Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,424 results

Practical Hadoop Security

978/143/026/9781430265443.jpg

Practical Hadoop Security

Bhushan Lakhe

Databases; Data encryption

Paperback

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to... [more]

$132.30  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Physically Unclonable Functions (Pufs): Applications, Models, and Future Directions

978/162/705/9781627055093.jpg

Physically Unclonable Functions (Pufs): Applications, Models, and Future...

Christian Wachsmann, Ahmad-Reza Sadeghi

Coding theory & cryptology; Business applications; Data encryption

Paperback

Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors,... [more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
How to Attack and Defend Your Website

no-image-available.jpg

How to Attack and Defend Your Website

Henry Dalziel

Computer security; Network security

Paperback

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials.... [more]

$88.45  $79.60

We can order this in for you
How long will it take?
Add this item to my basket
How to Define and Build an Effective Cyber Threat Intelligence Capability

no-image-available.jpg

How to Define and Build an Effective Cyber Threat Intelligence Capability...

Henry Dalziel

Computer security

Paperback

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the... [more]

$88.45  $79.60

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Warfare: A Reference Handbook

978/161/069/9781610694438.jpg

Cyber Warfare: A Reference Handbook

Paul J. Springer

Military tactics; Computer security

Hardback

This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to... [more]

$151.90  $136.70

We can order this in for you
How long will it take?
Add this item to my basket
Ceh: Certified Ethical Hacker Version 8 Study Guide

978/111/864/9781118647677.jpg

Ceh: Certified Ethical Hacker Version 8 Study Guide

Sean Philip Oriyano, Jason McDowell

Computer fraud & hacking

Paperback

<p>Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide<p>Security professionals remain in high... [more]

$76.60  $68.95

We can order this in for you
How long will it take?
Add this item to my basket
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door

978/140/229/9781402295614.jpg

Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic...

Brian Krebs

True crime; Organised crime; Internet guides & online services; Computer viruses, Trojans & worms

Hardback

Now a New York Times bestseller!There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal... [more]

$40.00  $36.00

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying

no-image-available.jpg

Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft,...

Alexis Moore, Laurie Edwards

Computer security; Network security; Safety in the home

Paperback

According to the U.S .Department of Justice, more than six million people are stalked each year in the United States alone.... [more]

$29.95  $26.35

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Modern Cryptography

978/146/657/9781466570269.jpg

Introduction to Modern Cryptography

Jonathan Katz, Yehuda Lindell

Privacy & data protection; Data encryption

Hardback

Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Mobile Device Management and Strategy

no-image-available.jpg

Mobile Device Management and Strategy

Leighton R Johnson III (Information Security and Forensics Management Team (ISFMT) Bath South Carolina USA)

Production & quality control management; Computing: general; Computer security

Hardback

Due to their always-on wireless connections, physical sensors, and location services, mobile devices are subject to unique... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
Privacy and Digital Security

no-image-available.jpg

Privacy and Digital Security

Megan Fromm

Computer security

Hardback

In the digital age, journalists have to be concerned about privacy and security like never before. This book teaches students... [more]

$71.85  $64.65

Forthcoming
Pre-Order now
Add this item to my basket
Audacity to Spy: How Government, Business & Hackers Rob Us of Privacy

978/193/550/9781935504795.jpg

Audacity to Spy: How Government, Business & Hackers Rob Us of Privacy

Catherine Nolan, Ashley M. Wilson

Market research; Privacy & data protection; Network security

Paperback

The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an... [more]

$33.95  $30.55

We can order this in for you
How long will it take?
Add this item to my basket
Multilevel Security for Relational Databases

978/148/220/9781482205398.jpg

Multilevel Security for Relational Databases

Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam, Hala S. El-sayed

Relational databases; Computer security

Hardback

Since databases are the primary repositories of information for today's organizations and governments, database security has... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Android Malware and Analysis

978/148/225/9781482252194.jpg

Android Malware and Analysis

Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere

Software Engineering; Computer security

Hardback

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices... [more]

$157.05  $141.35

We can order this in for you
How long will it take?
Add this item to my basket
Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats

978/012/419/9780124199675.jpg

Building an Information Security Awareness Program: Defending Against Social...

Bill Gardner, Valerie Thomas

Computer security

Paperback

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's... [more]

$132.25  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Practical Cryptography: Algorithms and Implementations Using C++

978/148/222/9781482228892.jpg

Practical Cryptography: Algorithms and Implementations Using C++

Saiful Azad, Al-Sakib Khan Pathan

Data encryption

Hardback

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make... [more]

$182.55  $164.30

We can order this in for you
How long will it take?
Add this item to my basket
The Practical Guide to Hipaa Privacy and Security Compliance, Second Edition

978/143/985/9781439855584.jpg

The Practical Guide to Hipaa Privacy and Security Compliance, Second Edition...

Rebecca Herold, Kevin Beaver

Health systems & services; Computer security; Network management

Hardback

Offers a resource for HIPAA privacy and security advice that can be applied to various organizations' unique situation. This... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Hardware Security: Design, Threats, and Safeguards

978/143/989/9781439895832.jpg

Hardware Security: Design, Threats, and Safeguards

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

Computer hardware; Computer security

Hardback

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Handbook of Space Security: Policies, Applications and Programs

978/146/142/9781461420286.jpg

Handbook of Space Security: Policies, Applications and Programs

Kai-Uwe Schrogl, Peter L. Hays, Spyros Pagkratis, Jana Robinson, Christina Giannopapa

International space & aerospace law; Astronautics; Computer security

Hardback

Handbook of Space Security [more]

$1407.75  $1267.00

We can order this in for you
How long will it take?
Add this item to my basket
Integer Algorithms in Cryptology and Information Assurance

978/981/462/9789814623742.jpg

Integer Algorithms in Cryptology and Information Assurance

Boris S Verkhovsky

Data encryption

Hardback

Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms... [more]

$294.40  $264.95

We can order this in for you
How long will it take?
Add this item to my basket
The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice

978/012/800/9780128007440.jpg

The Basics of Information Security: Understanding the Fundamentals of Infosec...

Jason Andress

Computer security; Network security

Paperback

Provides you with fundamental knowledge of information security in both theoretical and practical aspects. This title covers... [more]

$78.40  $70.55

We can order this in for you
How long will it take?
Add this item to my basket
Securing the Cloud: Security Strategies for the Ubiquitous Data Center

no-image-available.jpg

Securing the Cloud: Security Strategies for the Ubiquitous Data Center

Curtis Franklin Jr., Brian Chee

Computer security; Network security

Hardback

A must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Background Checks Under Fire: Legal Information You Need to Stay Out of Court

no-image-available.jpg

Background Checks Under Fire: Legal Information You Need to Stay Out of...

Angela L Preston (Columbus Ohio USA)

Management & management techniques; Constitutional & administrative law; Criminal law & procedure; Computer security

Hardback

Those responsible for the background screening programs in their organisations are accountable at some level to establish... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

no-image-available.jpg

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Lillian Ablon, Martin C Libicki (RAND Corporation, California), Andrea A Golay

Sales & marketing; Privacy & data protection; Computer viruses, Trojans & worms; Network security

Paperback

Criminal activities in cyberspace are increasingly facilitated by black markets. This report characterizes these markets and... [more]

$56.05  $50.45

We can order this in for you
How long will it take?
Add this item to my basket
At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues

978/030/930/9780309303187.jpg

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and...

Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work, Computer Science and Telecommunications Board

Computer security

Paperback

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient.... [more]

$78.55  $70.70

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.