Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,568 results

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

978/111/882/9781118825099.jpg

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux,...

Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters

Computer security

Paperback

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing... [more]

$142.85  $128.55

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying

no-image-available.jpg

Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft,...

Alexis Moore, Laurie Edwards

Computer security; Network security; Safety in the home

Paperback

Are you in danger of being cyberstalked? Have you been cyberbullied? Outwit your cyberattacker with these clever strategies... [more]

$29.95  $26.35

We can order this in for you
How long will it take?
Add this item to my basket
Developing Secure Applications

978/143/025/9781430258759.jpg

Developing Secure Applications

Nishant Das Patnaik

Computer security

Paperback

Developing Secure Applications is targeted towards all developers and security programmers. Mobile apps, website applications,... [more]

$76.60  $68.95

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Modern Cryptography

978/146/657/9781466570269.jpg

Introduction to Modern Cryptography

Jonathan Katz, Yehuda Lindell

Privacy & data protection; Data encryption

Hardback

Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Mobile Device Management and Strategy

no-image-available.jpg

Mobile Device Management and Strategy

Leighton R Johnson III (Information Security and Forensics Management Team (ISFMT) Bath South Carolina USA)

Production & quality control management; Computing: general; Computer security

Hardback

Due to their always-on wireless connections, physical sensors, and location services, mobile devices are subject to unique... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
Privacy and Digital Security

no-image-available.jpg

Privacy and Digital Security

Megan Fromm

Computer security

Hardback

In the digital age, journalists have to be concerned about privacy and security like never before. This book teaches students... [more]

$71.85  $64.65

We can order this in for you
How long will it take?
Add this item to my basket
Multilevel Security for Relational Databases

978/148/220/9781482205398.jpg

Multilevel Security for Relational Databases

Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam, Hala S. El-sayed

Relational databases; Computer security

Hardback

Since databases are the primary repositories of information for today's organizations and governments, database security has... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Audacity to Spy: How Government, Business & Hackers Rob Us of Privacy

978/193/550/9781935504795.jpg

Audacity to Spy: How Government, Business & Hackers Rob Us of Privacy

Catherine Nolan, Ashley M. Wilson

Market research; Privacy & data protection; Network security

Paperback

The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an... [more]

$33.95  $30.55

We can order this in for you
How long will it take?
Add this item to my basket
The Infosec Handbook: An Introduction to Information Security

978/143/026/9781430263821.jpg

The Infosec Handbook: An Introduction to Information Security

Umesha Nayak, Umesh Rao, Andy Nayak, Andy Rao

Data encryption; Computer networking & communications

Paperback

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners... [more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace

978/113/747/9781137476173.jpg

Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace

Brian M. Mazanec, Bradley A. Thayer

Defence strategy, planning & research; Computer security

Hardback

Deterrence theory was well developed during the Cold War for the deterrence of kinetic attacks. While the deterrence of cyber... [more]

$148.35  $133.50

We can order this in for you
How long will it take?
Add this item to my basket
Reforming European Data Protection Law

978/940/179/9789401793841.jpg

Reforming European Data Protection Law

Serge Gutwirth, Ronald Leenes, Paul De Hert

Philosophy; Human rights; Ethical & social aspects of computing; Legal aspects of computing; Computer security

Hardback

This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices,... [more]

$371.10  $334.00

We can order this in for you
How long will it take?
Add this item to my basket
Android Malware and Analysis

978/148/225/9781482252194.jpg

Android Malware and Analysis

Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere

Software Engineering; Computer security

Hardback

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices... [more]

$157.05  $141.35

We can order this in for you
How long will it take?
Add this item to my basket
Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats

978/012/419/9780124199675.jpg

Building an Information Security Awareness Program: Defending Against Social...

Bill Gardner, Valerie Thomas

Computer security

Paperback

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's... [more]

$132.25  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Practical Cryptography: Algorithms and Implementations Using C++

978/148/222/9781482228892.jpg

Practical Cryptography: Algorithms and Implementations Using C++

Saiful Azad, Al-Sakib Khan Pathan

Data encryption

Hardback

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make... [more]

$182.55  $164.30

We can order this in for you
How long will it take?
Add this item to my basket
The Practical Guide to Hipaa Privacy and Security Compliance, Second Edition

978/143/985/9781439855584.jpg

The Practical Guide to Hipaa Privacy and Security Compliance, Second Edition...

Rebecca Herold, Kevin Beaver

Health systems & services; Computer security; Network management

Hardback

Offers a resource for HIPAA privacy and security advice that can be applied to various organizations' unique situation. This... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Incident Response and Computer Forensics

978/007/179/9780071798686.jpg

Incident Response and Computer Forensics

Matthew Pepe, Jason T. Luttgens, Ryan Kazanciyan, Kevin Mandia

Computer security

Paperback

The all-new edition of the market's #1 selling incident response book reveals the most relevant and up-to-date incident response... [more]

$91.95  $82.75

We can order this in for you
How long will it take?
Add this item to my basket
Hardware Security: Design, Threats, and Safeguards

978/143/989/9781439895832.jpg

Hardware Security: Design, Threats, and Safeguards

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

Computer hardware; Computer security

Hardback

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Handbook of Space Security: Policies, Applications and Programs

978/146/142/9781461420286.jpg

Handbook of Space Security: Policies, Applications and Programs

Kai-Uwe Schrogl, Peter L. Hays, Spyros Pagkratis, Jana Robinson, Christina Giannopapa

International space & aerospace law; Astronautics; Computer security

Hardback

Handbook of Space Security [more]

$1407.75  $1267.00

We can order this in for you
How long will it take?
Add this item to my basket
Cybersecurity Systems for Human Cognition Augmentation

978/331/910/9783319103730.jpg

Cybersecurity Systems for Human Cognition Augmentation

Robinson E. Pino, Alexander Kott, Michael Shevenell

Neurosciences; Network hardware; Computer security; Computer networking & communications; Artificial intelligence

Hardback

Cybersecurity Systems for Human Cognition Augmentation [more]

$308.90  $278.00

We can order this in for you
How long will it take?
Add this item to my basket
Integer Algorithms in Cryptology and Information Assurance

978/981/462/9789814623742.jpg

Integer Algorithms in Cryptology and Information Assurance

Boris S Verkhovsky

Data encryption

Hardback

Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms... [more]

$294.40  $264.95

We can order this in for you
How long will it take?
Add this item to my basket
The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice

978/012/800/9780128007440.jpg

The Basics of Information Security: Understanding the Fundamentals of Infosec...

Jason Andress

Computer security; Network security

Paperback

Provides you with fundamental knowledge of information security in both theoretical and practical aspects. This title covers... [more]

$78.40  $70.55

We can order this in for you
How long will it take?
Add this item to my basket
Securing the Cloud: Security Strategies for the Ubiquitous Data Center

no-image-available.jpg

Securing the Cloud: Security Strategies for the Ubiquitous Data Center

Curtis Franklin Jr., Brian Chee

Computer security; Network security

Hardback

A must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Information Warfare

no-image-available.jpg

Information Warfare

Daniel Ventre

Military intelligence; Computing: general; Computer security; Computer science

Hardback

New information technologies have contributed to the emergence of new lifestyles and modern strategic developments, but they... [more]

$217.70  $195.95

Forthcoming
Pre-Order now
Add this item to my basket
Background Checks Under Fire: Legal Information You Need to Stay Out of Court

no-image-available.jpg

Background Checks Under Fire: Legal Information You Need to Stay Out of...

Angela L Preston (Columbus Ohio USA)

Management & management techniques; Constitutional & administrative law; Criminal law & procedure; Computer security

Hardback

Those responsible for the background screening programs in their organisations are accountable at some level to establish... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
Official (Isc)2 Guide to the CISSP Cbk, Fourth Edition

978/148/226/9781482262759.jpg

Official (Isc)2 Guide to the CISSP Cbk, Fourth Edition

Adam Gordon

Computer security

Hardback

As a result of a rigorous, methodical process that (ISC)^2 follows to routinely update its credential exams, it has announced... [more]

$209.40  $188.45

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.