Abbey's Bookshop Logo
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,229 results

Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference, Orlando, Fl, USA, January 26-28, 2015, Revised Selected Papers

978/331/924/9783319241227.jpg

Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference,...

Gilbert Peterson, Sujeet Shenoi (Center for Information Security, University of Tulsa, USA)

Criminal investigation & detection; Ethical & social aspects of computing; Computer security

Hardback

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

978/331/922/9783319224244.jpg

Advances in Information and Computer Security: 10th International Workshop...

Keisuke Tanaka, Yuji Suga

Discrete mathematics; Network hardware; Algorithms & data structures; Data encryption

Paperback

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals

978/083/309/9780833091109.jpg

Internet Freedom Software and Illicit Activity: Supporting Human Rights...

Sasha Romanosky, Martin C Libicki (RAND Corporation, California), Zev Winkelman, Olesya Tkacheva

Civil rights & citizenship; Human rights & civil liberties law; Communications engineering & telecommunications; Computer security

Paperback

Examines the portfolio of tools funded by the State Department s Bureau of Democracy, Human Rights, and Labor that help support... [more]

$37.55  $33.80

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Fraud: The Web of Lies

978/151/427/9781514273005.jpg

Cyber Fraud: The Web of Lies

Bryan Seely

Computer security

Paperback

Why did this former US Marine & ethical hacker intercept calls to the Secret Service and FBI, risking a life sentence? To... [more]

$50.90  $45.80

We can order this in for you
How long will it take?
Add this item to my basket
Digital Defense: A Cybersecurity Primer

978/331/919/9783319199528.jpg

Digital Defense: A Cybersecurity Primer

Joseph N. Pelton, Jr., Indu B. Singh

International relations; Business mathematics & systems; Communications engineering & telecommunications; Computer security

Hardback

Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard... [more]

$34.00  $30.60

We can order this in for you
How long will it take?
Add this item to my basket
Wireless Networks and Security: Issues, Challenges and Research Trends

978/364/243/9783642438448.jpg

Wireless Networks and Security: Issues, Challenges and Research Trends

Shafiullah Khan, Al-Sakib Khan Pathan

Communications engineering & telecommunications; Computer security

Paperback

This book provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication,... [more]

$433.30  $389.95

We can order this in for you
How long will it take?
Add this item to my basket
Bitcoin Payments: Implementing Secure Crypto Transactions

978/111/896/9781118968024.jpg

Bitcoin Payments: Implementing Secure Crypto Transactions

Slava Gomzin

Finance; Computer security

Paperback

The practical guide to implementing Bitcoin and other alt currencies in your business<p>Bitcoin Payments, Implementing Secure... [more]

$110.10  $99.10

Forthcoming
Pre-Order now
Add this item to my basket
Mathematical Foundations of Public Key Cryptography

978/149/870/9781498702232.jpg

Mathematical Foundations of Public Key Cryptography

Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng

Applied mathematics; Data encryption

Hardback

The authors present the results of more than 20 years of research and teaching experience to help students bridge the gap... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
The Hacker Playbook 2: Practical Guide to Penetration Testing

978/151/221/9781512214567.jpg

The Hacker Playbook 2: Practical Guide to Penetration Testing

Peter Kim

Computer programming & software development; Computer security

Paperback

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security... [more]

$67.90  $61.10

We can order this in for you
How long will it take?
Add this item to my basket
Physical and Data-Link Security Techniques for Future Communication Systems

978/331/923/9783319236087.jpg

Physical and Data-Link Security Techniques for Future Communication Systems...

Marco Baldi, Stefano Tomasin

Communications engineering & telecommunications; Database design & theory; Computer security

Hardback

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order... [more]

$412.55  $371.30

We can order this in for you
How long will it take?
Add this item to my basket
Principles of Cybercrime

978/110/703/9781107034570.jpg

Principles of Cybercrime

Jonathan Clough

Criminal law & procedure; Computer fraud & hacking

Hardback

A comprehensive doctrinal analysis of cybercrime laws in four major common law jurisdictions: Australia, Canada, the UK and... [more]

$248.75  $223.90

We can order this in for you
How long will it take?
Add this item to my basket
Security of Block Ciphers: From Algorithm Design to Hardware Implementation

978/111/866/9781118660010.jpg

Security of Block Ciphers: From Algorithm Design to Hardware Implementation...

Kazuo Sakiyama, Yu Sasaki, Yang Li

Data encryption

Hardback

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis... [more]

$228.05  $205.25

We can order this in for you
How long will it take?
Add this item to my basket
IP Cores Design from Specifications to Production: Modeling, Verification, Optimization, and Protection

978/331/922/9783319220345.jpg

IP Cores Design from Specifications to Production: Modeling, Verification,...

Khaled Salah Mohamed

Electronics engineering; Computer security; Computer architecture & logic design

Hardback

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification,... [more]

$208.55  $187.70

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security: An Introduction for Non-Technical Managers

978/147/246/9781472466730.jpg

Cyber Security: An Introduction for Non-Technical Managers

Jeremy Swinfen Green

Management & management techniques; Computer security

Hardback

Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology.... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Tor and the Dark Art of Anonymity: How to Be Invisible from Nsa Spying

978/151/204/9781512049589.jpg

Tor and the Dark Art of Anonymity: How to Be Invisible from Nsa Spying

Lance Henderson

Privacy & data protection; Network security

Paperback

The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking... [more]

$32.25  $29.05

We can order this in for you
How long will it take?
Add this item to my basket
Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler Web Debugger

978/151/157/9781511572903.jpg

Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler...

Eric Lawrence

Software Engineering; Computer viruses, Trojans & worms

Paperback

Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers,... [more]

$66.20  $59.60

We can order this in for you
How long will it take?
Add this item to my basket
Transactions on Data Hiding and Multimedia Security X

978/366/246/9783662467381.jpg

Transactions on Data Hiding and Multimedia Security X

Yun Q. Shi

Coding theory & cryptology; Computer security; Image processing

Paperback

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is... [more]

$131.35  $118.20

We can order this in for you
How long will it take?
Add this item to my basket
Principles of Security and Trust: 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings

978/366/246/9783662466650.jpg

Principles of Security and Trust: 4th International Conference, POST 2015,...

Riccardo Focardi, Andrew Myers

Network hardware; Computer security; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers

978/331/918/9783319186207.jpg

Privacy and Identity Management for the Future Internet in the Age of Globalisation:...

Jan Camenisch, Simone Fischer-Hubner, Marit Hansen

Ethical & social aspects of computing; Computer security; Information architecture

Hardback

This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG... [more]

$226.00  $203.40

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security: Analytics, Technology and Automation

978/331/918/9783319183015.jpg

Cyber Security: Analytics, Technology and Automation

Martti Lehto, Pekka Neittaanmaki

Communications engineering & telecommunications; Security & fire alarm systems; Computer security

Hardback

Cyber Security: Analytics, Technology and Automation [more]

$371.10  $334.00

We can order this in for you
How long will it take?
Add this item to my basket
The Internet of Things: Emergence, Perspectives, Privacy and Security Issues

978/163/482/9781634824422.jpg

The Internet of Things: Emergence, Perspectives, Privacy and Security Issues...

Emanuel Delgado

Computer security

Hardback

The Internet of Things (IoT) refers to the ability of everyday objects to connect to the Internet and to send and receive... [more]

$357.00  $321.30

We can order this in for you
How long will it take?
Add this item to my basket
Emerging Security Solutions Using Public and Private Key Cryptography: Mathematical Concepts

978/146/668/9781466684843.jpg

Emerging Security Solutions Using Public and Private Key Cryptography: Mathematical...

Addepalli V. N. Krishna

Data encryption

Hardback

Advances in computer technology have led to an increased need for online security and the protection of personal information.... [more]

$466.50  $419.85

We can order this in for you
How long will it take?
Add this item to my basket
Protecting Privacy in Data Release

978/331/916/9783319161082.jpg

Protecting Privacy in Data Release

Giovanni Livraga

Privacy & data protection

Hardback

Protecting Privacy in Data Release [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Identity in a Digital World: What it is and How to Protect it

978/146/656/9781466565463.jpg

Identity in a Digital World: What it is and How to Protect it

Dallas Bishoff

Computer security

Hardback

Supplying helpful guidelines for identity management, system procurement, and management, this book discusses how legal identity... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
Applied Cryptography: Protocols, Algorithms and Source Code in C

978/111/909/9781119096726.jpg

Applied Cryptography: Protocols, Algorithms and Source Code in C

Bruce Schneier

Data encryption

Hardback

<p>From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive... [more]

$104.95  $94.45

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.