• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2024

A Comprehensive Guide to the Nist Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice by Edwards, Jason
Security and Cryptography for Networks: 14th International Conference, Scn 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II by
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats by Cucci, Kyle
Microcontroller Exploits by Goodspeed, Travis
Security and Cryptography for Networks: 14th International Conference, Scn 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part I by
Cybersecurity in Emerging Healthcare Systems by
Crafting Secure Software: An engineering leader's guide to security by design by Bulmash, Greg, Segura, Thomas
Utilizing Generative AI for Cyber Defense Strategies by
Data Governance: A Guide by Sargiotis, Dimitrios
Utilizing Generative AI for Cyber Defense Strategies by
A Beginner's Compass to Navigating Cyber Security by Tank, Jignesh
Cryptographic and Information Security Approaches for Images and Videos by Ramakrishnan, S.
IT Audit Field Manual: Strengthen your cyber defense through proactive IT auditing by Heuermann, Lewis
Reshaping CyberSecurity With Generative AI Techniques by
Strategic Innovations of AI and ML for E-Commerce Data Security by
Strategic Innovations of AI and ML for E-Commerce Data Security by
Reshaping CyberSecurity With Generative AI Techniques by
Advances in Information and Computer Security: 19th International Workshop on Security, Iwsec 2024, Kyoto, Japan, September 17-19, 2024, Proceedings by
Zero Trust Security Handbook by David, Mark
Artificial Intelligence Solutions for Cyber-Physical Systems by
Cybersecurity, Law, and Economics: The Case of India by
Emerging Trends in Expert Applications and Security: Proceedings of Ice-Teas 2024, Volume 2 by
Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking by Messier, Ric
Continuous Auditing with AI in the Public Sector by
The Guerrilla Cyber Defender: Cyberwarfare Tactics for an AI-Powered World by Drolsum, Joar
Cybersecurity in Italy: Governance, Policies and Ecosystem by Martino, Luigi
AI Applications in Cyber Security and Communication Networks: Proceedings of Ninth International Conference on Cyber Security, Privacy in Communicatio by
Cybersecurity in Context: Technology, Policy, and Law by Hoofnagle, Chris Jay, Richard, Golden G.
Advances in Artificial-Business Analytics and Quantum Machine Learning: Select Proceedings of the 3rd International Conference, Com-It-Con 2023, Volum by
Cybercrime: An Encyclopedia of Digital Crime by Marion, Nancy E., Twede, Jason
Cybersecurity Essentials: Practical Tools for Today's Digital Defenders by Cochran, Kodi A.
Optimal Spending on Cybersecurity Measures: Digital Privacy and Data Protection by Kissoon, Tara
A Mechanics Code by Sparrow, Jason
Practical Cloud Security: A Guide for Secure Design and Deployment (2nd Edition) by Dotson, Chris
Code Work: Hacking Across the Us/México Techno-Borderlands by Beltrán, Héctor
Stateless Hash-Based Digital Signature Standard: Federal Information Processing Standards 205 by U S Dept of Commerce, Nist
Data Independence: Reclaiming Privacy in an Era of Evolving Tech by Chaar, Wes
Overnight Hercules for Network Security: Become a Security Analyst by Tsikerdekis, Michail
Research Advances in Network Technologies: Volume 2 by
Cctv Systems for Beginners: Samy's Journey in Physical Security Systems by Hosny, Ahmed
Quantum Cryptography: Securing the Future with Quantum Tech by Techworth, Alex C.
The Cybersecurity Mesh Architecture: Composable, flexible, and scalable security approach for a resilient security ecosystem (English Edition) by Kumar, Tarun
Foundations and Opportunities of Biometrics: A Guide to Technology, Applications, and Regulations by Salice, Dario, Salice, Jennifer
Electronic Voting: 9th International Joint Conference, E-Vote-Id 2024, Tarragona, Spain, October 2-4, 2024, Proceedings by
Evolution of Web 3.0 and Blockchain: The world of decentralization and smart contracts by Jung, Younchan
Emerging Trends in Expert Applications and Security: Proceedings of Ice-Teas 2024, Volume 1 by
Explain Like I'm 5: Blockchains & Cryptocurrencies by Tennever, Eric
Exam Ref Az-500 Microsoft Azure Security Technologies by Thomas, Orin, Diogenes, Yuri
Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to Cis 18 Controls by Edwards, Jason
Linux for Hackers: 3 books in 1 - The #1 Hacking Course From Beginner to Advanced. Learn it Well & Fast (2025) by Reed, Mark, Press, Cyberedge
Little Hackers by Darling, Julie
Cryptology and Network Security: 23rd International Conference, Cans 2024, Cambridge, Uk, September 24-27, 2024, Proceedings, Part II by
Digital Skill Development for Industry 4.0 by
Paradigms on Technology Development for Security Practitioners by
Offensive Security Using Python: A hands-on guide to offensive tactics and threat mitigation using practical strategies by Rehim, Rejah, Mohan, Manindar
Coin Wars: Who will win the cryptocurrency war? by Jung, Younchan
Godfathers and Cybersecurity: A Gangster's Take on Cyber Security by Harris, Lance
Black Hat Bash: Creative Scripting for Hackers and Pentesters by Aleks, Nick, Farhi, Dolev
Faik: A Practical Guide to Living in a World of Deepfakes, Disinformation, and Ai-Generated Deceptions by Carpenter, Perry
Program or Be Programmed: Eleven Commands for the AI Future by Rushkoff, Douglas
Propaganda: From Disinformation and Influence to Operations and Information Warfare by Olejnik, Lukasz
Propaganda: From Disinformation and Influence to Operations and Information Warfare by Olejnik, Lukasz
Cryptology and Network Security: 23rd International Conference, Cans 2024, Cambridge, Uk, September 24-27, 2024, Proceedings, Part I by
Advances in Information Communication Technology and Computing: Proceedings of Aictc 2024, Volume 1 by
Data Privacy Decoded: Navigating Laws and Regulations by Techworth, Alex C.
The Venetian Ciphers of Agostino Amadi: Volumes 4-10: English version by Scheers, D. P. J. a.
Human Impact on Security and Privacy: Network and Human Security, Social Media, and Devices by
Human Impact on Security and Privacy: Network and Human Security, Social Media, and Devices by
The Language of Cyber Attacks: A Rhetoric of Deception by Mauro, Aaron
The Language of Cyber Attacks: A Rhetoric of Deception by Mauro, Aaron
Advanced ASP.NET Core 8 Security: Move Beyond ASP.NET Documentation and Learn Real Security by Norberg, Scott
Operational Auditing: Principles and Techniques for a Changing World by Murdock, Hernan
Cybersecurity for Reconfigurable Hardware Based Critical Infrastructures by Chakrabarti, Amlan, Guha, Krishnendu, Singh, Jyoti Prakash
Leveraging the Potential of Artificial Intelligence in the Real World: Smart Cities and Healthcare by
5G and Beyond: The Future of IoT by
Information Security and Optimization by
Convergence of Blockchain Technology and E-Business: Concepts, Applications, and Case Studies by
Data Protection and Privacy in Healthcare: Research and Innovations by
Privacy Vulnerabilities and Data Security Challenges in the IoT by
Cyber Defense Mechanisms: Security, Privacy, and Challenges by
Handbook of IoT and Blockchain: Methods, Solutions, and Recent Advancements by
Securing IoT and Big Data: Next Generation Intelligence by
Internet of Medical Things: Paradigm of Wearable Devices by
Internet of Things: Integration and Security Challenges by
AI and Deep Learning in Biometric Security: Trends, Potential, and Challenges by
Blockchain Technology: Fundamentals, Applications, and Case Studies by
IoT Applications, Security Threats, and Countermeasures by
Secure Edge Computing: Applications, Techniques and Challenges by
The Security Leader's Communication Playbook: Bridging the Gap between Security and the Business by Brown, Jeffrey W.
Blockchain for Information Security and Privacy by
Cybersecurity Issues in Emerging Technologies by
Privacy and Security Challenges in Cloud Computing: A Holistic Approach by
Blockchain and IoT Integration: Approaches and Applications by
Secure Data Science: Integrating Cyber Security and Data Science by Kantarcioglu, Murat, Khan, Latifur, Thuraisingham, Bhavani
Security and Privacy Trends in Cloud Computing and Big Data by
Holistic Approach to Quantum Cryptography in Cyber Security by
Evidence-Based Cybersecurity: Foundations, Research, and Practice by Pomerleau, Pierre-Luc, Maimon, David
Auditing Information and Cyber Security Governance: A Controls-Based Approach by Davis, Robert E.
Future Trends in 5G and 6G: Challenges, Architecture, and Applications by
Designing Secure Systems by Melone, Michael
Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications by
Blockchain Technology for Data Privacy Management by
Cybersecurity Lessons from CoVID-19 by Slade, Robert
Artificial Intelligence (AI): Recent Trends and Applications by
Blockchain, Internet of Things, and Artificial Intelligence by
Internet of Things, Threats, Landscape, and Countermeasures by
Cyber-Security Threats, Actors, and Dynamic Mitigation by
Advances in Enterprise Technology Risk Assessment by
Advances in Enterprise Technology Risk Assessment by
Next-Generation Enterprise Security and Governance by
Security Analytics: A Data Centric Approach to Information Security by
Green Computing in Network Security: Energy Efficient Solutions for Business and Home by
Recent Trends in Blockchain for Information Systems Security and Privacy by
Advancing Computational Intelligence Techniques for Security Systems Design by
Nanoelectronic Devices for Hardware and Software Security by
5G Cyber Risks and Mitigation by Soni, Sabhyata
Cybersecurity Public Policy: SWOT Analysis Conducted on 43 Countries by Fowler, Bradley, Maranga, Kennedy
Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience by Osei-Bryson, Kweku-Muata, Donalds, Charlette, Barclay, Corlane
Advances in Cyber Security and Intelligent Analytics by
Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions by
Trust, Security and Privacy for Big Data by
Cyber Security Applications for Industry 4.0 by
Unleashing the Art of Digital Forensics by
Securing Social Networks in Cyberspace by
An Interdisciplinary Approach to Modern Network Security by
The Debates Shaping Spectrum Policy by
Finitely Presented Groups: With Applications in Post-Quantum Cryptography and Artificial Intelligence by
Securing Enterprise Networks with Cisco Meraki by Singh, Simerjit, Chaney, Ryan
Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures by Lekkala, Seshagirirao, Gurijala, Priyanka
Open-Source Security Operations Center (Soc): A Complete Guide to Establishing, Managing, and Maintaining a Modern Soc by Basta, Alfred, Anwar, Waqar, Basta, Nadine
Autonomous Data Security: Creating a Proactive Enterprise Protection Plan by Neelakrishnan, Priyanka
Cases on Security, Safety, and Risk Management by
Scalable Modeling and Efficient Management of IoT Applications by
Scalable Modeling and Efficient Management of IoT Applications by
Cases on Security, Safety, and Risk Management by
Intelligent Mobile Malware Detection by Surendran, Roopak, John, Teenu, Thomas, Tony
Cyber Security and Operations Management for Industry 4.0 by
Information System Audit: How to Control the Digital Disruption by Peret, Philippe
Big Data Analytics in Fog-Enabled IoT Networks: Towards a Privacy and Security Perspective by
Security Issues for Wireless Sensor Networks by Bhardwaj, Anuj, Verma, Parag, Dumka, Ankur
Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation by Lanza, Claudia
Introduction to the Cyber Ranges by Pandey, Bishwajeet, Ahmad, Shabeer
Cyber Crime Investigator's Field Guide by Middleton, Bruce
Agile Audit Transformation and Beyond by Deroche, Toby
Security Awareness Design in the New Normal Age by Goucher, Wendy F.
Security in Iot: The Changing Perspective by
Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining by Zolfaghari, Behrouz, Bibak, Khodakhast, Koshiba, Takeshi
Vehicular AD Hoc Networks: Futuristic Technologies for Interactive Modelling, Dimensioning, and Optimization by
Phishing Detection Using Content-Based Image Classification by Khandelwal, Shekhar, Das, Rik
Advanced Circuits and Systems for Healthcare and Security Applications by
Spatial Grasp as a Model for Space-Based Control and Management Systems by Sapaty, Peter Simon
Secure Data Management for Online Learning Applications by
Cognitive Radio: Computing Techniques, Network Security and Challenges by
An Integrated Approach to Home Security and Safety Systems by Batra, Neera, Batra, N. K., Goyal, Sonali
Authorization and Access Control: Foundations, Frameworks, and Applications by N. Mahalle, Parikshit, S. Bhong, Shashikant, R. Shinde, Gitanjali
Handbook of Sharing Confidential Data: Differential Privacy, Secure Multiparty Computation, and Synthetic Data by
Agile Enterprise Risk Management: Risk-Based Thinking, Multi-Disciplinary Management and Digital Transformation by Wiener, Howard M.
Multimodal Biometric Systems: Security and Applications by
Ultra-Dense Heterogeneous Networks by Wang, Qubeijian, Zhao, Nan, Sun, Wen
Reweaving the Web by Whitt, Richard S.
Generative AI: Phishing and Cybersecurity Metrics by Das, Ravindra
Generative AI: Phishing and Cybersecurity Metrics by Das, Ravindra
Modern Network Observability: A hands-on approach using open source tools such as Telegraf, Prometheus, and Grafana by Flores, David, Adell, Christian, Vanderaa, Josh
Security and Privacy in Communication Networks: 19th Eai International Conference, Securecomm 2023, Hong Kong, China, October 19-21, 2023, Proceedings by
Handbook of Financial Cryptography and Security by
The Big Sort: Why the Clustering of Like-Minded America Is Tearing Us Apart by Bishop, Bill
Split Federated Learning for Secure Iot Applications: Concepts, Frameworks, Applications and Case Studies by
Security and Privacy in Communication Networks: 19th Eai International Conference, Securecomm 2023, Hong Kong, China, October 19-21, 2023, Proceedings by
Beyond Firewalls: Security-at-Scale by Garg, Naveen Kumar
Protecting Yourself: How Data Theft can Impact You by Spencer, Danielle
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption by Aumasson, Jean-Philippe
Quantum Nonlinear Function Obfuscation Theory and Application by Shang, Tao
IT Governance: An international guide to data security and ISO 27001/ISO 27002, Eighth edition by Watkins, Steve, Calder, Alan
Data Security and Privacy Protection: Second International Conference, Dspp 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part II by
Computational Color Imaging: 8th International Workshop, Cciw 2024, Milan, Italy, September 25-27, 2024, Proceedings by
The Ultimate Linux Shell Scripting Guide: Automate, Optimize, and Empower tasks with Linux Shell Scripting by Tevault, Donald a.
Advances in Artificial-Business Analytics and Quantum Machine Learning: Select Proceedings of the 3rd International Conference, Com-It-Con 2023, Volum by
Analytical and Stochastic Modelling Techniques and Applications: 28th International Conference, Asmta 2024, Venice, Italy, June 14, 2024, Proceedings by
Proceedings of Third International Conference on Computing and Communication Networks: ICCCN 2023, Volume 2 by
Cloud Native Application Protection Platforms: A Guide to Cnapps and the Foundations of Comprehensive Cloud Security by Giguere, Stephen, Miles, Russ, Smith, Taylor
Security and Privacy in Communication Networks: 19th Eai International Conference, Securecomm 2023, Hong Kong, China, October 19-21, 2023, Proceedings by
Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT by Pattar, Santosh, K. R., Venugopal, M. S., Roopa
Cryptography by Louridas, Panos
Inside Cyber Warfare: Mapping the Cyber Underworld by Caruso, Jeffrey
Surviving a Cyberattack: Securing Social Media and Protecting Your Home Network by Shipley, Todd G., Bowker, Art
Combating Cyberattacks Targeting the AI Ecosystem: Assessing Threats, Risks, and Vulnerabilities by Sood, Aditya K.
Enhancing Security and Regulations in Libraries With Blockchain Technology by
It-Forensik: Ein Grundkurs by Raab-Düsterhöft, Antje
Advancing Cyber Security Through Quantum Cryptography by
Advancing Cyber Security Through Quantum Cryptography by
Enhancing Security and Regulations in Libraries With Blockchain Technology by
Information Security: 27th International Conference, Isc 2024, Arlington, Va, Usa, October 23-25, 2024, Proceedings, Part I by
Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Bhatti, Baber Majid, Ali, Atif
Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Ali, Atif, Bhatti, Baber Majid
Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics by
Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics by
Information Security: 27th International Conference, Isc 2024, Arlington, Va, Usa, October 23-25, 2024, Proceedings, Part II by
Modern Cryptography: The Practical Guide by Dholakia, Sandip
AWS Security Cookbook - Second Edition: Practical solutions for securing AWS cloud infrastructure with essential services and best practices by Kanikathottu, Heartin
Information Security Practice and Experience: 19th International Conference, Ispec 2024, Wuhan, China, October 25-27, 2024, Proceedings by
See More