Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,798 results

Information Systems Security and Privacy: Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers

978/331/954/9783319544328.jpg

Information Systems Security and Privacy: Second International Conference,...

Olivier Camp, Steven Furnell (University of Plymouth, UK), Paolo Mori

Computer security

Paperback

This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and... [more]

$214.95  $193.45

We can order this in for you
How long will it take?
Add this item to my basket
Proceedings of the International Conference on Security and Management (SAM 16)

no-image-available.jpg

Proceedings of the International Conference on Security and Management (SAM...

Kevin Daimi, Hamid R. Arabnia, Tiziana Margaria, Ashu M. G. Solo

Computer security

Paperback

Security and Management is a compendium of articles and papers that were presented at SAM '15, an international conference... [more]

$250.95  $225.85

Forthcoming
Pre-Order now
Add this item to my basket
Social Media Warfare: Equal Weapons for All

978/113/803/9781138036024.jpg

Social Media Warfare: Equal Weapons for All

Michael Erbschloe

Crime & criminology; Terrorism, armed struggle; Irregular or guerrilla forces & warfare; Computer security

Hardback

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states,... [more]

$214.95  $193.45

Forthcoming
Pre-Order now
Add this item to my basket
Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA

978/081/573/9780815730637.jpg

Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the...

Timothy H. Edgar

Espionage & secret services; Privacy law; Privacy & data protection

Hardback

Safeguarding Our Privacy and Our Values in an Age of Mass Surveillance America's mass surveillance programs, once secret,... [more]

$41.95  $37.75

Forthcoming
Pre-Order now
Add this item to my basket
Security Solutions and Applied Cryptography in Smart Grid Communications

978/152/251/9781522518297.jpg

Security Solutions and Applied Cryptography in Smart Grid Communications...

Mohamed Amine Ferrag (Guelma University Algeria), Ahmed Ahmim (University of Larbi Tebessi Algeria)

Data encryption

Hardback

Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive... [more]

$540.95  $486.85

We can order this in for you
How long will it take?
Add this item to my basket
Blue Team Field Manual (Btfm)

978/154/101/9781541016361.jpg

Blue Team Field Manual (Btfm)

Alan J White

Computer security

Paperback

Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework... [more]

$47.95  $43.15

We can order this in for you
How long will it take?
Add this item to my basket
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

978/148/422/9781484224298.jpg

Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Marvin Waschke

Business mathematics & systems; Personal computers; Computer security; Network security

Paperback

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you... [more]

$64.95  $58.45

We can order this in for you
How long will it take?
Add this item to my basket
Cyberphobia: Identity, Trust, Security and the Internet

978/163/286/9781632862273.jpg

Cyberphobia: Identity, Trust, Security and the Internet

Edward Lucas

True crime; Espionage & secret services; Computer security

Paperback

A sobering and insightful book on the dangers of cybercrime and its potentially catastrophic consequences. [more]

$33.95  $30.55

Forthcoming
Pre-Order now
Add this item to my basket
Windows Stack Exploitation 2

978/154/240/9781542405010.jpg

Windows Stack Exploitation 2

MR Samuel Huntley

Computer security

Paperback

This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various... [more]

$165.95  $149.35

We can order this in for you
How long will it take?
Add this item to my basket
Hipaa and PCI Audits: Secrets to Getting Great Results

no-image-available.jpg

Hipaa and PCI Audits: Secrets to Getting Great Results

Raj Goel

Computer security; Network management

Hardback

This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system,... [more]

$242.95  $218.65

We can order this in for you
How long will it take?
Add this item to my basket
Data Localization Laws & Policy: The EU Data Protection International Transfers Restriction Through a Cloud Computing Lens

no-image-available.jpg

Data Localization Laws & Policy: The EU Data Protection International Transfers...

Wai K. Hon

Privacy law; Data protection law; Legal aspects of computing; Computer security

Hardback

Countries are increasingly introducing data localization laws and data export restrictions, threatening digital globalization... [more]

$537.95  $484.15

Forthcoming
Pre-Order now
Add this item to my basket
Securing the Internet of Things: An End-to-End Strategy Guide for Product and Service Security

978/125/958/9781259588280.jpg

Securing the Internet of Things: An End-to-End Strategy Guide for Product...

Don A. Bailey

Computer security

Paperback

Develop, deploy, and administer an effective security framework for IoT-oriented products and services [more]

$91.95  $82.75

We can order this in for you
How long will it take?
Add this item to my basket
Digital Forensic Science: Issues, Methods, and Challenges

978/162/705/9781627059596.jpg

Digital Forensic Science: Issues, Methods, and Challenges

Vassil Roussev

Information retrieval; Computer security

Paperback

Provides a systematic technical overview of digital forensic techniques, primarily from the point of view of computer science.... [more]

$128.95  $116.05

We can order this in for you
How long will it take?
Add this item to my basket
Network Security Assessment: Know Your Network

978/149/191/9781491910955.jpg

Network Security Assessment: Know Your Network

Chris McNab

Computer security; Computer networking & communications

Paperback

How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify... [more]

$128.95  $116.05

We can order this in for you
How long will it take?
Add this item to my basket
Beginning Ethical Hacking with Python

978/148/422/9781484225400.jpg

Beginning Ethical Hacking with Python

Sanjib Sinha

Programming & scripting languages: general; Data encryption

Paperback

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set... [more]

$49.95  $44.95

We can order this in for you
How long will it take?
Add this item to my basket
The Chief Information Security Officer: Roles and Responsibilities

no-image-available.jpg

The Chief Information Security Officer: Roles and Responsibilities

Kamesh Namuduri

Management & management techniques; Computer security

Hardback

This book provides a high-level discussion on the roles and responsibilities of a CISO or an equivalent authority in charge... [more]

$214.95  $193.45

Forthcoming
Pre-Order now
Add this item to my basket
Cybersecurity Breaches and Issues Surrounding Online Threat Protection

978/152/251/9781522519416.jpg

Cybersecurity Breaches and Issues Surrounding Online Threat Protection

Michelle Moore

Computer security

Hardback

This book is an essential reference source for the latest scholarly research on the various types of unauthorized access or... [more]

$489.95  $440.95

We can order this in for you
How long will it take?
Add this item to my basket
Radical Trust: How Blockchain Liberates the Next Economy

978/161/039/9781610397537.jpg

Radical Trust: How Blockchain Liberates the Next Economy

Lisa Gansky

Information technology industries; Ethical & social aspects of computing; Computer security

Hardback

Blockchain technology, one of the most buzzed-about yet least understood technological innovations of recent years, is at... [more]

$49.95  $44.95

We can order this in for you
How long will it take?
Add this item to my basket
Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain

978/331/950/9783319508467.jpg

Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain...

Anthimos Alexandro Tsirigotis

International relations; Warfare & defence; Computer security; Network security

Hardback

This book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood... [more]

$323.95  $291.55

We can order this in for you
How long will it take?
Add this item to my basket
NTP Security: A Quick-Start Guide

978/148/422/9781484224113.jpg

NTP Security: A Quick-Start Guide

Allan Liska

Computer security

Paperback

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing... [more]

$55.95  $50.35

We can order this in for you
How long will it take?
Add this item to my basket
Certified Ethical Hacker (CEH) Foundation Guide

978/148/422/9781484223246.jpg

Certified Ethical Hacker (CEH) Foundation Guide

Sagar Rahalkar

Coding theory & cryptology; Computer certification; Computer fraud & hacking; Network security

Paperback

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating... [more]

$57.15  $51.45

We can order this in for you
How long will it take?
Add this item to my basket
Advanced Persistent Threat Modeling: Defending Against APTs

978/149/195/9781491955239.jpg

Advanced Persistent Threat Modeling: Defending Against APTs

Wil Allsopp

Computer viruses, Trojans & worms; Data encryption; Network security

Paperback

Advanced Persistent Threat Modeling is an in-depth guide to targeting and compromising high-security environments. With it,... [more]

$89.95  $80.95

Forthcoming
Pre-Order now
Add this item to my basket
Architecting User-Centric Privacy-as-A-Set-of-Services: Digital Identity-Related Privacy Framework

978/331/938/9783319383743.jpg

Architecting User-Centric Privacy-as-A-Set-of-Services: Digital Identity-Related...

Ghazi Ben Ayed

Business mathematics & systems; Communications engineering & telecommunications; Computer security; Computer networking & communications

Paperback

How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations... [more]

$323.95  $291.55

We can order this in for you
How long will it take?
Add this item to my basket
Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Proceedings

978/331/948/9783319486734.jpg

Cloud Computing and Security: Second International Conference, ICCCS 2016,...

Xingming Sun, Alex Liu, Elisa Bertino, Elisa Bertino

Information retrieval; Privacy & data protection

Paperback

This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International... [more]

$298.95  $269.05

We can order this in for you
How long will it take?
Add this item to my basket
Building a Practical Information Security Program

978/012/802/9780128020425.jpg

Building a Practical Information Security Program

Jason Andress, Mark Leary, David Guretz

Computer security

Paperback

Building a Practical Information Security Program provides users with a strategic view on how to build an information security... [more]

$180.95  $162.85

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.