Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

758 results

Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler Web Debugger

978/151/157/9781511572903.jpg

Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler...

Eric Lawrence

Software Engineering; Computer viruses, Trojans & worms

Paperback

Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers,... [more]

$66.20  $59.60

We can order this in for you
How long will it take?
Add this item to my basket
Transactions on Data Hiding and Multimedia Security X

978/366/246/9783662467381.jpg

Transactions on Data Hiding and Multimedia Security X

Yun Q. Shi

Coding theory & cryptology; Computer security; Image processing

Paperback

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is... [more]

$131.35  $118.20

We can order this in for you
How long will it take?
Add this item to my basket
Powering Up a Career in Internet Security

978/149/946/9781499460933.jpg

Powering Up a Career in Internet Security

Don Rauf

Computer security

Hardback

While the continued growth of the Internet has opened unprecedented possibilities for users, it has been accompanied by an... [more]

$81.65  $73.50

We can order this in for you
How long will it take?
Add this item to my basket
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family

978/144/224/9781442242579.jpg

Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights,...

Theresa M. Payton, Ted Claypoole

Ethical & social aspects of computing; Privacy & data protection

Paperback

Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself... [more]

$33.00  $29.70

We can order this in for you
How long will it take?
Add this item to my basket
Principles of Security and Trust: 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings

978/366/246/9783662466650.jpg

Principles of Security and Trust: 4th International Conference, POST 2015,...

Riccardo Focardi, Andrew Myers

Network hardware; Computer security; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
New Media Politics: Rethinking Activism and National Security in Cyberspace

978/144/387/9781443877107.jpg

New Media Politics: Rethinking Activism and National Security in Cyberspace...

Banu Baybars-Hawks

Ethical & social aspects of computing; Computer security

Hardback

New Media Politics: Rethinking Activism and National Security in Cyberspace explores many of the questions surrounding the... [more]

$200.00  $180.00

We can order this in for you
How long will it take?
Add this item to my basket
Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers

978/331/918/9783319186207.jpg

Privacy and Identity Management for the Future Internet in the Age of Globalisation:...

Jan Camenisch, Simone Fischer-Hubner, Marit Hansen

Ethical & social aspects of computing; Computer security; Information architecture

Hardback

This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG... [more]

$226.00  $203.40

We can order this in for you
How long will it take?
Add this item to my basket
The Internet of Things: Emergence, Perspectives, Privacy and Security Issues

978/163/482/9781634824422.jpg

The Internet of Things: Emergence, Perspectives, Privacy and Security Issues...

Emanuel Delgado

Computer security

Hardback

The Internet of Things (IoT) refers to the ability of everyday objects to connect to the Internet and to send and receive... [more]

$357.00  $321.30

We can order this in for you
How long will it take?
Add this item to my basket
Emerging Security Solutions Using Public and Private Key Cryptography: Mathematical Concepts

978/146/668/9781466684843.jpg

Emerging Security Solutions Using Public and Private Key Cryptography: Mathematical...

V. N. Krishna

Data encryption

Hardback

Advances in computer technology have led to an increased need for online security and the protection of personal information.... [more]

$466.50  $419.85

We can order this in for you
How long will it take?
Add this item to my basket
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain

no-image-available.jpg

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital...

Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron

Espionage & secret services; IT & Communications law; Computer security

Hardback

A comprehensive analysis of China's cyberspace threats and policies, emphasizing the vantage points of China and U.S. on cyber... [more]

$247.65  $222.90

We can order this in for you
How long will it take?
Add this item to my basket
Identity in a Digital World: What it is and How to Protect it

978/146/656/9781466565463.jpg

Identity in a Digital World: What it is and How to Protect it

Dallas Bishoff

Computer security

Hardback

Supplying helpful guidelines for identity management, system procurement, and management, this book discusses how legal identity... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers

978/331/915/9783319150864.jpg

Information Security Applications: 15th International Workshop, Wisa 2014,...

Kyung-Hyune Rhee, Jeong Hyun Yi, Kyung-Hyune Rhee

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Safer Electronic Health Records: Safety Assurance Factors for EHR Resilience

978/177/188/9781771881173.jpg

Safer Electronic Health Records: Safety Assurance Factors for EHR Resilience...

Dean F. Sittig, Hardeep Singh

Medical administration & management; Computer security

Hardback

CRC Press, Taylor & Francis Group --Cover. [more]

$319.95  $287.95

Forthcoming
Pre-Order now
Add this item to my basket
Cyber Warfare: Building the Scientific Foundation

978/331/914/9783319140384.jpg

Cyber Warfare: Building the Scientific Foundation

Sushil Jajodia, Dr. Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang

Information retrieval; Computer security; Data encryption

Hardback

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and... [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Trustworthy Global Computing: 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers

no-image-available.jpg

Trustworthy Global Computing: 9th International Symposium, TGC 2014, Rome,...

Matteo Maffei, Emilio Tuosto

Information retrieval; Computer security; Computer networking & communications

Paperback

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Trustworthy... [more]

$131.35  $118.20

We can order this in for you
How long will it take?
Add this item to my basket
Cloud-Centric Cybersecurity and Critical Infrastructure Protection

no-image-available.jpg

Cloud-Centric Cybersecurity and Critical Infrastructure Protection

Joe B. Wilson

Data encryption

Hardback

The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection and simulation... [more]

$210.55  $189.50

Forthcoming
Pre-Order now
Add this item to my basket
Applied Cryptography: Protocols, Algorithms and Source Code in C

978/111/909/9781119096726.jpg

Applied Cryptography: Protocols, Algorithms and Source Code in C

Bruce Schneier

Data encryption

Hardback

<p>From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive... [more]

$104.95  $94.45

We can order this in for you
How long will it take?
Add this item to my basket
Personal Mobile Devices in the Enterprise: Security and Privacy Concerns

978/146/659/9781466593084.jpg

Personal Mobile Devices in the Enterprise: Security and Privacy Concerns...

Lawrence Gerard Dobranski

Internet guides & online services; Computer security; Network management

Hardback

Leaders of many public and private organizations face increased pressure to allow the use of personal mobile devices in their... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
Secrets and Lies: Digital Security in a Networked World

978/111/909/9781119092438.jpg

Secrets and Lies: Digital Security in a Networked World

Bruce Schneier

Computer security; Computer networking & communications

Hardback

<p>This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward... [more]

$46.95  $42.25

We can order this in for you
How long will it take?
Add this item to my basket
Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers

978/366/245/9783662454718.jpg

Financial Cryptography and Data Security: 18th International Conference,...

Nicolas Christin, Reihaneh Safavi-Naini

Coding theory & cryptology; Business applications; Data encryption

Paperback

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Understanding Network Hacks: Attack and Defense with Python

978/366/244/9783662444368.jpg

Understanding Network Hacks: Attack and Defense with Python

Bastian Ballmann

Web programming; Computer security

Hardback

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively... [more]

$109.45  $98.50

We can order this in for you
How long will it take?
Add this item to my basket
Usable Security: History, Themes, and Challenges

978/162/705/9781627055291.jpg

Usable Security: History, Themes, and Challenges

Simson Garfinkel, Heather Richter Lipford

Coding theory & cryptology; Data encryption

Paperback

There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer... [more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
Developing Secure Applications

978/143/025/9781430258759.jpg

Developing Secure Applications

Nishant Das Patnaik

Computer security

Paperback

Developing Secure Applications is targeted towards all developers and security programmers. Mobile apps, website applications,... [more]

$76.60  $68.95

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying

no-image-available.jpg

Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft,...

Alexis Moore, Laurie Edwards

Computer security; Network security; Safety in the home

Paperback

Are you in danger of being cyberstalked? Have you been cyberbullied? Outwit your cyberattacker with these clever strategies... [more]

$29.95  $26.35

We can order this in for you
How long will it take?
Add this item to my basket
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings

978/331/912/9783319120591.jpg

Security, Privacy, and Applied Cryptography Engineering: 4th International...

Rajat Subhra Chakraborty, Vashek Matyas, Patrick R. Schaumont

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.