Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security titles - 1,431 results

Economics of Information Security and Privacy III

978/146/141/9781461419808.jpg

Economics of Information Security and Privacy III

Bruce Schneier

Economics; Network hardware; Computer security; Computer networking & communications

Hardback

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information... [more]

$358.95  $323.05

We can order this in for you
How long will it take?
Add this item to my basket
IT Security Governance Innovations: Theory and Research

978/146/662/9781466620834.jpg

IT Security Governance Innovations: Theory and Research

Daniel Mellado, Luis Enrique Sanchez, Eduardo Fernandez-Medina, Mario Piattini

Computer security

Hardback

Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Computer Security

978/075/069/9780750696005.jpg

Computer Security

John M. Carroll

Management & management techniques; Data encryption

Hardback

Presents ideas that high technology, classical security practice, and common sense have to offer to help reduce insecurity... [more]

$159.50

We can order this in for you
How long will it take?
Add this item to my basket
Multimedia Security: Watermarking, Steganography, and Forensics

978/143/987/9781439873311.jpg

Multimedia Security: Watermarking, Steganography, and Forensics

Frank Y. Shih

Computer security

Hardback

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and... [more]

$334.70  $301.25

We can order this in for you
How long will it take?
Add this item to my basket
CEH Certified Ethical Hacker All-in-One Exam Guide

978/007/183/9780071836487.jpg

CEH Certified Ethical Hacker All-in-One Exam Guide

Matt Walker

Computer certification; Computer fraud & hacking; Network security

Mixed media product

Featuring full coverage of v.8 of the Certified Ethical Hacker (CEH) certification exam from the EC-Council, this complete... [more]

$77.05  $69.35

We can order this in for you
How long will it take?
Add this item to my basket
IOS Hacker's Handbook

978/111/820/9781118204122.jpg

IOS Hacker's Handbook

Charlie Miller, Dion Blazakis, Dino Dai Zovi, Stefan Esser, Vincenzo Iozzo

Macintosh OS; Computer security; Computer networking & communications

Paperback

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system... [more]

$69.75  $62.80

We can order this in for you
How long will it take?
Add this item to my basket
Flex Mobile in Action

978/161/729/9781617290619.jpg

Flex Mobile in Action

Jonathan Campos

Computer programming & software development; Computer security

Paperback

An important resource for learning how to use the powerful Flex Platform to create compelling mobile applications that can... [more]

$62.95  $56.65

We can order this in for you
How long will it take?
Add this item to my basket
Email Security with Cisco Ironport

978/158/714/9781587142925.jpg

Email Security with Cisco Ironport

Chris Porter

Computer security; Electronic mail (email): professional; Network security

Paperback

Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today's... [more]

$142.30  $128.05

We can order this in for you
How long will it take?
Add this item to my basket
Constructive Side-Channel Analysis and Secure Design

978/364/229/9783642299117.jpg

Constructive Side-Channel Analysis and Secure Design

Werner Schindler, Sorin Huss

Ethical & social aspects of computing; Network hardware; Algorithms & data structures; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and... [more]

$130.95  $117.85

We can order this in for you
How long will it take?
Add this item to my basket
Secure Software Design

978/144/962/9781449626327.jpg

Secure Software Design

Theodor Richardson, Charles N. Thies

Computer programming & software development; Computer security

Paperback

With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security... [more]

$244.55  $220.10

We can order this in for you
How long will it take?
Add this item to my basket
Policies, Procedures, and Technologies to Defend Against the Insider Threat

no-image-available.jpg

Policies, Procedures, and Technologies to Defend Against the Insider Threat...

Gennaro Scalo

Management & management techniques; Computer security; Network management; Network security

Hardback

Securing information from insider threats needs to start early. Policies and procedures need to be in place to mitigate the... [more]

$167.95  $151.15

We can order this in for you
How long will it take?
Add this item to my basket
SSH Mastery: Openssh, Putty, Tunnels and Keys

978/147/006/9781470069711.jpg

SSH Mastery: Openssh, Putty, Tunnels and Keys

Michael W Lucas

Computer security

Paperback

Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH... [more]

$57.55  $51.80

We can order this in for you
How long will it take?
Add this item to my basket
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

978/026/201/9780262017510.jpg

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic...

Jean-Francois Blanchette

Information theory; Coding theory & cryptology; Computer security

Hardback

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life.... [more]

$70.30  $63.25

We can order this in for you
How long will it take?
Add this item to my basket
Topics in Cryptology - CT-RSA 2012

978/364/227/9783642279539.jpg

Topics in Cryptology - CT-RSA 2012

Orr Dunkelman

Coding theory & cryptology; Discrete mathematics; Algorithms & data structures; Data encryption

Paperback

Constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco,... [more]

$172.95  $155.65

We can order this in for you
How long will it take?
Add this item to my basket
Engineering Secure Software and Systems

978/364/228/9783642281655.jpg

Engineering Secure Software and Systems

Gilles Barthe, Ben Livshits, Riccardo Scandariato

Network hardware; Algorithms & data structures; Software Engineering; Data encryption; Maths for computer scientists

Paperback

This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems,... [more]

$130.95  $117.85

We can order this in for you
How long will it take?
Add this item to my basket
Computer Security Fundamentals

978/078/974/9780789748904.jpg

Computer Security Fundamentals

William (Chuck) Easttom II

Computer security; Network security

Paperback

Bringing together thoroughly updated coverage of all basic concepts, terminology and issues, along with the practical skills... [more]

$188.55  $169.70

We can order this in for you
How long will it take?
Add this item to my basket
Smart Card Research and Advanced Applications

978/364/227/9783642272561.jpg

Smart Card Research and Advanced Applications

Emmanuel Prouff

Network hardware; Algorithms & data structures; Software Engineering; Data encryption

Paperback

Constitutes the refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research... [more]

$194.95  $175.45

We can order this in for you
How long will it take?
Add this item to my basket
Digital Identity and Access Management: Technologies and Frameworks

978/161/350/9781613504987.jpg

Digital Identity and Access Management: Technologies and Frameworks

Raj Sharman, Sanjukta Das Smith, Manish Gupta

Computer security

Hardback

Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings

978/364/225/9783642255151.jpg

Cryptography and Coding: 13th IMA International Conference, IMACC 2011,...

Liqun Chen

Coding theory & cryptology; Discrete mathematics; Algorithms & data structures; Data encryption

Paperback

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC... [more]

$192.95  $173.65

We can order this in for you
How long will it take?
Add this item to my basket
Comptia Security+: Get Certified Get Ahead: Sy0-301 Study Guide

/978/146/376/9781463762360.jpg

Comptia Security+: Get Certified Get Ahead: Sy0-301 Study Guide

Darril Gibson

Computer certification; Computer security

Paperback

CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide is an update to the top-selling SY0-201 guide, which helped... [more]

$97.25  $87.55

We can order this in for you
How long will it take?
Add this item to my basket
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

978/146/660/9781466601970.jpg

Strategic and Practical Approaches for Information Security Governance:...

Manish Gupta, Raj Sharman, John Walp

Computer security; Network security

Hardback

Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Communications and Multimedia Security

978/364/224/9783642247118.jpg

Communications and Multimedia Security

Bart de Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl (University of Salzburg, Austria)

Network hardware; Operating systems; Algorithms & data structures; Data encryption

Paperback

Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia... [more]

$170.95  $153.85

We can order this in for you
How long will it take?
Add this item to my basket
Identity Theft

978/184/392/9781843922377.jpg

Identity Theft

Emily Finch, Stefan Fafinski

Crime & criminology; Criminal law & procedure; Computer fraud & hacking

Paperback

Identity theft (or identity fraud) has gained prominence as a pressing and prevalent social problem. This book provides a... [more]

$105.05  $94.55

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security: Public Sector Threats and Responses

978/143/984/9781439846636.jpg

Cyber Security: Public Sector Threats and Responses

Kim J. Andreasson

Public administration; Computer security

Hardback

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents... [more]

$172.10  $154.90

We can order this in for you
How long will it take?
Add this item to my basket
Computer Safety, Reliability, and Security: Proceedings

978/364/224/9783642242694.jpg

Computer Safety, Reliability, and Security: Proceedings

Francesco Flammini, Sandro Bologna, Valeria Vittorini

Network hardware; Algorithms & data structures; Software Engineering; Computer security; Expert & knowledge-based systems

Paperback

Constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP... [more]

$172.95  $155.65

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.