Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,615 results

Public-Key Cryptography - PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings

978/366/246/9783662464465.jpg

Public-Key Cryptography - PKC 2015: 18th IACR International Conference on...

Jonathan Katz

Data encryption

Paperback

This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography,... [more]

$296.45  $266.80

We can order this in for you
How long will it take?
Add this item to my basket
Cyber War versus Cyber Realities: Cyber Conflict in the International System

978/019/020/9780190204792.jpg

Cyber War versus Cyber Realities: Cyber Conflict in the International System...

Brandon Valeriano, Ryan Maness

Terrorism, armed struggle; Computer fraud & hacking

Hardback

Cyber conflict is real, but is not changing the dynamics of international politics. In this study, the authors provide a realistic... [more]

$79.95  $71.95

We can order this in for you
How long will it take?
Add this item to my basket
Multilevel Modeling of Secure Systems in Qop-ML

978/148/220/9781482202557.jpg

Multilevel Modeling of Secure Systems in Qop-ML

Bogdan Ksiezopolski

Computer security

Hardback

In order to perform effective analysis of today's information security systems, numerous components must be taken into consideration.... [more]

$250.05  $225.05

We can order this in for you
How long will it take?
Add this item to my basket
Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers

978/331/918/9783319186207.jpg

Privacy and Identity Management for the Future Internet in the Age of Globalisation:...

Jan Camenisch, Simone Fischer-Hubner, Marit Hansen

Ethical & social aspects of computing; Computer security; Information architecture

Hardback

This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG... [more]

$226.00  $203.40

We can order this in for you
How long will it take?
Add this item to my basket
Official (ISC)2 Guide to the ISSMP CBK

978/146/657/9781466578951.jpg

Official (ISC)2 Guide to the ISSMP CBK

Joseph Steinberg, (ISC)^2 Corporate

Computer certification; Computer security

Hardback

Offers an overview of management topics related to information security. This resource promotes an understanding of Enterprise... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security: Analytics, Technology and Automation

978/331/918/9783319183015.jpg

Cyber Security: Analytics, Technology and Automation

Martti Lehto, Pekka Neittaanmaki

Communications engineering & telecommunications; Security & fire alarm systems; Computer security

Hardback

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon... [more]

$371.10  $334.00

We can order this in for you
How long will it take?
Add this item to my basket
Emerging Security Solutions Using Public and Private Key Cryptography: Mathematical Concepts

978/146/668/9781466684843.jpg

Emerging Security Solutions Using Public and Private Key Cryptography: Mathematical...

V. N. Krishna

Data encryption

Hardback

Advances in computer technology have led to an increased need for online security and the protection of personal information.... [more]

$466.50  $419.85

We can order this in for you
How long will it take?
Add this item to my basket
The Internet of Things: Emergence, Perspectives, Privacy and Security Issues

978/163/482/9781634824422.jpg

The Internet of Things: Emergence, Perspectives, Privacy and Security Issues...

Emanuel Delgado

Computer security

Hardback

The Internet of Things (IoT) refers to the ability of everyday objects to connect to the Internet and to send and receive... [more]

$357.00  $321.30

We can order this in for you
How long will it take?
Add this item to my basket
Securing Systems: Applied Security Architecture and Threat Models

978/148/223/9781482233971.jpg

Securing Systems: Applied Security Architecture and Threat Models

Brook S. E. Schoenfield

Privacy & data protection; Network management

Hardback

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected... [more]

$182.55  $164.30

We can order this in for you
How long will it take?
Add this item to my basket
Identity in a Digital World: What it is and How to Protect it

978/146/656/9781466565463.jpg

Identity in a Digital World: What it is and How to Protect it

Dallas Bishoff

Computer security

Hardback

Supplying helpful guidelines for identity management, system procurement, and management, this book discusses how legal identity... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
Oracle Database 12C Security

978/007/182/9780071824286.jpg

Oracle Database 12C Security

David C. Knox, William Maroulis, Scott Gaetjen

Enterprise software; Data warehousing; Computer security; Network security

Paperback

Renowned Oracle security expert David Knox provides trusted advice and best practices for comprehensive Oracle Database security.... [more]

$104.95  $94.45

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers

978/331/915/9783319150864.jpg

Information Security Applications: 15th International Workshop, Wisa 2014,...

Kyung-Hyune Rhee, Jeong Hyun Yi, Kyung-Hyune Rhee

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Cybersecurity Policies and Strategies for Cyberwarfare Prevention

978/146/668/9781466684560.jpg

Cybersecurity Policies and Strategies for Cyberwarfare Prevention

Jean-Loup Richet

Computer security

Hardback

This book serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals,... [more]

$507.95  $457.15

We can order this in for you
How long will it take?
Add this item to my basket
Aspect-Oriented Security Hardening of UML Design Models

978/331/916/9783319161051.jpg

Aspect-Oriented Security Hardening of UML Design Models

Mourad Debbabi, Lingyu Wang, Chamseddine Talhi, Djedjiga Mouheb, Makan Pourzandi

Software Engineering; Computer security

Hardback

This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed... [more]

$226.00  $203.40

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Warfare: Building the Scientific Foundation

978/331/914/9783319140384.jpg

Cyber Warfare: Building the Scientific Foundation

Sushil Jajodia, Dr. Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang

Information retrieval; Computer security; Data encryption

Hardback

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and... [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Mathematical Theories for Computer and Network Security Engineering

no-image-available.jpg

Mathematical Theories for Computer and Network Security Engineering

M. Hamdi

Applied mathematics; Electronics & communications engineering; Computer security

Hardback

The security of information systems requires skilled specialists to apply a set of engineering techniques, supported by mathematical... [more]

$238.40  $214.55

Forthcoming
Pre-Order now
Add this item to my basket
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

978/007/182/9780071828369.jpg

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization...

Tyler Wrightson

Computer security; Network security

Paperback

Preventive strategies for deterring today's most malicious and least understood risks to enterprise security [more]

$77.05  $69.35

We can order this in for you
How long will it take?
Add this item to my basket
Trustworthy Global Computing: 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers

no-image-available.jpg

Trustworthy Global Computing: 9th International Symposium, TGC 2014, Rome,...

Matteo Maffei, Emilio Tuosto

Information retrieval; Computer security; Computer networking & communications

Paperback

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Trustworthy... [more]

$131.35  $118.20

We can order this in for you
How long will it take?
Add this item to my basket
Principles of Information Security

978/128/544/9781285448367.jpg

Principles of Information Security

Michael Whitman, Herbert Mattord

Computer security

Paperback

Specifically oriented to the needs of information systems students, this book delivers the technology and developments from... [more]

$331.10  $298.00

We can order this in for you
How long will it take?
Add this item to my basket
Protect, Backup and Clean Your PC for Seniors: Stay Safe When Using the Internet and Email and Keep Your PC in Good Condition!

978/905/905/9789059054004.jpg

Protect, Backup and Clean Your PC for Seniors: Stay Safe When Using the...

Studio Visual Steps

Computer viruses, Trojans & worms

Paperback

It is very important to safeguard your computer and protect your privacy while surfing the Internet. What can you do to prevent... [more]

$33.95  $30.55

We can order this in for you
How long will it take?
Add this item to my basket
A Practical Guide to Computer Forensics Investigations

978/078/974/9780789741158.jpg

A Practical Guide to Computer Forensics Investigations

Darren R. Hayes

Computer security; Network security

Paperback

All you need to know to succeed in digital forensics: technical and investigative skills, in one book Complete, practical,... [more]

$160.70  $144.65

We can order this in for you
How long will it take?
Add this item to my basket
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain

no-image-available.jpg

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital...

Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron

Espionage & secret services; IT & Communications law; Computer security

Hardback

A comprehensive analysis of China's cyberspace threats and policies, emphasizing the vantage points of China and U.S. on cyber... [more]

$247.65  $222.90

We can order this in for you
How long will it take?
Add this item to my basket
Practical Hadoop Security

978/143/026/9781430265443.jpg

Practical Hadoop Security

Bhushan Lakhe

Databases; Data encryption

Paperback

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to... [more]

$132.30  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Personal Mobile Devices in the Enterprise: Security and Privacy Concerns

978/146/659/9781466593084.jpg

Personal Mobile Devices in the Enterprise: Security and Privacy Concerns...

Lawrence Gerard Dobranski

Internet guides & online services; Computer security; Network management

Hardback

Leaders of many public and private organizations face increased pressure to allow the use of personal mobile devices in their... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
Physically Unclonable Functions (Pufs): Applications, Models, and Future Directions

978/162/705/9781627055093.jpg

Physically Unclonable Functions (Pufs): Applications, Models, and Future...

Christian Wachsmann, Ahmad-Reza Sadeghi

Coding theory & cryptology; Business applications; Data encryption

Paperback

Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors,... [more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.