Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security titles - 1,445 results

Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats

Building an Information Security Awareness Program: Defending Against Social...

Bill Gardner, Valerie Thomas

Computer security

Paperback

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's... [more]

$132.25  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Ceh: Certified Ethical Hacker Version 8 Study Guide

Ceh: Certified Ethical Hacker Version 8 Study Guide

Sean Philip Oriyano, Jason McDowell

Computer fraud & hacking

Paperback

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high... [more]

$76.60  $68.95

Forthcoming
Pre-Order now
Add this item to my basket
The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice

The Basics of Information Security: Understanding the Fundamentals of Infosec...

Jason Andress

Computing & IT; Computer security; Network security

Paperback

Provides you with fundamental knowledge of information security in both theoretical and practical aspects. This title covers... [more]

$78.40  $70.55

We can order this in for you
How long will it take?
Add this item to my basket
Qr Codes: The Technical Guide

Qr Codes: The Technical Guide

Michael M Stark (Boise Idaho USA)

Coding theory & cryptology; Radio technology; Imaging systems & technology; Graphical & digital media applications; Data encryption

Paperback

This book is a complete treatise on Quick Response (QR) Code symbols the square barcodes that can be read by smart phones.... [more]

$129.85  $116.85

Forthcoming
Pre-Order now
Add this item to my basket
Audacity to Spy: How Government, Business & Hackers Rob Us of Privacy

Audacity to Spy: How Government, Business & Hackers Rob Us of Privacy

Catherine Nolan, Ashley M Wilson, JD

Market research; Privacy & data protection; Network security

Paperback

The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an... [more]

$33.95  $30.55

Forthcoming
Pre-Order now
Add this item to my basket
The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture

The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your...

Kerry Ann Anderson

Knowledge management; Computer security

Paperback

If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving... [more]

$129.85  $116.85

We can order this in for you
How long will it take?
Add this item to my basket
Hackers Wanted: An Examination of the Cybersecurity Labor Market

Hackers Wanted: An Examination of the Cybersecurity Labor Market

Martin C Libicki (RAND Corporation California), David Senty, Julia Pollak

International relations; Political control & freedoms; Privacy & data protection; Network security

Paperback

The perceived shortage of cybersecurity professionals working on national security may endanger the nation s networks and... [more]

$55.65  $50.10

We can order this in for you
How long will it take?
Add this item to my basket
Computer Forensics and Digital Investigation with EnCase Forensic

Computer Forensics and Digital Investigation with EnCase Forensic

Suzanne Widup

Computing: general; Computer security; Network security

Paperback

This practical, professional book provides a scenario-based guide to the industry's #1 digital forensics tool, EnCase Forensic.... [more]

$77.05  $69.35

We can order this in for you
How long will it take?
Add this item to my basket
At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and...

Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work, Computer Science and Telecommunications Board

Computer security

Paperback

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient.... [more]

$78.55  $70.70

We can order this in for you
How long will it take?
Add this item to my basket
Penetration Testing: A Hands-on Introduction to Hacking

Penetration Testing: A Hands-on Introduction to Hacking

Georgia Weidman

Computer security; Computer fraud & hacking; Network security

Paperback

In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that... [more]

$76.55  $68.90

We can order this in for you
How long will it take?
Add this item to my basket
Investigative Interviewing: Psychology, Method and Practice

Investigative Interviewing: Psychology, Method and Practice

Eugene Ferraro

Police & security services; Forensic science; Management & management techniques; Production & quality control management; Criminal law & procedure; Criminal justice law; Police procedures; Computer security

Hardback

There are few skills more important to the modern fact finder than the ability to obtain information through effective interviewing.... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Information Security: Principles and Practices

Information Security: Principles and Practices

Mark S. Merkow, Jim Breithaupt (Head of Physics, Wigan College of Technology)

Computer security; Network security

Paperback

Useful for an introductory course in information security, this title presents principles and practices. It covers the 10... [more]

$184.95  $166.45

We can order this in for you
How long will it take?
Add this item to my basket
Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

Adam Shostack

Computer security

Paperback

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat... [more]

$131.35  $118.20

We can order this in for you
How long will it take?
Add this item to my basket
CompTIA Security+ Study Guide: SY0-401

CompTIA Security+ Study Guide: SY0-401

Emmett Dulaney, Chuck Easttom

Education; Computer certification: CompTia; Computer security; Network security

Paperback

Join over 250,000 IT professionals who've earned Security+ certification If you're an IT professional hoping to progress... [more]

$76.60  $68.95

We can order this in for you
How long will it take?
Add this item to my basket
Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar

Internet guides & online services; Software Engineering; Computer security

Hardback

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8

Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows...

Harlan Carvey

Microsoft Windows; Computer security

Paperback

This text covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable... [more]

$153.70  $138.35

We can order this in for you
How long will it take?
Add this item to my basket
Secure Messaging on the Internet

Secure Messaging on the Internet

Rolf Oppliger

Computing & IT; Computer security

Hardback

This book offers a comprehensive understanding of secure Internet messaging, and brings together all the relevant and critical... [more]

$208.55  $187.70

We can order this in for you
How long will it take?
Add this item to my basket
Case Studies in Secure Computing: Achievements and Trends

Case Studies in Secure Computing: Achievements and Trends

Biju Issac, Nauman Israr

Electronics engineering; Automatic control engineering; Computer security; Systems analysis & design

Hardback

In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing:... [more]

$295.30  $265.75

Forthcoming
Pre-Order now
Add this item to my basket
Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware Industrial Complex

Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware Industrial...

Bill Blunden, Violet Cheung

Computer security

Paperback

This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage... [more]

$33.95  $30.55

We can order this in for you
How long will it take?
Add this item to my basket
Protecting Oracle Database 12c

Protecting Oracle Database 12c

Paul Wright

Databases; Oracle; Computer security

Paperback

Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle... [more]

$92.65  $83.40

We can order this in for you
How long will it take?
Add this item to my basket
Computer Security Handbook, Set

Computer Security Handbook, Set

Seymour Bosworth, Michel E. Kabay, Eric Whyne

Computer security

Paperback

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around... [more]

$544.20  $489.80

We can order this in for you
How long will it take?
Add this item to my basket
The CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems

The CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and...

Robert C. Seacord

Programming & scripting languages: general; Databases; Computer security

Paperback

At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a... [more]

$132.30  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Data Driven Security: Analysis, Visualization and Dashboards

Data Driven Security: Analysis, Visualization and Dashboards

Jay Jacobs, Bob Rudis

Computer security; Network security

Paperback

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal... [more]

$110.10  $99.10

We can order this in for you
How long will it take?
Add this item to my basket
The Browser Hacker's Handbook

The Browser Hacker's Handbook

Wade Alcorn, Christian Frichot, Michele Orru

Computer fraud & hacking

Paperback

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical... [more]

$121.30  $109.15

We can order this in for you
How long will it take?
Add this item to my basket
Computer Network Security and Cyber Ethics

Computer Network Security and Cyber Ethics

Joseph Migga Kizza

Library & information sciences; Computer security; Computer networking & communications; Network security

Paperback

This volume on computer network security and cyber ethics examines topics including: the infrastructure and communication... [more]

$105.05  $94.55

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.