• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2024

Cyberveiligheid in de Gezondheidszorg: Bescherming van Kritieke Gegevens en Patiënten by Guardelli, Enrico
DIY CMMC for Small Business by McInteer, Richard
Face De-Identification: Safeguarding Identities in the Digital Era by Song, Li, Wen, Yunqian, Liu, Bo
Cybersecurity: from Management Perspective by Dr Manmohan Chaturvedi
Deepfakes: The Future of Digital Deception by Johnson, Hunter C.
Crypto Anarchy: Libertarians in the Digital Age by Garcia, Luis
Recent Advances in Computational Intelligence and Cyber Security: The International Conference on Computational Intelligence and Cyber Security by
Blockchain: Demistificare la Tecnologia Blockchain: Una Guida Completa ai Sistemi Decentralizzati by Verdi, Giulia
AI Data Privacy and Protection: The Complete Guide to Ethical AI, Data Privacy, and Security by Lazo, Mario, Ryan, Justin
The Friedman Lectures on Cryptology by Friedman, William F.
Shadows of Digital Traffic by Sodaghar, Joshua
Physical Layer Security in Power Line Communications: Fundamentals, Models and Applications by Omri, Aymen, Di Pietro, Roberto, Hernandez Fernandez, Javier
Progress in Cryptology - Africacrypt 2024: 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10-12, 2024, Proceedings by
Detection of Intrusions and Malware, and Vulnerability Assessment: 21st International Conference, Dimva 2024, Lausanne, Switzerland, July 17-19, 2024, by
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet by Senecal, David
CC Certified in Cybersecurity Cert Guide by Jamali, Amena, Galloway, Mari
ISO 27001 Controls: A guide to implementing and auditing, Second edition by Kenyon, Bridget
Zabbix 7 IT Infrastructure Monitoring Cookbook - Third Edition: Explore the new features of Zabbix 7 for designing, building, and maintaining your Zab by Liefting, Nathan, Baekel, Brian Van
Mobile Internet Security: 7th International Conference, Mobisec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers by
Proceedings of International Conference on Recent Innovations in Computing: Icric 2023, Volume 1 by
Data and Applications Security and Privacy XXXVIII: 38th Annual Ifip Wg 11.3 Conference, Dbsec 2024, San Jose, Ca, Usa, July 15-17, 2024, Proceedings by
Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications by Kävrestad, Joakim, Clarke, Nathan, Birath, Marcus
Information Security and Privacy: 29th Australasian Conference, Acisp 2024, Sydney, Nsw, Australia, July 15-17, 2024, Proceedings, Part III by
Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java Se 21 Lts and Jakarta Ee 11 by Mihailescu, Marius Iulian, Nita, Stefania Loredana
Information Security and Privacy: 29th Australasian Conference, Acisp 2024, Sydney, Nsw, Australia, July 15-17, 2024, Proceedings, Part II by
Adn Emprendedor: Guía Práctica Para Lograr El Éxito Empresarial / Entrepreneuri Al Dna: A Practical Guide to Achieving Success in Business by Villalba Segarra, Fran
Information Security and Privacy: 29th Australasian Conference, Acisp 2024, Sydney, Nsw, Australia, July 15-17, 2024, Proceedings, Part I by
Redefining Security With Cyber AI by
Redefining Security With Cyber AI by
Cybersecurity for Space: A Guide to Foundations and Challenges by Oakley, Jacob G.
A Journey Into Security Certification: From the Cloud to Artificial Intelligence by Damiani, Ernesto, Anisetti, Marco, Ardagna, Claudio Agostino
The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security by Parrish, Lee
The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security by Parrish, Lee
Performance Analysis of Cooperative Networking with Multi Channels by Pokkunuri, Pardhasaradhi, Devulapalli, Praveen Kumar, Babu Maganti, Sushanth
The Personal Internet Address & Password Logbook by Locke, Sergei
Smart and Agile Cybersecurity for IoT and IIoT Environments by
Smart and Agile Cybersecurity for IoT and IIoT Environments by
Privacy in the Age of Innovation: AI Solutions for Information Security by Palle, Ranadeep Reddy, Kathala, Krishna Chaitanya Rao
Crypto Millionaires: Blockchain: A Chance for All? by Mach, Mateusz
Crypto Millionaires: Blockchain: A Chance for All? by Mach, Mateusz
Proceedings of Third International Conference on Computing and Communication Networks: ICCCN 2023, Volume 1 by
Advanced Techniques and Applications of Cybersecurity and Forensics by
Developing a Security Training Program by McDonald, Joseph
Developing a Security Training Program by McDonald, Joseph
Safeguarding Financial Data in the Digital Age by
Safeguarding Financial Data in the Digital Age by
Cybersecurity in the Transportation Industry by
Security Issues and Solutions in 6G Communications and Beyond by
Cybersecurity and Data Management Innovations for Revolutionizing Healthcare by
Security Issues and Solutions in 6G Communications and Beyond by
Cybersecurity and Data Management Innovations for Revolutionizing Healthcare by
Cissp for Dummies by Miller, Lawrence C., Gregory, Peter H.
Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers by Merli, Dominik
The Expert in the Next Office: Tools for Managing Operations and Security in the Era of Cyberspace by Kabay, M. E.
Blockchain: The New Internet? How You Can Benefit from Blockchain Technology Beyond Bitcoin, Cryptocurrency, and Ethereum by Rawson, Phillip
Encrypted Network Traffic Analysis by Ikram, Sumaiya Thaseen, Cherukuri, Aswani Kumar, Li, Gang
Cyber Safe: Protecting Your Digital Life in an Interconnected World by Blackwood, Nolan
Cyber Warfare: A Reference Handbook by Springer, Paul J.
Secure and Smart Cyber-Physical Systems by
Internet of Things Vulnerabilities and Recovery Strategies by
Advanced Network Technologies and Intelligent Computing: Third International Conference, Antic 2023, Varanasi, India, December 20-22, 2023, Proceeding by
Advanced Network Technologies and Intelligent Computing: Third International Conference, Antic 2023, Varanasi, India, December 20-22, 2023, Proceeding by
Advanced Network Technologies and Intelligent Computing: Third International Conference, Antic 2023, Varanasi, India, December 20-22, 2023, Proceeding by
Advanced Network Technologies and Intelligent Computing: Third International Conference, Antic 2023, Varanasi, India, December 20-22, 2023, Proceeding by
Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with by Sotiropoulos, John
ICT Systems Security and Privacy Protection: 39th Ifip International Conference, SEC 2024, Edinburgh, Uk, June 12-14, 2024, Proceedings by
Quantum Computing and Cryptography in Future Computers by
Quantum Computing and Cryptography in Future Computers by
Snort 3 QuickStart Pro: Detect malicious network activity, scan packets, generate alerts, and debug traffic for active intrusion prevention sy by Quolmar, Darvin
Quantum and Blockchain-Based Next Generation Sustainable Computing by
Defensive Security Handbook: Best Practices for Securing Infrastructure by Berlin, Amanda
Church Privacy Team: Building a Trust-Centered Church by Protecting Members' Privacy and Complying with Privacy Laws and Regulations by Buckler, Grace
The Complete Guide to Defense in Depth: Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach by Mukherjee, Akash
AWS Certified Security - Specialty Certification Guide (SCS-C01): AWS security concepts and best practices (English Edition) by Agarwal, Nikhil
Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research by
Proxmox VE 8 Praxisbuch: Informationen, Tipps und Tricks für Proxmox-Einsteiger und Fortgeschrittene by Kleinert, Ralf-Peter
Microsoft Intune Administration: Learning Intune concepts and migrating endpoint devices from SCCM (English Edition) by Bangia, Manish
The Politics of Cyber-Security by Dunn Cavelty, Myriam
The Politics of Cyber-Security by Dunn Cavelty, Myriam
Web 3.0: The Next Generation's Internet and Understanding the Concept of the Metaverse by
Hacker Mindset: Redes de Computadores by Santos, Rafael Da Silva
Cybersecurity for Normal People: A Practical Guide to Staying Safe Online by Montago, Charles
Business Email Compromise: Understanding, Preventing, and Responding to BEC Attacks by Hernandez, Felix
Simplificando la Ciberseguridad by Lorenzo, Tommy
5G and Fiber Optics Security Technologies for Smart Grid Cyber Defense by
5G and Fiber Optics Security Technologies for Smart Grid Cyber Defense by
Human Choice and Computers: 16th Ifip International Conference on Human Choice and Computers, Hcc 2024, Phuket, Thailand, September 8-10, 2024, Pr by
FBI Digital Exhaust Opt Out Guide by Bureau of Investigation, Federal
Global Audit Leadership: A Practical Approach to Leading a Global Internal Audit (GIA) Function in a Constantly Changing Internal and External by Bell, Audley L.
Global Audit Leadership: A Practical Approach to Leading a Global Internal Audit (GIA) Function in a Constantly Changing Internal and External by Bell, Audley L.
AWS Certified Security - Specialty Exam Guide by Singh, Sk
Counterterrorism and Cybersecurity: Total Information Awareness by Lee, Newton
Skunks, Bogies, Silent Hounds, and the Flying Fish: The Gulf of Tonkin Mystery, 2-4 August 1964 by Hanyok, Robert J.
Mastering Zero-knowledge Proofs: Practical study of security, scalability, and privacy in blockchain and modern systems (English Edition) by Dua, Amit, Kumar, Gaurav
Mobile Crowdsourcing: From Theory to Practice by
Universal Threats in Expert Applications and Solutions: Proceedings of 3rd Uni-Teas 2024, Volume 1 by
Cybersecurity Education by Berry, Roland
Corporate Cybersecurity in the Aviation, Tourism, and Hospitality Sector by
Corporate Cybersecurity in the Aviation, Tourism, and Hospitality Sector by
Attack-And-Defense Games for Control Systems: Analysis and Synthesis by Yuan, Yuan, Dong, Huapeng, Yuan, Huanhuan
Policy as Code: Improving Cloud Native Security by Ray, Jimmy
A Study of Statistical Zero-Knowledge Proofs by Vadhan, Salil P.
Federation-As-A-Service: A Cloud Federation Solution for the Public Sector by
Cybersecurity Sustainability by Berry, Roland
Navigating the World of Deepfake Technology by
Navigating the World of Deepfake Technology by
6G Security Education and Multidisciplinary Implementation by
6G Security Education and Multidisciplinary Implementation by
Cryptography and Embedded Systems Security by Breier, Jakub, Hou, Xiaolu
Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture by Crawley, Brett
Digital Shakedown: The Complete Guide to Understanding and Combating Ransomware by Halikias, Harry
Cryptography Algorithms - Second Edition: Get to grips with new algorithms in blockchain, zero-knowledge, homomorphic encryption, and quantum by Bertaccini, Massimo
Cybersecurity Secrets by Kathy, Black Hat
Decentralized Music: Exploring Blockchain for Artistic Research by
Inside the Sony Hack: The Story Behind America's Most Notorious Brink-of-War Cover-up by Heckenlively, Kent
Innovations in Modern Cryptography by
Innovations in Modern Cryptography by
Decentralized Music: Exploring Blockchain for Artistic Research by
The Hack Is Back: Techniques to Beat Hackers at Their Own Games by Varsalone, Jesse, Haller, Christopher
The Hack Is Back: Techniques to Beat Hackers at Their Own Games by Varsalone, Jesse, Haller, Christopher
Advances in Cryptology - Crypto 2024: 44th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2024, Proceedings, Part I by
Advances in Cryptology - Crypto 2024: 44th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2024, Proceedings, Part I by
Advances in Cryptology - Crypto 2024: 44th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2024, Proceedings, Part I by
Advances in Cryptology - Crypto 2024: 44th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2024, Proceedings, Part V by
Advances in Cryptology - Crypto 2024: 44th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2024, Proceedings, Part V by
Advances in Cryptology - Crypto 2024: 44th Annual International Cryptology Conference, Crypto 2024, Santa Barbara, Ca, Usa, August 18-22, 2024, Procee by
Advances in Cryptology - Crypto 2024: 44th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2024, Proceedings, Part X by
Advances in Cryptology - Crypto 2024: 44th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2024, Proceedings, Part I by
Advances in Cryptology - Crypto 2024: 44th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2024, Proceedings, Part I by
Advances in Cryptology - Crypto 2024: 44th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 18-22, 2024, Proceedings, Part V by
Become a Hacker: Hacking Secrets Revealed by M, Sam
IoT Fundamentals with a Practical Approach by Goyal, Sonali, Batra, Neera
IoT Fundamentals with a Practical Approach by Batra, Neera, Goyal, Sonali
Cybersecurity Risk Management: Enhancing Leadership and Expertise by
Practical Cyber Intelligence: A Hands-On Guide to Digital Forensics by Jakobsen, Adam Tilmar
Nine Steps to Success: An ISO 27001:2022 Implementation Overview by Calder, Alan
Cibersegurança para Gestores: Construindo e Mantendo uma Fortaleza Digital by Doin, Igor
Quality, Reliability, Security and Robustness in Heterogeneous Systems: 19th Eai International Conference, Qshine 2023, Shenzhen, China, October 8 - 9 by
Quality, Reliability, Security and Robustness in Heterogeneous Systems: 19th Eai International Conference, Qshine 2023, Shenzhen, China, October 8 - 9 by
Effective AI Security: Mastering the Art of Safeguarding Artificial Intelligence Systems in a Threat-Driven World by Stoianov, Nick
Construction Audit: Building a Solid Foundation by Cicchella, Denise
Construction Audit: Building a Solid Foundation by Cicchella, Denise
Generative AI and Implications for Ethics, Security, and Data Management by
Generative AI and Implications for Ethics, Security, and Data Management by
Metaverse Security Paradigms by
Metaverse Security Paradigms by
Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning by
Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning by
Parenting in the Digital Age: Raising Kids in a Tech-Driven World by Ravenscroft, T. J.
Incident Response for Windows: Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems by Ostrovskaya, Svetlana, Tykushin, Anatoly
The Unforeseen Threat of AI on Security by Joseph, Emmanuel
Advanced Machine Learning, AI, and Cybersecurity in Web3: Theoretical Knowledge and Practical Application by Bouarara, Hadj Ahmed
Advanced Machine Learning, AI, and Cybersecurity in Web3: Theoretical Knowledge and Practical Application by Bouarara, Hadj Ahmed
The Gen Z Rebel Cookbook: Cyber Warfare and Guerrilla Methods in Full Detail for the Upcoming Rebellion by Madison, Woke
Global Politics Shitshow: The Dark Policy Implications and Unbelievable Decisions Shaping Our World Today by Adler, Eric
Evolving Roles of Chief Information Security Officers and Chief Risk Officers by Redmond (Mba), Michael C.
Creation of Postfix Mail Server Based on Virtual Users and Domains by Alassouli, Hidaia Mahmood
Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology by Patterson, Wayne, Winston-Proctor, Cynthia E.
Secret History: The Story of Cryptology by Bauer, Craig
Practical Mathematical Cryptography by Gjøsteen, Kristian
Cyber-Physical Systems and Industry 4.0: Practical Applications and Security Management by
Applications of Blockchain and Big IoT Systems: Digital Solutions for Diverse Industries by
Concepts and Design Innovations addressing the Digital Transformation of Data Spaces and Marketplaces: i3-MARKET Book Series - Part I: A Vision to the by
Systems and Implemented Technologies for Data-Driven Innovation, addressing Data Spaces and Marketplaces Semantic Interoperability Needs: i3-MARKET Se by
Technical Innovation, solving the Data Spaces and Marketplaces Interoperability Problems for the Global Data-Driven Economy: i3-MARKET Series - Part I by
Methodology to Improve Control Plane Security in SDN Environments by Taye, Bayisa, Desalegn, Wendwossen, Shaikh, Javed
Large Language Models in Cybersecurity: Threats, Exposure and Mitigation by
Cybersecurity: Ethics, Legal, Risks, and Policies by Priyadarshini, Ishaani, Cotton, Chase
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet by Senécal, David
Sustainable Development Using Private AI: Security Models and Applications by
Cybersecurity Playbook for Executives by Trabelsi, Anis
Cybersecurity Playbook for Executives by Trabelsi, Anis
Cloud Security: Concepts, Applications and Practices by
DevSecOps for Azure: End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud by Okeyode, David, Kirui, Joylynn
Cybersecurity in Lifestyle & Hobbies: The Unbelievable Truths and Hidden Realities That Are Protecting Our Personal Lives in the Digital Age by Kathy, Black Hat
Counter Terrorism Issues: Case Studies in the Courtroom by Castagnera, James Ottavio
Counter Terrorism Issues: Case Studies in the Courtroom by Castagnera, James Ottavio
Zero Trust Sicherheit: Ein Leitfaden Für Unternehmen by Chapman, Jerry W., Garbis, Jason
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting by Baloch, Rafay
Shores of Okinawa by Greenwood, Patrick
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting by Baloch, Rafay
Cybersecurity Simplified: A Guide for Beginners, Students, and Job Seekers by Singh, Inderjit, Aroraa, Gaurav
Safer @ Home with pfSense(R) by Lines, Michael
Disinformation in Open Online Media: 6th Multidisciplinary International Symposium, Misdoom 2024, Münster, Germany, September 2-4, 2024, Proceedings by
Design for Real Life by Wachter-Boettcher, Sara, Meyer, Eric A.
Security and Privacy in Web 3.0 by Shen, Meng, Tang, Xiangyun, Wang, Wei
Cissp Cert Guide by Abernathy, Robin, Hayes, Darren
Understanding Cybersecurity Management in Healthcare: Challenges, Strategies and Trends by Parizadeh, Mona, Sharma, DILLI Prasad, Habibi Lashkari, Arash
Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles by Horst, Carsten, Buckwell, Mark, Daele, Stefaan Van
Handbook of Trustworthy Federated Learning by
Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence by Su, Rong
Computer Security - Esorics 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Par by
Computer Security - Esorics 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Par by
Federated Learning: Unlocking the Power of Collaborative Intelligence by
Computer Security - Esorics 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Par by
Computer Security - Esorics 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Par by
Information Security - Risk Management Framework: For Social Engineering Attacks and Digital Prevention Techniques by Abdullah-Al-Musa Ahmed, Shekh
Geopolitical Cyber Threat Intelligence by Dimyanoglu, Robin
Psybersecurity: Human Factors of Cyber Defence by
High-Level Synthesis Based Methodologies for Hardware Security, Trust and IP Protection by SenGupta, Anirban
See More