Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security titles - 1,408 results

Security De-Engineering: Solving the Problems in Information Risk Management

Security De-Engineering: Solving the Problems in Information Risk Management...

Ian Tibble

Management & management techniques; Computing: general; Computer security; Network management

Paperback

As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something... [more]

$188.05  $169.25

We can order this in for you
How long will it take?
Add this item to my basket
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings

Cryptography and Coding: 13th IMA International Conference, IMACC 2011,...

Liqun Chen

Coding theory & cryptology; Discrete mathematics; Algorithms & data structures; Data encryption

Paperback

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC... [more]

$192.95  $173.65

We can order this in for you
How long will it take?
Add this item to my basket
Modern Stream Ciphers: Design and Analysis

Modern Stream Ciphers: Design and Analysis

Thomas Johansson, Willi Meier

Computer security; Data encryption

Hardback

An increased interest in stream ciphers has recently been reflected in a number of applications for securing environments... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

Strategic and Practical Approaches for Information Security Governance:...

Manish Gupta, Raj Sharman, John Walp

Computer security; Network security

Hardback

Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Communications and Multimedia Security

Communications and Multimedia Security

Bart de Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl (University of Salzburg, Austria)

Network hardware; Operating systems; Algorithms & data structures; Data encryption

Paperback

Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia... [more]

$170.95  $153.85

We can order this in for you
How long will it take?
Add this item to my basket
Identity Theft

Identity Theft

Emily Finch, Stefan Fafinski

Crime & criminology; Criminal law & procedure; Computer fraud & hacking

Paperback

Identity theft (or identity fraud) has gained prominence as a pressing and prevalent social problem. This book provides a... [more]

$105.05  $94.55

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security: Public Sector Threats and Responses

Cyber Security: Public Sector Threats and Responses

Kim J. Andreasson

Public administration; Computer security

Hardback

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents... [more]

$172.10  $154.90

We can order this in for you
How long will it take?
Add this item to my basket
Computer Safety, Reliability, and Security: Proceedings

Computer Safety, Reliability, and Security: Proceedings

Francesco Flammini, Sandro Bologna, Valeria Vittorini

Network hardware; Algorithms & data structures; Software Engineering; Computer security; Expert & knowledge-based systems

Paperback

Constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP... [more]

$172.95  $155.65

We can order this in for you
How long will it take?
Add this item to my basket
Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

Smart Grid Security: An End-to-End View of Security in the New Electrical...

Gilbert N. Sorebo, Michael C. Echols

Electrical power industries; Power networks, systems, stations & plants; Computer security

Hardback

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is... [more]

$219.25  $197.35

We can order this in for you
How long will it take?
Add this item to my basket
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize...

James S. Tiller

Management & management techniques; Computing: general; Computer security; Network management

Hardback

Presenting the methodologies and concepts required for successful penetration testing, this book discusses the process from... [more]

$189.00  $170.10

We can order this in for you
How long will it take?
Add this item to my basket
The Real Hacker's Handbook

The Real Hacker's Handbook

Paul Day

Computer fraud & hacking

Paperback

Examines the phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some of the legendary... [more]

$33.95  $30.55

We can order this in for you
How long will it take?
Add this item to my basket
Influences on the Adoption of Multifactor Authentication

Influences on the Adoption of Multifactor Authentication

Martin C Libicki (RAND Corporation California), Edward Balkovich, Brian A Jackson, Rena Rudavsky, Katharine Watkins Webb

Information technology industries; Technology: general issues; Computer security

Paperback

Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA) [more]

$56.05  $50.45

We can order this in for you
How long will it take?
Add this item to my basket
Identity Theft

Identity Theft

Emily Finch, Stefan Fafinski

Crime & criminology; Criminal law & procedure; Computer fraud & hacking

Hardback

Identity theft (or identity fraud) has gained prominence as a pressing and prevalent social problem. This book provides a... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Digital Forensics VII: 7th IFIP Wg 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 -February 2, 2011, Revised Selected Papers

Advances in Digital Forensics VII: 7th IFIP Wg 11.9 International Conference...

Gilbert Peterson, Sujeet Shenoi (Center for Information Security, University of Tulsa, USA)

Network hardware; Algorithms & data structures; Data mining; Information retrieval; Data encryption

Hardback

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]

$232.95  $209.65

We can order this in for you
How long will it take?
Add this item to my basket
Moving Target Defense

Moving Target Defense

Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang

Network hardware; Information retrieval; Computer security; Data encryption; Computer networking & communications

Hardback

Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers... [more]

$232.95  $209.65

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Practice and Experience

Information Security Practice and Experience

Feng Bao, Jian Weng

Ethical & social aspects of computing; Network hardware; Information retrieval; Data encryption; Information architecture

Paperback

Constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience,... [more]

$172.95  $155.65

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Management Handbook

Information Security Management Handbook

Harold F. Tipton, Micki Krause Nozaki

Management & management techniques; Computing: general; Computer security

Hardback

Provides a compilation of the fundamental knowledge, skills, techniques, and tools required of IT security professional. It... [more]

$230.10  $207.10

We can order this in for you
How long will it take?
Add this item to my basket
Visual Cryptography and Secret Image Sharing

Visual Cryptography and Secret Image Sharing

Stelvio Cimato, Ching-Nung Yang

Graphical & digital media applications; Data encryption

Hardback

Visual Cryptography and Secret Image Sharing [more]

$381.50  $343.35

We can order this in for you
How long will it take?
Add this item to my basket
Digital Investigation in Communication Systems

Digital Investigation in Communication Systems

Noureddine A. Boudriga

Communications engineering & telecommunications; Computer security

Hardback

[more]

$182.55  $164.30

We can order this in for you
How long will it take?
Add this item to my basket
Machine Learning Forensics for Law Enforcement, Security and Intelligence

Machine Learning Forensics for Law Enforcement, Security and Intelligence...

Jesus Mena

Criminal investigation & detection; Criminal law & procedure; Data mining; Computer security; Machine learning

Hardback

Increasingly, crimes and fraud are digital in nature, occurring at breakneck speed and encompassing large volumes of data.... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Trust Management

Trust Management

Ian Wakeman, Ehud Gudes (Department of Computer Science, Ben-Gurion University of the Negev, Sheeva, Israel), C.Damsgaard Jensen, Jason Crampton

Network hardware; Information retrieval; Data encryption; Computer networking & communications

Hardback

Constitutes the refereed proceedings of the 5th IFIP WG 11.11 International Conference, IFIPTM 2011, held in Copenhagen, Denmark,... [more]

$232.95  $209.65

We can order this in for you
How long will it take?
Add this item to my basket
Data Mining and Machine Learning in Cybersecurity

Data Mining and Machine Learning in Cybersecurity

Sumeet Dua, Xian Du

Data mining; Computer security; Systems analysis & design

Hardback

With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant... [more]

$247.55  $222.80

We can order this in for you
How long will it take?
Add this item to my basket
Official (ISC)2(R) Guide to the ISSEP(R) CBK(R)

Official (ISC)2(R) Guide to the ISSEP(R) CBK(R)

Susan Hansche

Computer security

Hardback

Provides an inclusive analysis of the topics covered on the ISSEP Exam. This guide to the test promotes understanding of the... [more]

$182.55  $164.30

We can order this in for you
How long will it take?
Add this item to my basket
Ethical Hacking LiveLesson

Ethical Hacking LiveLesson

Shon Harris, Don Keeber

Databases; Computer certification; Computer fraud & hacking

Mixed media product

From Microsoft to the US Air Force, IBM to the FBI, Cisco to Wipro, thousands of security professionals are seeking the respected... [more]

$117.95  $106.15

Forthcoming
Pre-Order now
Add this item to my basket
Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop

$38.95  $35.05

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.