• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2025

AI Versus Cybersecurity: Navigating the Cybersecurity of the Future by Chaganti, Krishna Chaitanya
Iapp Cipp / Us Certified Information Privacy Professional Study Guide by Chapple, Mike, Shelley, Joe
Cisa Certified Information Systems Auditor Study Guide: Covers 2024 - 2029 Exam Objectives by Chapple, Mike, Gregory, Peter H.
Principles of AI Governance and Model Risk Management: Master the Techniques for Ethical and Transparent AI Systems by Sayles, James
Investing in Cryptos for a Free Future: A complete guide for beginners and enthusiasts, on the path to financial freedom with cryptocurrencies by Satoshi, Degen
Phishing verhindern - Psychologisches Wissen und Strategien: Raffinierter als die Phishing-Angreifer sein - 90% der Cyberangriffe gelingen durch Phish by Mack, Michael
Forensic Cybersecurity: Protecting and Investigating Digital Data by Rochefort, Mylan
Bitcoin, Crypto, Blockchain: Making Sense of It in Small Bytes by Griffin, Frederick, Shakir, Sahir
Building a Secure Healthcare Facility: Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Healthcare Facilities by Sliger, Derek
Management of Cybersecurity by Whitman, Michael, Mattord, Herbert
A Beginner's Guide to Web Application Penetration Testing by Abdollahi, Ali
Safeguarding the Digital Frontier: Advanced Strategies for Cybersecurity and Privacy by Elmassarawy, Ayman
Ciberseguridad para Todos: Guía Básica para Protegerte en el Mundo Digital by Rojas Sarria, Francisco J.
Illuminating the Intricacies of Cryptography and Its Impact on Modern Warfare and Global Security: Weaving Connections Between Earth and Sky by Sterling, Jasper
Advances in Cryptology - ASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, by
Advances in Cryptology - Asiacrypt 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, by
Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing by Nandakumar, Dhruv, Rahman, Abdul, Redino, Christopher
6g-Enabled Technologies for Next Generation: Fundamentals, Applications, Analysis and Challenges by Tiwari, Shrikant, Gupta, Shivani, Tyagi, Amit Kumar
Securing the Digital World: A Comprehensive Guide to Multimedia Security by
Artificial Intelligence and Iot for Cyber Security Solutions in Smart Cities by
Windows Server 2025 Administration Fundamentals - Fourth Edition: A beginner's guide to managing and administering Windows Server environments by Dauti, Bekim
Principles and Applications of Blockchain Systems: How to Overcome the Cap Trilemma in Consortium Blockchain by Li, Hui, Wang, Han
Applied Satisfiability: Cryptography, Scheduling, and Coalitional Games by Liao, Xiaojuan, Koshimura, Miyuki
Silk Typhoon: The Rise of Chinese Cyber Espionage by Park, Steven
Information Systems Security: 20th International Conference, Iciss 2024, Jaipur, India, December 16-20, 2024, Proceedings by
Datensicherung ALS Teil Der It- Und Cybersecurity: Technische, Menschliche Und Betrügerische Risiken Erkennen Und Mit Umfassenden Backup- Und It-Siche by Bodenstein, Martin, Müller, Patrick, Chamera, Vanessa
Azure-Sicherheitshandbuch: Ein Umfassender Leitfaden Für Den Schutz Ihrer Unternehmens-It by Ots, Karl
Frontiers in Cyber Security: 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part II by
Data Protection: The Wake of AI and Machine Learning by
Federated Learning for Multimedia Data Processing and Security in Industry 5.0 by
Cyber Threat Hunting by Alfardan, Nadhem
Metasploit, 2nd Edition by Kearns, Devon, Kennedy, David, Aharoni, Mati
PCI DSS Version 4.0.1: A Guide to the Payment Card Industry Data Security Standard by Hancock, Stephen
Embedded Cryptography 3 by Prouff, Emmanuel
Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures: Techniques, Solutions, and Applications by
Cyber Security, Cryptology, and Machine Learning: 8th International Symposium, Cscml 2024, Be'er Sheva, Israel, December 19-20, 2024, Proceedings by
Software Security: Concepts & Practices by Kumar, Rajeev, Ahmad Khan, Raees, Ahmad Khan, Suhel
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things by
Frontiers in Cyber Security: 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I by
AI-Based Metaheuristics for Information Security and Digital Media by
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities by
Embedded Cryptography 2 by Prouff, Emmanuel
Advances in Digital Forensics XX: 20th Ifip Wg 11.9 International Conference, New Delhi, India, January 4-5, 2024, Revised Selected Papers by
Expectations Vs Realities of Information Privacy and Data Protection Measures: A Machine-Generated Literature Overview by
Codebasierte Post-Quanten-Kryptografie: Goppa Codes Und Das McEliece Kryptosystem by Paul, Felix Peter
Security and Trust Management: 20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19-20, 2024, Proceedings by
Energy Optimization and Security in Federated Learning for Iot Environments by
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches by Wolff, Josephine
Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy by Deibert, Ronald J.
Embedded Cryptography 1 by Renault, Guenael, Rivain, Mattieu, Prouff, Emmanuel
Trust Management XIV: 14th Ifip Wg 11.11 International Conference on Trust Management, Ifiptm 2023, Amsterdam, the Netherlands, October 18-2 by
Encyclopedia of Cyber Warfare by
Cybercrime in Asia: Policing, Technological Environment, and Cyber-Governance in China and Vietnam by Yiu-Chung Lau, Laurie
Innovations of Intelligent Informatics, Networking, and Cybersecurity: Second International Conference, 3inc 2024, Babylon, Iraq, October 15-16, 2024, by
Social Engineering Und Human Hacking: Strategien Zur Prävention Und Abwehr Von Manipulationstechniken in Der It by Öztürk, Asiye, Willer, Michael, Koza, Erfan
Alice and Bob Learn Secure Coding by Janca, Tanya
Grundlagenforschung Für Vertrauenswürdige Software by
The AI ACT and the Agile Safety Plan by Myklebust, Thor, Stålhane, Tor, Vatn, Dorthea Mathilde Kristin
Privacy in Vehicular Networks: Challenges and Solutions by Ni, Wei, Ma, Baihe, Wang, Xu
Privacy in Vehicular Networks: Challenges and Solutions by Ni, Wei, Ma, Baihe, Wang, Xu
Cybercrime and the Law: An Analysis of Legal Governance in Europe by Radoniewicz, Filip
Navigating the Cyber Maze: Insights and Humor on the Digital Frontier by Muhlert, Matthias
Navigating the Cyber Maze: Insights and Humor on the Digital Frontier by Muhlert, Matthias
Emerging Information Security and Applications: 5th International Conference, EISA 2024, Changzhou, China, October 18-19, 2024, Proceedings by
Cyber Resilience Index: Mastering Threat-Informed Defense by Alevizos, Lampis
Personal Threat Management: The Practitioner's Guide to Keeping Clients Safer by Grindell, Philip
Personal Threat Management: The Practitioner's Guide to Keeping Clients Safer by Grindell, Philip
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System by
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System by
The Art of Mac Malware, Volume 2: Detecting Malicious Software by Wardle, Patrick
Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers by Crose, Emily
Cybersecurity in Healthcare Applications by
30-Minute Groups: Online Safety: Spotting Red Flags, Protecting Privacy, and Being a Positive Voice by Cassada Lohmann, Raychelle
Practical Post-Quantum Signatures: Falcon and Solmae with Python by Kim, Kwangjo
Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education by Chaundy, Bruce G., Fowler, Bradley
Private Intelligence Services: Ein Leitfaden Zum Umgang Im Zeitalter Der Digitalisierung by Embacher, Stefan
Computer Performance Engineering: 20th European Workshop, Epew 2024, Venice, Italy, June 14, 2024, Revised Selected Papers by
Secure IT Systems: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings by
Iot and Machine Learning for Smart Applications by
Provable and Practical Security: 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part II by
Enterprise Fortress: The Ultimate Handbook for Enterprise Security Architecture by Stevens, Alex
Enterprise Fortress: The Ultimate Handbook for Enterprise Security Architecture by Stevens, Alex
Wirtschaftsspionage: Phänomenologie - Erklärungsansätze - Handlungsoptionen by Fleischer, Dirk
Cybersicherheit in Kritischen Infrastrukturen: Ein Spieltheoretischer Ansatz by Schauer, Stefan, König, Sandra, Rass, Stefan
Financial Cryptography and Data Security: 28th International Conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, Revised Selected Papers, Part by
Analysis and Design of Next-Generation Software Architectures: Generative Ai, Cybersecurity, and Cloud Computing by Langer, Arthur M.
Hacking Cryptography: Write, Break, and Fix Real-World Implementations by Cox, Bill, Khan, Kamran
Operationalizing Expectations and Mapping Challenges of Information Privacy and Data Protection Measures: A Machine-Generated Literature Overview by
From Street-Smart to Web-Wise(r): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 3) by Parisi, Madeline, Marcella, Al, Moore, Brian
From Street-Smart to Web-Wise(r): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 3) by Parisi, Madeline, Marcella, Al, Moore, Brian
Securing IoT in Industry 4.0 Applications with Blockchain by
Financial Cryptography and Data Security: 28th International Conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, Revised Selected Papers, Part by
Fortifying the Future: Harnessing AI for Transformative Cybersecurity Training by Rana, Shaila, Chicone, Rhonda
Operational Perspective of Modeling System Reliability: Research Tools for System Dynamics by
Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics by
Cybermedics: Navigating AI and Security in the Medical Field by
Entiende La Tecnología: Desde La Caída de Megaupload Hasta Los Secretos de la in Teligencia Artificial / The Digital Revolution by Gentile, Nate
Smart Cyber-Physical Power Systems, Volume 1: Fundamental Concepts, Challenges, and Solutions by
Smart Cyber-Physical Power Systems, Volume 2: Solutions from Emerging Technologies by
Smart Cyber-Physical Power Systems: Challenges and Solutions, 2 Volume Set by
Cyber Security Foundations: Fundamentals, Technology and Society by Mersinas, Konstantinos, Schmitz, Guido, Martin, Keith
Cyber Security Foundations: Fundamentals, Technology and Society by Mersinas, Konstantinos, Schmitz, Guido, Martin, Keith
Differential Privacy by Garfinkel, Simson L.
Cybersecurity in Robotic Autonomous Vehicles: Machine Learning Applications to Detect Cyber Attacks by Islam, Sardar M. N., Gondal, Iqbal, Alruwaili, Ahmed
Data Security and Privacy Protection: A Comprehensive Guide by Wang, Anyu
Safeguarding the Future: Security and Privacy by Design for Ai, Metaverse, Blockchain, and Beyond by Tang, Alan
Safeguarding the Future: Security and Privacy by Design for Ai, Metaverse, Blockchain, and Beyond by Tang, Alan
Medical Knowledge Paradigms for Enabling the Digital Health Ecosystem by
Optimal Spending on Cybersecurity Measures: Protecting Health Information by Kissoon, Tara
Optimal Spending on Cybersecurity Measures: Protecting Health Information by Kissoon, Tara
Building a Cybersecurity Program by Houlder, Chris, Mir, Ahsan
File System Forensics by Toolan, Fergus
Securing Microsoft Azure OpenAI by Ots, Karl
Privacy Symposium 2024: Data Protection Law International Convergence and Compliance with Innovative Technologies (Dplicit) by
Computer Security. Esorics 2024 International Workshops: Dpm, Cbt, and Cybericps, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, P by
Computer Security. Esorics 2024 International Workshops: Secai, Disa, Cps4cip, and Secassure, Bydgoszcz, Poland, September 16-20, 2024, Revised Select by
Taming the Hacking Storm: A Framework for Defeating Hackers and Malware by Grimes, Roger A.
Technology for Littles: Helping Young Children Navigate the Internet Responsibly by Rogers-Whitehead, Carrie
Ransom War: How Cyber Crime Became a Threat to National Security by Smeets, Max
Cybersecurity for Dummies by Steinberg, Joseph
Digital Defence: Harnessing the Power of Artificial Intelligence for Cybersecurity and Digital Forensics by
Human Factors Analysis of 23 Cyberattacks by Moallem, Abbas
Digital Resilience, Cybersecurity and Supply Chains by Singh, Tarnveer
Digital Resilience, Cybersecurity and Supply Chains by Singh, Tarnveer
Fighting the Virus: How Disease Modeling Can Enhance Cybersecurity by Mangel, Marc
Security Relationship Management: Leveraging Marketing Concepts to Advance a Cybersecurity Program by Parrish, Lee
Security Relationship Management: Leveraging Marketing Concepts to Advance a Cybersecurity Program by Parrish, Lee
Artificial Intelligence for Cyber Security and Industry 4.0 by
Cloud Native Data Security with Oauth: A Scalable Zero Trust Architecture by Archer, Gary, Kahrer, Judith, Trojanowski, Michal
Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications by
CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam by Robb, Donald, Buhagiar, Jon, Lammle, Todd
Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure by Carroll, Brandon
Cybersecurity Culture by Bishop, Gulsebnem
Cybersecurity Culture by Bishop, Gulsebnem
Quantum Communication and Quantum Internet Applications by Ochiogrosso, Benedict, Minoli, Daniel
Quantum Communication and Quantum Internet Applications by Ochiogrosso, Benedict, Minoli, Daniel
Security Yearbook 2025: A History and Directory of the It Security Industry by Stiennon, Richard
A Cybersecurity Leader's Journey: Speaking the Language of the Board by Marchewka, Edward
A Cybersecurity Leader's Journey: Speaking the Language of the Board by Marchewka, Edward
Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an Ai-Driven World by Thurner, Wesley, Santos, Omar, Lazzara, Savannah
Recent Advances in Internet of Things Security by
Next-Generation Systems and Secure Computing by
Security Issues in Communication Devices, Networks and Computing Models: Volume 2 by
Security Issues in Communication Devices, Networks and Computing Models: Volume 1 by
Safety Assurance Under Uncertainties: From Software to Cyber-Physical/Machine Learning Systems by
Guardians of Data: A Comprehensive Guide to Digital Data Protection by Khidzir, Nik Zulkarnaen, Ahmed, Shekh Abdullah-Al-Musa
Guardians of Data: A Comprehensive Guide to Digital Data Protection by Ahmed, Shekh Abdullah-Al-Musa, Khidzir, Nik Zulkarnaen
Cryptography: A Very Short Introduction by Murphy, Sean, Player, Rachel
Lehrbuch Der Softwaretechnik by Ebert, Christof, Balzert, Helmut
Cybersecurity in Knowledge Management: Cyberthreats and Solutions by
Advanced Machine Learning for Cyber-Attack Detection in Iot Networks by
Handbook of Cybersecurity for E-Health by
Listen and Repair: A Guide for Information Security to Meet Future Demands by Messdaghi, Chloe
Crime-Related Events Identification Based on Text Analytics Approach by Wójcik, Waldemar, Khairova, Nina, Mamyrbayev, Orken
Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms by
Cisa Certified Information Systems Auditor Study Guide and Practice Tests Bundle: Covers 2024 Exam Objectives by Gregory, Peter H., Chapple, Mike
Efficient Algorithms for Elliptic Curve Cryptosystems Using Endomorphisms by Hakuta, Keisuke
Security and Privacy Issues for Iot and Wsn-Based Real-Time Applications by
Defending the Metaverse: Cybersecurity Strategies for the Next Generation Internet by
Cyber Insecurity: Examining the Past, Defining the Future by Leonas, Vladas
Cyber Insecurity: Examining the Past, Defining the Future by Leonas, Vladas
Optimizing Iot Networks: Energy-Efficient Resource Management Through Machine Learning by Bhende, Manisha, Sharma, Swati, Patil, Suvarna
Introduction to Modern Cryptography: Fourth Edition by Katz, Jonathan, Lindell, Yehuda
Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc 2) by Clarke, David
Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc 2) by Clarke, David
Redefining Information Security: How to Build a Security-Driven Organization by Wagner, Brian
Redefining Information Security: How to Build a Security-Driven Organization by Wagner, Brian
Computer Security (Third Edition) by Du, Wenliang
Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets by Eddings, Ron, Kaufmann, Mj
Linux Basics for Hackers, 2nd Edition by Occupytheweb
Zero Trust in Resilient Cloud and Network Architectures by Halley, Josh, Saini, Vinay, Prajapati, Dhrumil
Advancements in Cybersecurity: Next-Generation Systems and Applications by
Cyber Risk Management in Practice: A Guide to Real-World Solutions by Morales, Carlos
Cyber Risk Management in Practice: A Guide to Real-World Solutions by Morales, Carlos
Regulierung Von Künstlicher Intelligenz in Der EU: Praxisbezogene Lösungsansätze Für Die Sicherheit Von Ki-Anwendungen by Pötsch, Jordan, Bernnat, Rainer
Security: A Systems Engineering Approach by Winstead, Mark
The Cybersecurity Control Playbook: From Fundamentals to Advanced Strategies by Edwards, Jason
It-Prüfung, Datenschutzmanagement Und Ki-Audit: Neue Ansätze Für Die It-Revision by
Identity Security for Software Development: Building with Identity, Secrets, and Credentials by Walsh, John, Ailon, Uzi
Blockchain, Cryptocurrency and Defi Systems: Concepts and Applications by Ramamurthy, Bina, Madurai, Kumar
Blockchain, Cryptocurrency and Defi Systems: Concepts and Applications by Ramamurthy, Bina, Madurai, Kumar
Securing Cloud Native Apps by Pandhare, Shrikant, Anderson, Michael, Reva, Nick
The Cybernetic Society: How Humans and Machines Will Shape the Future Together by Husain, Amir
From Day Zero to Zero Day by Lim, Eugene
Cyber Warfare and Navies by Demchak, Christine Cherie, Tangredi, Sam J.
Data Engineering for Cybersecurity by Bonifield, James
AWS Certified Security Study Guide: Specialty (Scs-C02) Exam by Goldfarb, Dario Lucas, Munoz, Mauricio, Moraes, Alexandre M. S. P.
Onlife Criminology: Virtual Crimes and Real Harms by Mark Szakolczai, Janos
Securing Generative Ai, Llms, and ML Using Zero Trust Architecture by Zsiga, Zig, Green-Ortiz, Cindy
Modern Cryptography: From Rsa to Zero-Knowledge and Beyond by Schwenk, Jörg, Wolfenstetter, Klaus-Dieter, Beutelspacher, Albrecht
Lattice-Based Cryptography: From Theory to Practice by
Autonomous Cyber Resilience by
Comptia A+ Complete Study Guide 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202 by Buhagiar, Jon, Docter, Quentin
Comptia A+ Complete Practice Tests: Core 1 Exam 220-1201 and Core 2 Exam 220-1202 by O'Shea, Audrey
Comptia A+ Complete Review Guide: Core 1 Exam 220-1201 and Core 2 Exam 220-1202 by McMillan, Troy
Fundamentals of Cloud Security by Igonor, Andy
Dark Wire: The Incredible True Story of the Largest Sting Operation Ever by Cox, Joseph
Introduction to Biometrics by Nandakumar, Karthik, Jain, Anil K., Ross, Arun A.
Applied Introduction to Cryptography and Cybersecurity by Herzberg, Amir
Applied Introduction to Cryptography and Cybersecurity by Herzberg, Amir
See More