Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security titles - 1,407 results

CEH Certified Ethical Hacker All-in-One Exam Guide

978/007/183/9780071836487.jpg

CEH Certified Ethical Hacker All-in-One Exam Guide

Matt Walker

Computer certification; Computer fraud & hacking; Network security

Mixed media product

Featuring full coverage of v.8 of the Certified Ethical Hacker (CEH) certification exam from the EC-Council, this complete... [more]

$77.05  $69.35

We can order this in for you
How long will it take?
Add this item to my basket
IOS Hacker's Handbook

978/111/820/9781118204122.jpg

IOS Hacker's Handbook

Charlie Miller, Dion Blazakis, Dino Dai Zovi, Stefan Esser, Vincenzo Iozzo

Macintosh OS; Computer security; Computer networking & communications

Paperback

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system... [more]

$69.75  $62.80

We can order this in for you
How long will it take?
Add this item to my basket
Flex Mobile in Action

978/161/729/9781617290619.jpg

Flex Mobile in Action

Jonathan Campos

Computer programming & software development; Computer security

Paperback

An important resource for learning how to use the powerful Flex Platform to create compelling mobile applications that can... [more]

$62.95  $56.65

We can order this in for you
How long will it take?
Add this item to my basket
Email Security with Cisco Ironport

978/158/714/9781587142925.jpg

Email Security with Cisco Ironport

Chris Porter

Computer security; Electronic mail (email): professional; Network security

Paperback

Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today's... [more]

$142.30  $128.05

We can order this in for you
How long will it take?
Add this item to my basket
Constructive Side-Channel Analysis and Secure Design

978/364/229/9783642299117.jpg

Constructive Side-Channel Analysis and Secure Design

Werner Schindler, Sorin Huss

Ethical & social aspects of computing; Network hardware; Algorithms & data structures; Computer security; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and... [more]

$130.95  $117.85

We can order this in for you
How long will it take?
Add this item to my basket
Social Engineering: The Art of Human Hacking

978/148/059/9781480590328.jpg

Social Engineering: The Art of Human Hacking

Christopher Hadnagy

Computer security

Audio

Provides information about the many methods of trickery that hackers use in order to gather information with the intent of... [more]

$26.05  $22.90

We can order this in for you
How long will it take?
Add this item to my basket
Secure Software Design

978/144/962/9781449626327.jpg

Secure Software Design

Theodor Richardson, Charles N. Thies

Computer programming & software development; Computer security

Paperback

With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security... [more]

$244.55  $220.10

We can order this in for you
How long will it take?
Add this item to my basket
Policies, Procedures, and Technologies to Defend Against the Insider Threat

no-image-available.jpg

Policies, Procedures, and Technologies to Defend Against the Insider Threat...

Gennaro Scalo

Management & management techniques; Computer security; Network management; Network security

Hardback

Securing information from insider threats needs to start early. Policies and procedures need to be in place to mitigate the... [more]

$167.95  $151.15

We can order this in for you
How long will it take?
Add this item to my basket
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

978/026/201/9780262017510.jpg

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic...

Jean-Francois Blanchette

Information theory; Coding theory & cryptology; Computer security

Hardback

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life.... [more]

$70.30  $63.25

We can order this in for you
How long will it take?
Add this item to my basket
Topics in Cryptology - CT-RSA 2012

978/364/227/9783642279539.jpg

Topics in Cryptology - CT-RSA 2012

Orr Dunkelman

Coding theory & cryptology; Discrete mathematics; Algorithms & data structures; Data encryption

Paperback

Constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco,... [more]

$172.95  $155.65

We can order this in for you
How long will it take?
Add this item to my basket
Engineering Secure Software and Systems

978/364/228/9783642281655.jpg

Engineering Secure Software and Systems

Gilles Barthe, Ben Livshits, Riccardo Scandariato

Network hardware; Algorithms & data structures; Software Engineering; Data encryption; Maths for computer scientists

Paperback

This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems,... [more]

$130.95  $117.85

We can order this in for you
How long will it take?
Add this item to my basket
Computer Security Fundamentals

978/078/974/9780789748904.jpg

Computer Security Fundamentals

William (Chuck) Easttom II

Computer security; Network security

Paperback

Bringing together thoroughly updated coverage of all basic concepts, terminology and issues, along with the practical skills... [more]

$188.55  $169.70

We can order this in for you
How long will it take?
Add this item to my basket
Smart Card Research and Advanced Applications

978/364/227/9783642272561.jpg

Smart Card Research and Advanced Applications

Emmanuel Prouff

Network hardware; Algorithms & data structures; Software Engineering; Data encryption

Paperback

Constitutes the refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research... [more]

$194.95  $175.45

We can order this in for you
How long will it take?
Add this item to my basket
Digital Identity and Access Management: Technologies and Frameworks

978/161/350/9781613504987.jpg

Digital Identity and Access Management: Technologies and Frameworks

Raj Sharman, Sanjukta Das Smith, Manish Gupta

Computer security

Hardback

Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Security De-Engineering: Solving the Problems in Information Risk Management

no-image-available.jpg

Security De-Engineering: Solving the Problems in Information Risk Management...

Ian Tibble

Management & management techniques; Computing: general; Computer security; Network management

Paperback

As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something... [more]

$188.05  $169.25

We can order this in for you
How long will it take?
Add this item to my basket
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings

978/364/225/9783642255151.jpg

Cryptography and Coding: 13th IMA International Conference, IMACC 2011,...

Liqun Chen

Coding theory & cryptology; Discrete mathematics; Algorithms & data structures; Data encryption

Paperback

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC... [more]

$192.95  $173.65

We can order this in for you
How long will it take?
Add this item to my basket
Modern Stream Ciphers: Design and Analysis

no-image-available.jpg

Modern Stream Ciphers: Design and Analysis

Thomas Johansson, Willi Meier

Computer security; Data encryption

Hardback

An increased interest in stream ciphers has recently been reflected in a number of applications for securing environments... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

978/146/660/9781466601970.jpg

Strategic and Practical Approaches for Information Security Governance:...

Manish Gupta, Raj Sharman, John Walp

Computer security; Network security

Hardback

Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Communications and Multimedia Security

978/364/224/9783642247118.jpg

Communications and Multimedia Security

Bart de Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl (University of Salzburg, Austria)

Network hardware; Operating systems; Algorithms & data structures; Data encryption

Paperback

Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia... [more]

$170.95  $153.85

We can order this in for you
How long will it take?
Add this item to my basket
Identity Theft

978/184/392/9781843922377.jpg

Identity Theft

Emily Finch, Stefan Fafinski

Crime & criminology; Criminal law & procedure; Computer fraud & hacking

Paperback

Identity theft (or identity fraud) has gained prominence as a pressing and prevalent social problem. This book provides a... [more]

$105.05  $94.55

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security: Public Sector Threats and Responses

978/143/984/9781439846636.jpg

Cyber Security: Public Sector Threats and Responses

Kim J. Andreasson

Public administration; Computer security

Hardback

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents... [more]

$172.10  $154.90

We can order this in for you
How long will it take?
Add this item to my basket
Computer Safety, Reliability, and Security: Proceedings

978/364/224/9783642242694.jpg

Computer Safety, Reliability, and Security: Proceedings

Francesco Flammini, Sandro Bologna, Valeria Vittorini

Network hardware; Algorithms & data structures; Software Engineering; Computer security; Expert & knowledge-based systems

Paperback

Constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP... [more]

$172.95  $155.65

We can order this in for you
How long will it take?
Add this item to my basket
Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

978/143/985/9781439855874.jpg

Smart Grid Security: An End-to-End View of Security in the New Electrical...

Gilbert N. Sorebo, Michael C. Echols

Electrical power industries; Power networks, systems, stations & plants; Computer security

Hardback

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is... [more]

$219.25  $197.35

We can order this in for you
How long will it take?
Add this item to my basket
The Real Hacker's Handbook

978/184/732/9781847328250.jpg

The Real Hacker's Handbook

Paul Day

Computer fraud & hacking

Paperback

Examines the phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some of the legendary... [more]

$33.95  $30.55

We can order this in for you
How long will it take?
Add this item to my basket
Influences on the Adoption of Multifactor Authentication

no-image-available.jpg

Influences on the Adoption of Multifactor Authentication

Martin C Libicki (RAND Corporation California), Edward Balkovich, Brian A Jackson, Rena Rudavsky, Katharine Watkins Webb

Information technology industries; Computer security

Paperback

Sponsored by the National Institute of Standards and Technology. [more]

$56.05  $50.45

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.