• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2024

Modern Cryptography: The Practical Guide by Dholakia, Sandip
AWS Security Cookbook - Second Edition: Practical solutions for securing AWS cloud infrastructure with essential services and best practices by Kanikathottu, Heartin
Information Security Practice and Experience: 19th International Conference, Ispec 2024, Wuhan, China, October 25-27, 2024, Proceedings by
Information Security Incident and Data Breach Management: A Step-By-Step Approach by Kyriazoglou, John
Code and Conscience: Exploring Technology, Human Rights, and Ethics in Multidisciplinary AI Education by
The Subjective Value of Privacy: Assessing Individuals' Calculus of Costs and Benefits in the Context of State Surveillance by Antoine, Lukas
History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms by Dooley, John F.
Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems by Rioul, Olivier, Cheng, Wei, Guilley, Sylvain
Industrial Internet of Things Security: Protecting Ai-Enabled Engineering Systems in Cloud and Edge Environments by
A Reference Manual for Data Privacy Laws and Cyber Frameworks by Das, Ravindra
A Reference Manual for Data Privacy Laws and Cyber Frameworks by Das, Ravindra
Cybersecurity Tabletop Exercises: From Planning to Execution by Hollenberger, John, Lelewski, Robert
Security and Privacy in Smart Environments by
Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape by Bhardwaj, Akashdeep
Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape by Bhardwaj, Akashdeep
Introduction to Biometrics by Ross, Arun A., Jain, Anil K., Nandakumar, Karthik
Cyber Resilience System Engineering Empowered by Endogenous Security and Safety by Wu, Jiangxing
The Intelligence Pyramid: A Comprehensive Guide to Building and Maturing Cyber Intelligence Teams by Peeler, Vince
The Intelligence Pyramid: A Comprehensive Guide to Building and Maturing Cyber Intelligence Teams by Peeler, Vince
Cyber Space and Outer Space Security by
CISA - Certified Information Systems Auditor Study Guide - Third Edition: Ace the CISA exam with practical examples and over 1000 exam-oriented practi by Doshi, Hemang
Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization by Xiao, Huang, Xu, Peng, Kolosnjaji, Bojan
From Street-Smart to Web-Wise(r): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 1) by Marcella, Al, Parisi, Madeline, Moore, Brian
From Street-Smart to Web-Wise(r): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 1) by Marcella, Al, Parisi, Madeline, Moore, Brian
Unveiling NIST Cybersecurity Framework 2.0: Secure your organization with the practical applications of CSF by Brown, Jason
Cyber Warfare, Security and Space Computing: Second International Conference on Cyber Warfare, Security and Space Computing, Spacsec 2024, Jaipur, Ind by
Burners & Black Markets by Henderson, Lance
The Ciso Playbook by Andreu, Andres
The Ciso Playbook by Andreu, Andres
Information Technology for Peace and Security: It Applications and Infrastructures in Conflicts, Crises, War, and Peace by
Futuro Descentralizado: Cómo la inteligencia artificial y la Blockchain transformarán nuestras vidas by Fiorillo, Claudio
Online Safety Made Simple: Protecting Yourself on the Internet by Mercer, Alex
Blockchain and Web3.0 Technology Innovation and Application: First Conference, Bwtac 2024, Guangzhou, China, November 6-8, 2024, Proceedings by
Applications and Techniques in Information Security: 14th International Conference, Atis 2024, Tamil Nadu, India, November 22-24, 2024, Proceedings by
Breaking Web Security: Step-by-Step Penetration Testing for Professionals by Khaled, Hossam
Phishing for Answers: Risk Identification and Mitigation Strategies by Merz, Terry R., Shaw, Lawrence E.
Secure Health: A Guide to Cybersecurity for Healthcare Managers by
Digital Twin Technology by
Entity Authentication and Personal Privacy in Future Cellular Systems by Koien, Geir M.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence by
Enigma Myth Deciphered: Codebreakers, Commanders and Politicians by Grajek, Marek
Informational Privacy for Service Design: An Ethical Framework for Designing Privacy-Oriented Services by Parrilli, Davide M.
Homomorphic Encryption for Data Science (He4ds) by Drucker, Nir, Adir, Allon, Aharoni, Ehud
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches by Wolff, Josephine
Ransomware Analysis: Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence by François, Jérôme, Lahmadi, Abdelkader, Lanza, Claudia
Generative AI and Cyberbullying by Das, Ravindra
Generative AI and Cyberbullying by Das, Ravindra
There's No Such Thing as Crypto Crime: An Investigative Handbook by Furneaux, Nick
Supply Chain Software Security: Ai, Iot, and Application Security by Syed, Aamiruddin
Das Standard-Datenschutzmodell (Sdm): Einführung in Die Umsetzung Der Operativen Anforderungen Der Dsgvo by Rost, Martin
Malware: Handbook of Prevention and Detection by
Web Services - Icws 2024: 31st International Conference, Held as Part of the Services Conference Federation, Scf 2024, Bangkok, Thailand, Novemb by
Blockchain - Icbc 2024: 7th International Conference, Held as Part of the Services Conference Federation, Scf 2024, Bangkok, Thailand, Novembe by
Internet of Things - Iciot 2024: 9th International Conference, Held as Part of the Services Conference Federation, Scf 2024, Bangkok, Thailand, Novemb by
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons by
Generative AI and Digital Forensics by Das, Ravindra
Generative AI and Digital Forensics by Das, Ravindra
Building Secure PHP Applications: A Comprehensive Guide to Protecting Your Web Applications from Threats by Sahu, Satej Kumar
Leveraging Blockchain Technology: Governance, Risk, Compliance, Security, and Benevolent Use Cases by
Zero to Hero: Your Guide to a Career in Cybersecurity by Asare, Felix Kyei
Zero to Hero: Your Guide to a Career in Cybersecurity by Asare, Felix Kyei
Web3 by Zhang, Fan, Huang, Ken, Yang, Youwei
Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices by Ouaissa, Mariya, Ouaissa, Mariyam
Iot Enabled-DC Microgrids: Architecture, Algorithms, Applications, and Technologies by
Leveraging Artificial Intelligence (Ai) Competencies for Next-Generation Cybersecurity Solutions by
Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices by Ouaissa, Mariyam, Ouaissa, Mariya
Open Source Intelligence (Osint) - A Practical Introduction: A Field Manual by Prasad, Anand R., Kwanoran, Suksit, Khera, Varin
Information Security Management Principles by Green, Jeremy, Taylor, Andy, Alexander, David
Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition) by Berlin, Amanda
Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition) by Berlin, Amanda
Cyber Certainty by Tobok, Daniel
CCNA Certification Study Guide Volume 2: Exam 200-301 V1.1 by Lammle, Todd, Robb, Donald
AI for Big Data-Based Engineering Applications from Security Perspectives by
The Zero Trust Framework: Threat Hunting & Quantum Mechanics by Das, Ravindra
Future Connected Technologies: Growing Convergence and Security Implications by
Manuscrypt: Designed for Mankind - Anthropocentric Information Security by Upadhyaya, Prashant A.
Manuscrypt: Designed for Mankind - Anthropocentric Information Security by Upadhyaya, Prashant A.
It Governance and Information Security: Guides, Standards, and Frameworks by Alazab, Mamoun, Maleh, Yassine, Sahid, Abdelkebir
Secure Big-Data Analytics for Emerging Healthcare in 5g and Beyond: Concepts, Paradigms, and Solutions by
Elliptic Curve Cryptography for Developers by Rosing, Michael
Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers by Crose, Emily
The Closing of the Auditor's Mind?: How to Reverse the Erosion of Trust, Virtue, and Wisdom in Modern Auditing by J. O'Regan, David
The Closing of the Auditor's Mind?: How to Reverse the Erosion of Trust, Virtue, and Wisdom in Modern Auditing by J. O'Regan, David
Protecting Location Privacy in the Era of Big Data: A Technical Perspective by Mahmood, Adnan, Sheng, Quan Z., Yan, Yan
Cyberdynamx: The Art and Science of Building a Simplified Digital Security Program by Blais, Curtis L.
Comptia A+ Certification Companion: Hands-On Preparation and Practice for Exams 220-1101 & 220-1102 by Cochran, Kodi A.
Principles & Applications of Blockchain Systems: How to Overcome the Cap Trilemma in Consortium Blockchain by Wang, Han, Liu, Hui
Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities by
Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography by
Computational Intelligence for Cybersecurity Management and Applications by
Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis by Garg, Shivi, Baliyan, Niyati
Big Data and Blockchain Technology for Secure IoT Applications by
Handbook of Formal Analysis and Verification in Cryptography by
Introduction to Machine Learning with Applications in Information Security by Stamp, Mark
Securing the Nation's Critical Infrastructures: A Guide for the 2021-2025 Administration by
Internet of Things and Cyber Physical Systems: Security and Forensics by
Security Implementation in Internet of Medical Things by
AI, Machine Learning and Deep Learning: A Security Perspective by
Ransomware Evolution by
Networking All-In-One for Dummies by Lowe, Doug
The Use of Information and Communication Technologies (Ict) in the Management of the Innovative and Smart City by
Surviving the Wild Wild Web: A User's Playbook to Navigating the Internet's Trickiest Terrains by Gergely, Marton, Grey, Ian, Saleous, Heba
Surviving the Wild Wild Web: A User's Playbook to Navigating the Internet's Trickiest Terrains by Gergely, Marton, Grey, Ian, Saleous, Heba
From Street-smart to Web-wise(R): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 2) by Moore, Brian, Parisi, Madeline, Marcella, Al
From Street-smart to Web-wise(R): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 2) by Moore, Brian, Parisi, Madeline, Marcella, Al
Advancements in Cyber Crime Investigations and Modern Data Analytics by
Web Application Pentesting: A Comprehensive Guide for Professionals by Maleh, Yassine
Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security: Ic4s'05 Volume 2 by
Big Data, Data Mining and Data Science: Algorithms, Infrastructures, Management and Security by
Security and Trust Management: 20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19-20, 2024, Proceedings by
Artificial Intelligence Using Federated Learning: Fundamentals, Challenges, and Applications by
Agile Security in the Digital Era: Challenges and Cybersecurity Trends by
Handbook of Digital Innovation, Transformation, and Sustainable Development in a Post-Pandemic Era by
Cyber Investigations of Smart Devices by Bhardwaj, Akashdeep
Cyber Investigations of Smart Devices by Bhardwaj, Akashdeep
Mastering Cybersecurity: A Practical Guide for Professionals (Volume 1) by Bhardwaj, Akashdeep
Mastering Cybersecurity: A Practical Guide for Professionals (Volume 1) by Bhardwaj, Akashdeep
Artificial Intelligence and Iot for Cyber Security Solutions in Smart Cities by
Artificial Intelligence for Blockchain and Cybersecurity Powered Iot Applications by
Public Key Cryptosystems by Bas, Esra
Public Key Cryptosystems by Bas, Esra
Synthetic and Novel Drugs: Emerging Issues, Legal Policy and Public Health by
Policing Trends and Issues in America by Birzer, Michael L.
Penology: An Introduction to Corrections by Yager, Jan
Transnational Policing: Fifa and Its Agreements by Nakueira, Sophie
Telematics and Computing: 13th International Congress of Telematics and Computing, Witcom 2024, Mazatlan, Mexico, November 4-8, 2024, Proceeding by