Cyber Defense: a comprehensive guide to protecting your data by Chang, Benjamin
Template Validation Of Data Security Investigations By Machine Learning by Oliver, Noah
Bitcoin con Rigor (Mr. Crypto Edition): Un estudio sobre el funcionamiento técnico de Bitcoin by Sanchis, Jose
A Study on the Creation, Impact and Legal Issues of Crypto Special Drawing Rights by Zeng, Leo
Privacy-Preserving in Mobile Crowdsensing by Li, Youqi, Zhang, Chuan, Wu, Tong
Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach by Bayuk, Jennifer L.
Cryptography: Algorithms, Protocols, and Standards for Computer Security by Mammeri, Zoubir Z.
Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats by Armstrong-Smith, Sarah
Communication Technologies and Security Challenges in Iot: Present and Future by
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Grimes, Roger A.
See Yourself in Cyber: Security Careers Beyond Hacking by Adams, Ed
Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats by Armstrong-Smith, Sarah
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Grimes, Roger A.
See Yourself in Cyber: Security Careers Beyond Hacking by Adams, Ed
Lock Picking Handbook: Master the Art of Locksmithing: Learn Beginner to Advanced Skills, DIY Lock Picking, Lock Raking & Decoding, Lock Bypa by S. Rowe, Bobby
Improving Security, Privacy, and Connectivity Among Telemedicine Platforms by
Grundlagen Der Kryptographie: Einführung in Die Mathematischen Und Algorithmischen Grundlagen by Buell, Duncan
Advances in Emerging Financial Technology and Digital Money by
Microsoft 365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture by Kranjac, Sasha, Kudovic, Omar
Mastering Network Forensics: A Practical Approach to Investigating and Defending Against Network Attacks by Jaswal, Nipun
Progress in Cryptology - Indocrypt 2023: 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I by
Progress in Cryptology - Indocrypt 2023: 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II by
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture by Nichols, Lester
The OSINT Handbook: A practical guide to gathering and analyzing online information by Meredith, Dale
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills by Bodungen, Clint
Internal Paradigm For Affective Responses To Security Information by Junior, Charles
Randomized Response Techniques: Certain Thought-Provoking Aspects by Chaudhuri, Arijit, Pal, Sanghamitra, Patra, Dipika
Cyber Security by Arora, Jagdish Krishanlal
Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition by Rolls, Darran, Haber, Morey J.
Memory Dump Analysis Anthology, Volume 15 by Vostokov, Dmitry, Software Diagnostics Institute
Secure and Intelligent IoT-Enabled Smart Cities by
Emerging Technologies for Securing the Cloud and IoT by
Emerging Technologies for Securing the Cloud and IoT by
Secure and Intelligent IoT-Enabled Smart Cities by
Aprende a Invertir en Criptomonedas 17 Trucos Para Hacer Dinero Online Desde Casa by Gómez, Eduardo Robledo
Revelando los secretos de la Seguridad Informática: Protegiendo su mundo digital by Rodríguez, Profesor
El Libro Negro de Ethereum ecretos Revelados: Desde la Inversión y Programación hasta el Futuro de la Web 3.0 by Gómez, Eduardo Robledo
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection by
Information Technology Security: Modern Trends and Challenges by
Zero Trust Networks: Building Secure Systems in Untrusted Networks by Rais, Razi, Morillo, Christina, Gilman, Evan
Digital Armor: The Confessions of a Reformed Hacker by Marques, Jacinto Luis
Digital Armor: The Confessions of a Reformed Hacker by Marques, Jacinto Luis
AI and ML Applications for Decision-Making in Zero Trust Cyber Security by Goraga, Zemelak
Smart Meters: Artificial Intelligence to Support Proactive Management of Energy Consumption by
The Basics of Cybersecurity by Christly, John
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications by
Computer Networks and Iot: First International Artificial Intelligence Conference, Iaic 2023, Nanjing, China, November 25-27, 2023, Revised Selec by
Shielding the Digital Realm: Cybersecurity Basics by Harrow, Maxwell
Fibel IT-Sicherheit: Fachbegriffe und Akronyme im Kontext der IT-Sicherheit by Sittloh, Richard
Riding the Wave: Applying Project Management Science in the Field of Emergency Management by Boyarsky, Andrew
Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies by Ismat, Sadia, Thakur, Kutub, Pathan, Al-Sakib Khan
Robust Machine Learning: Distributed Methods for Safe AI by Pinot, Rafael, Gupta, Nirupam, Guerraoui, Rachid
Riding the Wave: Applying Project Management Science in the Field of Emergency Management by Boyarsky, Andrew
Introduction to One Digital Identity: Strategies, Innovations, and Future Trends by Goniwada, Shivakumar R.
AI vs. Identity Theft: Securing the Digital Age by Woldemariam, Abebe-Bard Ai
Generative AI Security: Theories and Practices by
The Gambler and the Scholars: Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology by Dooley, John F.
Capital of Spies by Dg
Revealing the secrets of Cybersecurity: Protecting Your Digital World by Rodriguez
Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the Internet of Things by Brooks, Tyson T.
Information Systems: 20th European, Mediterranean, and Middle Eastern Conference, Emcis 2023, Dubai, United Arab Emirates, December 11-12, by
Blockchain Applications for Smart Contract Technologies by
Blockchain Applications for Smart Contract Technologies by
Cyber Shield by Mungo, Cissp Jamaine, Pate, Cissp Lewis, Grace, Cissp Torrez L. Grace
High Performance Privacy Preserving AI by Shenoy, Jayavanth, Grinaway, Patrick, Palakodety, Shriphani
Python For Cybersecurity by Elsherif, Hesham Mohamed
Mastering Command & Control: Exploring C2 Frameworks using Kali Linux by Dieterle, Daniel W.
The Native-Born by Molony, John
Data-Centric Security in Software Defined Networks (Sdn) by Amanowicz, Marek, Szwaczyk, Sebastian, Wrona, Konrad
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh by Gupta, Rajneesh
Guardians of the Virtual Realm: From Protection to Penetration: Navigating Cybersecurity and Ethical Hacking Techniques by Grey, Harper
Guide to Computer Network Security by Kizza, Joseph Migga
Public-Key Cryptography - Pkc 2024: 27th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Sydney, Nsw, Australia, Apri by
Shadow Codes: The Master Spy of the Digital Age by Bajwa
Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems by Sapaty, Peter Simon
Bitcoin para el Individuo Soberano: Protege Tu Riqueza del Robo y la Vigilancia: Una Guía Completa para el Uso Privado, Seguro y Eficiente de Bitcoin by Merkle, Adam
Digital Forensics and Cyber Crime: 14th Eai International Conference, Icdf2c 2023, New York City, Ny, Usa, November 30, 2023, Proceedings, Part II by
Public-Key Cryptography - Pkc 2024: 27th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Sydney, Nsw, Australia, Apri by
Public-Key Cryptography - Pkc 2024: 27th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Sydney, Nsw, Australia, Apri by
Public-Key Cryptography - Pkc 2024: 27th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Sydney, Nsw, Australia, Apri by
Códigos De Sombra: El espía Maestro De La era Digital by Bajwa, Usama, Bajwa
Códigos De Sombra: El espía Maestro De La era Digital by Bajwa, Danish Ali, Bajwa
The Nice Cyber Security Framework: Cyber Security Intelligence and Analytics by Alsmadi, Izzat
AWS Certified Security - Specialty (SCS-C02) Exam Guide - Second Edition: Get all the guidance you need to pass the AWS (SCS-C02) exam on your first a by Scott, Stuart, Book, Adam
Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, Cosade 2024, Gardanne, France, April 9-10, 2024, Proceedings by Wacquez, Romain
Implementation and Analysis of Ciphers in Quantum Computing by Baksi, Anubhab, Jang, Kyungbae
Ict: Innovation and Computing: Proceedings of Ictcs 2023, Volume 5 by
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications: First Eai International Conference, Safer-Tea 2023, Yaoundé, Cameroon, Octo by
Computer Forensics: Uncovering the Evidence: A Beginner's Guide to Investigating Digital Crimes by Parvin, R.
Explicando, Application Security by Pereira, Cássio Batista
Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices by Möller, Dietmar P. F.
Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance by National Academies of Sciences Engineering and Medicine, Division of Behavioral and Social Sciences and Education, Policy and Global Affairs
Implementing IEC 62443: Best Practices for OT Security Professionals by Guha, Abhirup
Managed Detection and Response Services: A Cyber Stakeholders Guide by Dye, Stephen M.
Comptia Security+ Sy0-701 Cert Guide by Heuermann, Lewis
Cryptology and Network Security with Machine Learning: Proceedings of Iccnsml 2023 by
Cyber Operations: A Case Study Approach by Couretas, Jerry M.
Machine Learning for Cyber Security: 5th International Conference, Ml4cs 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings by
Privacy and Identity Management. Sharing in a Digital World: 18th Ifip Wg 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, by
Cybersecurity in the Age of Espionage: Protecting Your Digital Life by Vincent, B.
The Right to Privacy 1914-1948: The Lost Years by Richardson, Megan Lloyd
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back by Schneier, Bruce
Modernes It-Management: Methodische Kombination Von It-Strategie Und It-Reifegradmodell by Büchler, Roman P., Mangiapane, Markus
ICT Systems Security and Privacy Protection: 38th Ifip Tc 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Revised Selected Pa by
Penetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing (English Edition) by
Blockchain for Cybersecurity in Cyber-Physical Systems by
Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO's Guide to Protecting the Digital World by Mitcham, Msa Cciso
Foundations and Practice of Security: 16th International Symposium, Fps 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I by
Digital Forensics and Watermarking: 22nd International Workshop, Iwdw 2023, Jinan, China, November 25-26, 2023, Revised Selected Papers by
Foundations and Practice of Security: 16th International Symposium, Fps 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part II by
Enterprise-Grade Hybrid and Multi-Cloud Strategies: Proven strategies to digitally transform your business with hybrid and multi-cloud solutions by Ag, Sathya
Designing to Fips-140: A Guide for Engineers and Programmers by Fant, Richard, Johnston, David
See More