Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security titles - 1,443 results

Cyber Risks for Business Professionals: A Management Guide

Cyber Risks for Business Professionals: A Management Guide

Rupert Kendrick

Coding theory & cryptology; Management & management techniques; Data encryption; Network security

Paperback

Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing... [more]

$52.80

We can order this in for you
How long will it take?
Add this item to my basket
The Definitive Guide to the C&A Transformation

The Definitive Guide to the C&A Transformation

Julie E Mehan, Waylon Krush

Computer security; Network security

Paperback

The Definitive Guide to the C&A Transformation provides an authoritative guide to authorization for persons with knowledge... [more]

$71.50

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Governance

Information Security Governance

Krag Brotby

Knowledge management; Corporate governance & responsibilities; Computer security

Hardback

This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step... [more]

$121.95

We can order this in for you
How long will it take?
Add this item to my basket
Lab Manual for Guide to Computer Forensics and Investigations

Lab Manual for Guide to Computer Forensics and Investigations

Bill Nelson, Amelia Phillips, Christopher Steuart, Andrew Blitz

Computing & IT; Computer security; Network security

Paperback

To ensure a successful experience for instructors and students alike, this book includes the following sections for each lab:... [more]

$79.95  $71.95

We can order this in for you
How long will it take?
Add this item to my basket
Audacity to Spy: How Government, Business & Hackers Rob Us of Privacy

Audacity to Spy: How Government, Business & Hackers Rob Us of Privacy

Catherine Nolan, Ashley M. Wilson

Market research; Privacy & data protection; Network security

Paperback

The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an... [more]

$33.95  $30.55

We can order this in for you
How long will it take?
Add this item to my basket
Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats

Building an Information Security Awareness Program: Defending Against Social...

Bill Gardner, Valerie Thomas

Computer security

Paperback

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's... [more]

$132.25  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Ceh: Certified Ethical Hacker Version 8 Study Guide

Ceh: Certified Ethical Hacker Version 8 Study Guide

Sean Philip Oriyano, Jason McDowell

Computer fraud & hacking

Paperback

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high... [more]

$76.60  $68.95

Forthcoming
Pre-Order now
Add this item to my basket
The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice

The Basics of Information Security: Understanding the Fundamentals of Infosec...

Jason Andress

Computing & IT; Computer security; Network security

Paperback

Provides you with fundamental knowledge of information security in both theoretical and practical aspects. This title covers... [more]

$78.40  $70.55

We can order this in for you
How long will it take?
Add this item to my basket
Qr Codes: The Technical Guide

Qr Codes: The Technical Guide

Michael M Stark (Boise Idaho USA)

Coding theory & cryptology; Radio technology; Imaging systems & technology; Graphical & digital media applications; Data encryption

Paperback

This book is a complete treatise on Quick Response (QR) Code symbols the square barcodes that can be read by smart phones.... [more]

$129.85  $116.85

Forthcoming
Pre-Order now
Add this item to my basket
The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture

The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your...

Kerry Ann Anderson

Knowledge management; Computer security

Paperback

If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving... [more]

$129.85  $116.85

We can order this in for you
How long will it take?
Add this item to my basket
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Lillian Ablon, Martin C Libicki (RAND Corporation, California), Andrea A Golay

Sales & marketing; Privacy & data protection; Computer viruses, Trojans & worms; Network security

Paperback

Criminal activities in cyberspace are increasingly facilitated by black markets. This report characterizes these markets and... [more]

$56.05  $50.45

We can order this in for you
How long will it take?
Add this item to my basket
Computer Forensics and Digital Investigation with EnCase Forensic

Computer Forensics and Digital Investigation with EnCase Forensic

Suzanne Widup

Computing: general; Computer security; Network security

Paperback

This practical, professional book provides a scenario-based guide to the industry's #1 digital forensics tool, EnCase Forensic.... [more]

$77.05  $69.35

We can order this in for you
How long will it take?
Add this item to my basket
Case Studies in Secure Computing: Achievements and Trends

Case Studies in Secure Computing: Achievements and Trends

Biju Issac, Nauman Israr

Computer security

Hardback

In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing:... [more]

$295.30  $265.75

We can order this in for you
How long will it take?
Add this item to my basket
At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and...

Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work, Computer Science and Telecommunications Board

Computer security

Paperback

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient.... [more]

$78.55  $70.70

We can order this in for you
How long will it take?
Add this item to my basket
Penetration Testing: A Hands-on Introduction to Hacking

Penetration Testing: A Hands-on Introduction to Hacking

Georgia Weidman

Computer security; Computer fraud & hacking; Network security

Paperback

In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that... [more]

$76.55  $68.90

We can order this in for you
How long will it take?
Add this item to my basket
Investigative Interviewing: Psychology, Method and Practice

Investigative Interviewing: Psychology, Method and Practice

Eugene Ferraro

Police & security services; Forensic science; Management & management techniques; Production & quality control management; Criminal law & procedure; Criminal justice law; Police procedures; Computer security

Hardback

There are few skills more important to the modern fact finder than the ability to obtain information through effective interviewing.... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Information Security: Principles and Practices

Information Security: Principles and Practices

Mark S. Merkow, Jim Breithaupt (Head of Physics, Wigan College of Technology)

Computer security; Network security

Paperback

Useful for an introductory course in information security, this title presents principles and practices. It covers the 10... [more]

$184.95  $166.45

We can order this in for you
How long will it take?
Add this item to my basket
Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

Adam Shostack

Computer security

Paperback

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat... [more]

$131.35  $118.20

We can order this in for you
How long will it take?
Add this item to my basket
Police Investigative Interviews and Interpreting: Context, Challenges, and Strategies

Police Investigative Interviews and Interpreting: Context, Challenges, and...

Sedat Mulayim, Miranda Lai, Caroline Norma

Police & security services; Crime & criminology; Criminal investigation & detection; Forensic science; Criminal law & procedure; Criminal justice law; Computer security

Hardback

Police interviews with suspects and witnesses provide some of the most significant evidence in criminal investigations. Frequently... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
CompTIA Security+ Study Guide: SY0-401

CompTIA Security+ Study Guide: SY0-401

Emmett Dulaney, Chuck Easttom

Education; Computer certification: CompTia; Computer security; Network security

Paperback

Join over 250,000 IT professionals who've earned Security+ certification If you're an IT professional hoping to progress... [more]

$76.60  $68.95

We can order this in for you
How long will it take?
Add this item to my basket
Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar

Internet guides & online services; Software Engineering; Computer security

Hardback

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Case Studies in Intelligent Computing: Achievements and Trends

Case Studies in Intelligent Computing: Achievements and Trends

Biju Issac, Nauman Israr

Electronics engineering; Software Engineering; Computer security; Artificial intelligence

Hardback

Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies... [more]

$295.30  $265.75

Forthcoming
Pre-Order now
Add this item to my basket
Official (Isc)2 Guide to the CISSP Cbk, Fourth Edition

Official (Isc)2 Guide to the CISSP Cbk, Fourth Edition

Adam Gordon

Computer security

Hardback

This book presents material that has been prepared by CISSP credential holders and reviewed by (ISC)^2 authorized instructors... [more]

$209.40  $188.45

Forthcoming
Pre-Order now
Add this item to my basket
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8

Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows...

Harlan Carvey

Microsoft Windows; Computer security

Paperback

This text covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable... [more]

$153.70  $138.35

We can order this in for you
How long will it take?
Add this item to my basket
Secure Messaging on the Internet

Secure Messaging on the Internet

Rolf Oppliger

Computing & IT; Computer security

Hardback

This book offers a comprehensive understanding of secure Internet messaging, and brings together all the relevant and critical... [more]

$208.55  $187.70

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.