• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2024

Plunkett's Cybersecurity, Digital ID & Online Fraud Industry Almanac 2024: Cybersecurity, Digital ID & Online Fraud Industry Market Research, Statisti by Plunkett, Jack W.
Mastering AWS Security - Second Edition: Strengthen your cloud environment using AWS security features coupled with proven strategies by Mathieu, Laurent
Evolution in Computational Intelligence: Proceedings of the 10th International Conference on Frontiers in Intelligent Computing: Theory and Applicatio by
Machine Learning Techniques for Cybersecurity by Bhardwaj, Sonam, Cicala, Fabrizio, Bertino, Elisa
Ict: Applications and Social Interfaces: Proceedings of Ictcs 2023, Volume 1 by
Advances in Cryptology - Eurocrypt 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Swit by
Advances in Cryptology - Eurocrypt 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Swit by
Blockchain-based Cyber Security: Applications and Paradigms by
Ai-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability by Sarker, Iqbal H.
Advances in Cryptology - Eurocrypt 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Swit by
Advances in Cryptology - Eurocrypt 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Swit by
Advances in Cryptology - Eurocrypt 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Swit by
101 Ferramentas Hacker by Doin, Igor
A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program by Baker, Debra
Cybercrime and Digital Deviance by Graham, Roderick S., Smith, 'Shawn K.
Cybercrime and Digital Deviance by Graham, Roderick S., Smith, 'Shawn K.
Unveiling the NIST Risk Management Framework (RMF): A practical guide to implementing RMF and managing risks in your organization by Marsland, Thomas
Ultimate Linux Network Security for Enterprises by Kant, Adarsh
Manipulationen Und Moneten - Datentrickserei Im Digitalen Zeitalter by Lenz, Hans-J
The Ultimate Kali Linux Book - Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting by Singh, Glen D.
Securing Salesforce Digital Experiences by Meyers, Matt
Securing Salesforce Digital Experiences by Meyers, Matt
Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem by Hughes, Chris, Robinson, Nikki
Windows Security Internals: A Deep Dive Into Windows Authentication, Authorization, and Auditing by Forshaw, James
Hacking Ético: Introducción a la Ciberseguridad by Jenkins, William V.
Talk To Them by Chance, Heidi
Security for Cloud Native Applications: The Practical Guide for Securing Modern Applications Using Aws, Azure, and Gcp by Estrin, Eyal
Advances in Cryptology - Eurocrypt 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Swit by
Cyber Crisis Management: Das Praxishandbuch Zu Krisenmanagement Und Krisenkommunikation by Kaschner, Holger
Risk Assessment and Countermeasures for Cybersecurity by
Risk Assessment and Countermeasures for Cybersecurity by
The Zero Trust Framework and Privileged Access Management (PAM) by Das, Ravindra
The Zero Trust Framework and Privileged Access Management (PAM) by Das, Ravindra
Federated Learning and Privacy-Preserving in Healthcare AI by
Federated Learning and Privacy-Preserving in Healthcare AI by
MyData and Data Sovereignty in the Age of AI by Lee, Michael
The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age by Kestner, Peter
Proceedings of International Conference on Recent Innovations in Computing: Icric 2022, Volume 1 by
Cyber Safety for Everyone: A Comprehensive Guide to Online Safety by Jaagoteens
Mastering CMMC 2.0: A Comprehensive Guide to Implementing Cybersecurity Maturity in Defense Contracting by Fernandez Climent, Edgardo
Topics in Cryptology - Ct-Rsa 2024: Cryptographers' Track at the Rsa Conference 2024, San Francisco, Ca, Usa, May 6-9, 2024, Proceedings by
Ccsp: Novice To Certified by Botwright, Rob
Protect Your Business: A Small Business Guide to Basic Cybersecurity by Goodman, David, Bonney, Bill
Physical Layer Security for 6g Networks by
It Infrastructure: Security and Resilience Solutions by Süß, Yannik, Süß, Ralf
Guardians of the Virtual Realm: Navigating the Digital Frontier with Confidence by Wells, Adrian
Cybersecurity Measures for Municipal Administrators & Government Agencies by Locklear, Aaron
Advances in Cryptology - Eurocrypt 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Swit by
Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning by Bingley, Richard
Security+ Exam Pass: Security Architecture, Threat Identification, Risk Management, Operations by Botwright, Rob
Operation REGAL: The Berlin Tunnel by National Security Agency
Intelligent Strategies for ICT: Proceedings of Ictcs 2023, Volume 2 by
Pentest+ Exam Pass: Penetration Testing And Vulnerability Management For Cybersecurity Professionals by Botwright, Rob
Cybersecurity For Everyone by Marc
Ict: Cyber Security and Applications: Proceedings of Ictcs 2023, Volume 3 by
The Comprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices by Edwards, Jason
Selected Areas in Cryptography: 29th International Conference, Sac 2022, Windsor, On, Canada, August 24-26, 2022, Revised Selected Papers by
Proof-Of-Stake for Blockchain Networks: Fundamentals, Challenges and Approaches by
The Comprehensive Guide to Cybersecurity Careers: A Professional's Roadmap for the Digital Security Age by Edwards, Jason
Spring Security in Action, Second Edition by Spilca, Laurentiu
Discovering Hidden Gems in Foreign Languages by Miller, M. D.
Smart City Cyber Resilience: Your Perception Matters by Doan, Tam Thanh
Information Technology Security and Risk Management: Inductive Cases for Information Security by
Information Technology Security and Risk Management: Inductive Cases for Information Security by
Design and Deploy Microsoft Defender for Iot: Leveraging Cloud-Based Analytics and Machine Learning Capabilities by Udayakumar, Puthiyavan, Anandan, R.
Deception in Autonomous Transport Systems: Threats, Impacts and Mitigation Policies by
Enhancing Security in Public Spaces Through Generative Adversarial Networks (GANs) by
Enhancing Security in Public Spaces Through Generative Adversarial Networks (GANs) by
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms by Güneysu, Tim, Paar, Christof, Pelzl, Jan
Machine Learning Safety by Huang, Xiaowei, Jin, Gaojie, Ruan, Wenjie
Cybersecurity Teaching in Higher Education by
Implementing Palo Alto Networks Prisma(R) Access: Learn real-world network protection by 'Reaper', Tom Piens Aka
Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense by Hartman, Shane
Proceedings of International Conference on Recent Innovations in Computing: Icric 2022, Volume 2 by
Protect Your Practice: Basic Cybersecurity for Healthcare, Legal and Financial Professionals by Bonney, Bill, Goodman, David
EU Cybersecurity Regulations Explained: DORA, NIS 2, and Risk Management by Vemula, Anand
DORA & NIS 2 Compliance Toolkit: Building a Secure Digital Future by Vemula, Anand
EU AI Act Explained: A Guide to the Regulation of Artificial Intelligence in Europe by Vemula, Anand
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain by Reveron, Derek S., Lindsay, Jon R.
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain by Lindsay, Jon R., Reveron, Derek S.
Codes and Ciphers of the Civil War by Friedman, William F.
Church Privacy Who Cares? You!: Simple Ways Anyone Can Feed the Flocks, Starve Risks, and Ditch Liabilities by Buckler, Grace
Church Privacy Who Cares? You!: Simple Ways Anyone Can Feed the Flocks, Starve Risks, and Ditch Liabilities by Buckler, Grace
Artificial Intelligence, Ethics and the Future of Warfare: Global Perspectives by
Artificial Intelligence, Ethics and the Future of Warfare: Global Perspectives by
Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches by Toledano, Soledad Antelada
Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats by Aravilli, Srinivasa Rao
Python for OSINT: Tracking and Profiling Targets by Bourny, Jason
Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques by Aslaner, Milad
Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide: Master the SC-100 Exam with Practical Examples and Case Studies to Secure the Digital Wo by Rajesh, K. V. N.
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms by Blyth, Andrew
Android Malware Detection and Adversarial Methods by Zhang, Xiaosong, Yan, Ran, Niu, Weina
The Definitive Guide to KQL: Using Kusto Query Language for Operations, Defending, and Threat Hunting by Zorich, Matthew, Morowczynski, Mark, Trent, Rod
فوزووز الابداعي by Fawzi Elgendi, Mohamed
Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools by Moallem, Abbas
Cyber Resilience Fundamentals by Gafic, Melisa, Kieseberg, Peter, Tjoa, Simon
Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives by
Managing It Service Security: Methods and Recipes for User Organizations and Providers Along the Supply Chain by Von Faber, Eberhard
Cybersecurity-Awareness by Pils, Martin
Global Perspectives on the Applications of Computer Vision in Cybersecurity by
Global Perspectives on the Applications of Computer Vision in Cybersecurity by
Digital Watermarking for Machine Learning Model: Techniques, Protocols and Applications by
The Cryptoverse for Teenagers by Peter-Idah, Michelle
Machine Learning and Cryptographic Solutions for Data Protection and Network Security by
Machine Learning and Cryptographic Solutions for Data Protection and Network Security by
Blockchain and IoT Approaches for Secure Electronic Health Records (EHR) by
Blockchain and IoT Approaches for Secure Electronic Health Records (EHR) by
Large Language Models in Cybersecurity: Threats, Exposure and Mitigation by
Screening by International Aid Organizations Operating in the Global South: Mitigating Risks of Generosity by Paragi, Beata
Jump-Start Your Soc Analyst Career: A Roadmap to Cybersecurity Success by Wall, Tyler, Rodrick, Jarrett
Secrets of the Cyber Underworld: Unveiling the Hidden World of Cyber Criminals & Strategies for Addressing Cyber Crime by Aremu, Bolakale
Privacy and Identity Management: 17th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, Aug by
Security Team Operating System by Hyatt, Christian
Security Team Operating System by Hyatt, Christian
Autonomous Intelligent Cyber Defense Agent (Aica): A Comprehensive Guide by
Zero Trust Networks: Building Secure Systems in Untrusted Network (2nd Edition) by Morillo, Christina, Barth, Doug, Gilman, Evan
Ubiquitous and Transparent Security: Challenges and Applications by
Zero Trust Networks: Building Secure Systems in Untrusted Network (2nd Edition) by Rais, Razi, Morillo, Christina, Gilman, Evan
Digital Innovation Adoption: Architectural Recommendations and Security Solutions by Rana, Muhammad Ehsan
Dark Wire: The Incredible True Story of the Largest Sting Operation Ever by Cox, Joseph
Security Yearbook 2024: A History and Directory of the It Security Industry by Stiennon, Richard
CISM Exam Pass: Certified Information Security Manager Study Guide by Botwright, Rob
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms by Paar, Christof, Pelzl, Jan, Güneysu, Tim
The History and Evolution of Invisible Ink by Throckmorton, Herkimer
Red Team Blue Team (Hardcover Edition): A White Hacking Reference by Kathy, Black Hat
Hacking for the Technically Challenged by Kathy, Black Hat
Comptia Linux+ Certification Companion: Hands-On Preparation to Master Linux Administration by Sheikh, Ahmed F.
The Number Theory of Cryptocurrencies by Aksara, Kuro
The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team by Butler, Michael, Oakley, Jacob G.
CySA+ Study Guide: IT Security For Vulnerability And Threat Intelligence Analysts by Botwright, Rob
Osint: The Authoritative Guide to Due Diligence by Hetherington, Cynthia
Post-Quantum Cryptography: 15th International Workshop, Pqcrypto 2024, Oxford, Uk, June 12-14, 2024, Proceedings, Part II by
Post-Quantum Cryptography: 15th International Workshop, Pqcrypto 2024, Oxford, Uk, June 12-14, 2024, Proceedings, Part I by
CYBERSECURITY DICTIONARY for Everyone: 1250 Terms Explained in Simple English by Tavlas, Tolga
Managing Internet of Things Applications Across Edge and Cloud Data Centres by
Grokking Web Application Security by McDonald, Malcolm
Cybersecurity Dictionary for Everyone: 1250 Terms Explained in Simple English by Tavlas, Tolga
Isc2 Cissp Certified Information Systems Security Professional Official Practice Tests by Chapple, Mike, Seidl, David
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide by Gibson, Darril, Chapple, Mike, Stewart, James Michael
Certified Ethical Hacker: Reconnaissance, Vulnerability Analysis & Social Engineering by Botwright, Rob
Risks and Security of Internet and Systems: 18th International Conference, Crisis 2023, Rabat, Morocco, December 6-8, 2023, Revised Selected Papers by
Digital Forensics and Cyber Crime: 14th Eai International Conference, Icdf2c 2023, New York City, Ny, Usa, November 30, 2023, Proceedings, Part I by
The Index of Coincidence by National Security Agency
The Code of Honor: Embracing Ethics in Cybersecurity by Skoudis, Ed, Maurer, Paul J.
Ultimate PowerShell Automation for System Administration: Streamline Automation and Administration Tasks with Advanced PowerShell Techniques and Exper by Gupta, Rajendra, Jayaram, Prashanth
The Character of Consent: The History of Cookies and the Future of Technology Policy by Jones, Meg Leta
Learning Devsecops: A Practical Guide to Processes and Tools by Suehring, Steve
Information Security Theory and Practice: 14th Ifip Wg 11.2 International Conference, Wistp 2024, Paris, France, February 29 - March 1, 2024, Proceedi by
The Cyber Domain: "Its Importance, in a guided journey through its many facets: Cyber Security, Cyber Intelligence, Cyber Warfare, Cyber by Rugolo, Alessandro
The Adoption of Fintech: Using Technology for Better Security, Speed, and Customer Experience in Finance by
The Adoption of Fintech: Using Technology for Better Security, Speed, and Customer Experience in Finance by
Certified Ethical Hacker: Session Hijacking, SQL Injections, Cloud Computing, And Cryptography by Botwright, Rob
Space-Air-Ground Integrated Network Security by Bai, Lin, Jiang, Chunxiao, Liu, Jianwei
CCSP (ISC)2 Certified Cloud Security Professional Exam Guide: Build your knowledge to pass the CCSP exam with expert guidance by Turner, Omar A., Lakshmana, Navya
Hacking Wifi: A Starter's Manual by Bones, Julien
Hacked Justice: The Chronicles of AJ, The White Hat Hacker From Philly by Farrior, Anthony
Ai, Blockchain and Self-Sovereign Identity in Higher Education by
Operational Technology Security: An In-Depth Overview by Guha, Abhirup
The Digital Polycrisis: A Resource & Framework for the Digital World (Large Print Edition) by Clarke-Joell, Cha'von K.
The Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment by Martinez, Olivia
Applied Cryptography and Network Security Workshops: Acns 2024 Satellite Workshops, Aiblock, Aihws, Aiots, Sci, Aac, Simla, Lle, and Cimss, Abu Dhabi, by
Hands-On Differential Privacy: Introduction to the Theory and Practice Using Opendp by Cowan, Ethan, Pereira, Mayana, Shoemate, Michael
Network Security Empowered by Artificial Intelligence by
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle by Chapple, Mike
Security and Risk Analysis for Intelligent Edge Computing by
Trusted Execution Environments by Shepherd, Carlton, Markantonakis, Konstantinos
Critical Information Infrastructures Security: 18th International Conference, Critis 2023, Helsinki Region, Finland, September 13-15, 2023, Revised Se by
Cyber Incident Response: Counterintelligence And Forensics For Security Investigators by Botwright, Rob
Law Enforcement Strategies for Disrupting Cryptomarkets: A Practical Guide to Network Structure, Trust Dynamics, and Agent-Based Modelling Approaches by Harinam, Vincent, Ariel, Barak
IT Governance: An international guide to data security and ISO 27001/ISO 27002, Eighth edition by Calder, Alan, Watkins, Steve
Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives by
Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity by Santiago Vázquez, Francisco Javier
Social Engineering in Cybersecurity: Threats and Defenses by
The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity by
Hands-On Blockchain for Python Developers - Second Edition: Empowering Python developers in the world of blockchain and smart contracts by Kok, Arjuna Sky
Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking by Leyte-Vidal, James
Real-World Edge Computing: Scale, secure, and succeed in the realm of edge computing with Open Horizon by High, Robert, Gupta, Sanjeev
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation by Staveley, Confidence
The Aspiring CIO and CISO: A career guide to developing leadership skills, knowledge, experience, and behavior by Gee, David J.
Spring Security - Fourth Edition: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures by Nasslahsen, Badr
Advanced Cybersecurity for Critical Infrastructure by Kathy, Black Hat
Implementing Zero-Knowledge Proofs With Practical Applications and Code Examples by Johnson, Hunter C.
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity by Zhussupov, Zhassulan
Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux by Lane, Karl
Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code by Chow, Dennis
Android Phones for Seniors in Easy Steps: Illustrated Using Android 13 by Vandome, Nick
Artificial Intelligence for Security: Enhancing Protection in a Changing World by
Applied Cryptography and Network Security Workshops: Acns 2024 Satellite Workshops, Aiblock, Aihws, Aiots, Sci, Aac, Simla, Lle, and Cimss, Abu Dhabi, by
Cybersecurity Governance (Large Print Edition) by Carlton, Darryl
The CyberSecurity Leadership Handbook for the CISO and the CEO - Updated Edition by Gaillard, Jean-Christophe
Proceedings of the Tenth International Conference on Mathematics and Computing: ICMC 2024, Volume 2 by
Proceedings of the Tenth International Conference on Mathematics and Computing: ICMC 2024, Volume 1 by
Church Privacy Team: Building a Trust-Centered Church by Protecting Members' Privacy and Complying with Privacy Laws and Regulations by Buckler, Grace
Mastering Cybersecurity: Strategies, Technologies, and Best Practices by Edwards, Jason
Securing the Future: Introduction to Zero Trust in Cybersecurity by M, Spoorthi, H. L., Gururaj, Ravi, Vinayakumar
The Impact of Blockchain: Technology on Industries and Economies by Blake, Seraphina
Misterios de la Web Oscura: Entendiendo la Internet Profunda by Barciela, Gilberto
Beginners Guide To Ethical Hacking and Cyber Security by Abhinav Ojha
Information Security Education - Challenges in the Digital Age: 16th Ifip Wg 11.8 World Conference on Information Security Education, Wise 2024, Edinb by
Safe and Secure: A Senior's Guide to Avoiding Scams by Roane, Ricky
See More