• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2025

Universal Threats in Expert Applications and Solutions: Proceedings of 3rd Uni-Teas 2024, Volume 2 by
6g-Enabled Technologies for Next Generation: Fundamentals, Applications, Analysis and Challenges by Gupta, Shivani, Tyagi, Amit Kumar, Tiwari, Shrikant
Cisa Certified Information Systems Auditor Study Guide: Covers 2024-2029 Exam Objectives by Chapple, Mike, Gregory, Peter H.
Iapp Cipp / Us Certified Information Privacy Professional Study Guide by Chapple, Mike, Shelley, Joe
Mathematics of Computer Science, Cybersecurity and Artificial Intelligence: 5th Scientific Days of Doctoral School of Mathematics and Computer Science by
Information Resilience and Comprehensive Security: Challenges and Complexities in Wicked Environments by
Human Aspects of Information Security and Assurance: 18th Ifip Wg 11.12 International Symposium, Haisa 2024, Skövde, Sweden, July 9-11, 2024, Proceedi by
Identification and Mitigation of Fraudulent Online Transactions Using Authentication and Fraud Detection System by Kumar Singh, Deepak, Khattri, Vipin, Kumar Nayak, Sandeep
Cybersecurity: Technology and Governance by Jøsang, Audun
Telematics and Computing: 13th International Congress of Telematics and Computing, Witcom 2024, Mazatlan, Mexico, November 4-8, 2024, Proceeding by
Principles of AI Governance and Model Risk Management: Master the Techniques for Ethical and Transparent AI Systems by Sayles, James
Social Engineering Und Human Hacking: Strategien Zur Prävention Und Abwehr Von Manipulationstechniken in Der It by Willer, Michael, Koza, Erfan, Öztürk, Asiye
Human Aspects of Information Security and Assurance: 18th Ifip Wg 11.12 International Symposium, Haisa 2024, Skövde, Sweden, July 9-11, 2024, Proceedi by
Telematics and Computing: 13th International Congress of Telematics and Computing, Witcom 2024, Mazatlan, Mexico, November 4-8, 2024, Proceeding by
Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security: Ic4s'05 Volume 2 by
Cyber Threat Hunting by Alfardan, Nadhem
Die Datenverarbeitung Im Modernen Leistungssport: Herausforderungen Für Und Durch Das Datenschutzrecht by Pollithy, Alexander
Datensicherung ALS Teil Der It- Und Cybersecurity: Technische, Menschliche Und Betrügerische Risiken Erkennen Und Mit Umfassenden Backup- Und It-Siche by Bodenstein, Martin, Müller, Patrick, Chamera, Vanessa
The Cybersecurity Trinity: Artificial Intelligence, Automation, and Active Cyber Defense by
Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing by Shetty, Sachin, Redino, Christopher, Rahman, Abdul
Theory of Cryptography: 22nd International Conference, Tcc 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part II by
Generative Ai, Cybersecurity, and Ethics by Islam, Mohammad Rubyet
Cyber Security, Cryptology, and Machine Learning: 8th International Symposium, Cscml 2024, Be'er Sheva, Israel, December 19-20, 2024, Proceedings by
Theory of Cryptography: 22nd International Conference, Tcc 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part III by
Expectations Vs Realities of Information Privacy and Data Protection Measures: A Machine-Generated Literature Overview by
Theory of Cryptography: 22nd International Conference, Tcc 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part I by
Theory of Cryptography: 22nd International Conference, Tcc 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV by
Smart Cyber-Physical Power Systems, Volume 1: Fundamental Concepts, Challenges, and Solutions by
Securing the Digital World: A Comprehensive Guide to Multimedia Security by
Cognitive Computing - ICCC 2024: 8th International Conference, Held as Part of the Services Conference Federation, Scf 2024, Bangkok, Thailand, Novemb by
Emerging Information Security and Applications: 5th International Conference, EISA 2024, Changzhou, China, October 18-19, 2024, Proceedings by
Azure-Sicherheitshandbuch: Ein Umfassender Leitfaden Für Den Schutz Ihrer Unternehmens-It by Ots, Karl
A Beginner's Guide to Web Application Penetration Testing by Abdollahi, Ali
Progress in Cryptology - Indocrypt 2024: 25th International Conference on Cryptology in India, Chennai, India, December 18-21, 2024, Proceedings, Part by
Progress in Cryptology - Indocrypt 2024: 25th International Conference on Cryptology in India, Chennai, India, December 18-21, 2024, Proceedings, Part by
Security, Privacy, and Applied Cryptography Engineering: 14th International Conference, Space 2024, Kottayam, India, December 14-17, 2024, Proceedings by
Navigating the Cyber Maze: Insights and Humor on the Digital Frontier by Muhlert, Matthias
Navigating the Cyber Maze: Insights and Humor on the Digital Frontier by Muhlert, Matthias
Hacking Cryptography: Write, Break, and Fix Real-World Implementations by Khan, Kamran, Cox, Bill
Metasploit, 2nd Edition by Aharoni, Mati, Kearns, Devon, Kennedy, David
Securing Microsoft Azure OpenAI by Ots, Karl
Blockchain Technology for Cyber Defense, Cyber Security, and Countermeasures: Techniques, Solutions, and Applications by
Cybersecurity and Data Science Innovations for Sustainable Development of Heicc: Healthcare, Education, Industry, Cities, and Communities by
Federated Learning for Multimedia Data Processing and Security in Industry 5.0 by
Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy by Deibert, Ronald J.
Alice and Bob Learn Secure Coding by Janca, Tanya
Grundlagenforschung Für Vertrauenswürdige Software by
Cybercrime in Asia: Policing, Technological Environment, and Cyber-Governance in China and Vietnam by Yiu-Chung Lau, Laurie
Encyclopedia of Cyber Warfare by
Cybersecurity in Healthcare Applications by
Cyber Resilience Index: Mastering Threat-Informed Defense by Alevizos, Lampis
The AI ACT and the Agile Safety Plan by Stålhane, Tor, Vatn, Dorthea Mathilde Kristin, Myklebust, Thor
Private Intelligence Services: Ein Leitfaden Zum Umgang Im Zeitalter Der Digitalisierung by Embacher, Stefan
Privacy in Vehicular Networks: Challenges and Solutions by Wang, Xu, Ni, Wei, Ma, Baihe
Privacy in Vehicular Networks: Challenges and Solutions by Wang, Xu, Ni, Wei, Ma, Baihe
Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics by
Cybermedics: Navigating AI and Security in the Medical Field by
Privacy Symposium 2024: Data Protection Law International Convergence and Compliance with Innovative Technologies (Dplicit) by
Personal Threat Management: The Practitioner's Guide to Keeping Clients Safer by Grindell, Philip
Personal Threat Management: The Practitioner's Guide to Keeping Clients Safer by Grindell, Philip
The Art of Mac Malware, Volume 2: Detecting Malicious Software by Wardle, Patrick
Enterprise Fortress: The Ultimate Handbook for Enterprise Security Architecture by Stevens, Alex
Enterprise Fortress: The Ultimate Handbook for Enterprise Security Architecture by Stevens, Alex
Optimal Spending on Cybersecurity Measures: Protecting Health Information by Kissoon, Tara
Optimal Spending on Cybersecurity Measures: Protecting Health Information by Kissoon, Tara
Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education by Fowler, Bradley, Chaundy, Bruce G.
Medical Knowledge Paradigms for Enabling the Digital Health Ecosystem by
Operational Perspective of Modeling System Reliability: Research Tools for System Dynamics by
Energy Optimization and Security in Federated Learning for Iot Environments by
Threat Modeling Conversations by Threat Modeling Manifesto Working Group
Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure by Carroll, Brandon
Iot and Machine Learning for Smart Applications by
Wirtschaftsspionage: Phänomenologie - Erklärungsansätze - Handlungsoptionen by Fleischer, Dirk
File System Forensics by Toolan, Fergus
Operationalizing Expectations and Mapping Challenges of Information Privacy and Data Protection Measures: A Machine-Generated Literature Overview by
Entiende La Tecnología: Desde La Caída de Megaupload Hasta Los Secretos de la in Teligencia Artificial / The Digital Revolution by Gentile, Nate
Cyber Security Foundations: Fundamentals, Technology and Society by Mersinas, Konstantinos, Schmitz, Guido, Martin, Keith
Cyber Security Foundations: Fundamentals, Technology and Society by Mersinas, Konstantinos, Schmitz, Guido, Martin, Keith
Differential Privacy by Garfinkel, Simson L.
Building a Cybersecurity Program by Mir, Ahsan, Houlder, Chris
Applied Satisfiability: Cryptography, Scheduling, and Coalitional Games by Liao, Xiaojuan, Koshimura, Miyuki
Technology for Littles: Helping Young Children Navigate the Internet Responsibly by Rogers-Whitehead, Carrie
Cybersecurity for Dummies by Steinberg, Joseph
Ransom War: How Cyber Crime Became a Threat to National Security by Smeets, Max
Security Issues in Communication Devices, Networks and Computing Models: Volume 1 by
Security Issues in Communication Devices, Networks and Computing Models: Volume 2 by
Sse, Sase, and Zero Trust: Mastering Security Beyond Borders with Next-Gen Edge Technologies by Sabella, Anthony, Shoemaker, Ryan
CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam by Robb, Donald, Buhagiar, Jon, Lammle, Todd
Cloud Native Data Security with Oauth: A Scalable Zero Trust Architecture by Trojanowski Micha?, Archer, Gary, Kahrer, Judith
Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting by Santos, Omar, Lazzara, Savannah, Darnell, Barrett
It-Prüfung, Datenschutzmanagement Und Ki-Audit: Neue Ansätze Für Die It-Revision by
Linux Basics for Hackers, 2nd Edition by Occupytheweb
Security and Privacy for 6g Massive Iot by
Securing Generative Ai, Llms, and ML Using Zero Trust Architecture by Zsiga, Zig, Green-Ortiz, Cindy
Lehrbuch Der Softwaretechnik by Balzert, Helmut, Ebert, Christof
Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach by Schauer, Stefan, König, Sandra, Rass, Stefan
Handbook of Cybersecurity for E-Health by
Advanced Machine Learning for Cyber-Attack Detection in Iot Networks by
Listen and Repair: A Guide for Information Security to Meet Future Demands by Messdaghi, Chloe
Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms by
Analysis and Design of Next-Generation Software Architectures: Generative Ai, Cybersecurity, and Cloud Computing by Langer, Arthur M.
Efficient Algorithms for Elliptic Curve Cryptosystems Using Endomorphisms by Hakuta, Keisuke
Redefining Information Security: How to Build a Security-Driven Organization by Wagner, Brian
Redefining Information Security: How to Build a Security-Driven Organization by Wagner, Brian
Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc 2) by Clarke, David
Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc 2) by Clarke, David
Computer Security (Third Edition) by Du, Wenliang
Modern Cryptography: From Rsa to Zero-Knowledge and Beyond by Schwenk, Jörg, Wolfenstetter, Klaus-Dieter, Beutelspacher, Albrecht
Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets by Eddings, Ron, Kaufmann, Mj
Autonomous Cyber Resilience by
Security: A Systems Engineering Approach by Winstead, Mark
Operationalizing Cybersecurity: Actions, Steps, and Templates to Reduce Cybersecurity Risks by Hart, Jason
Blockchain, Cryptocurrency and Defi Systems: Concepts and Applications by Madurai, Kumar, Ramamurthy, Bina
Blockchain, Cryptocurrency and Defi Systems: Concepts and Applications by Ramamurthy, Bina, Madurai, Kumar
The Cybernetic Society: How Humans and Machines Will Shape the Future Together by Husain, Amir
Securing Cloud Native Apps by Pandhare, Shrikant, Anderson, Michael, Reva, Nick
Fighting the Virus: Disease Modeling and Cyber Security by Mangel, Marc
Identity Security for Software Development: Building with Identity, Secrets, and Credentials by Ailon, Uzi, Walsh, John
Lattice-Based Cryptography: From Theory to Practice by
Powershell for Security Analysts by Grubb, Sam
Machine Learning for Malware Detection by
Next-Generation Systems and Secure Computing by
Introduction to Biometrics by Jain, Anil K., Ross, Arun A., Nandakumar, Karthik
Applied Introduction to Cryptography and Cybersecurity by Herzberg, Amir
Applied Introduction to Cryptography and Cybersecurity by Herzberg, Amir
Countermeasures and Security Issues for Society 5.0 by
AWS Certified Security Study Guide: Specialty (Scs-C02) Exam by Neto, Marcello Zillo, Santana, Gustavo A. a., Munoz, Mauricio