Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,674 results

Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference, Orlando, Fl, USA, January 26-28, 2015, Revised Selected Papers

978/331/924/9783319241227.jpg

Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference,...

Gilbert Peterson, Sujeet Shenoi (Center for Information Security, University of Tulsa, USA)

Criminal investigation & detection; Ethical & social aspects of computing; Computer security

Hardback

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

978/331/922/9783319224244.jpg

Advances in Information and Computer Security: 10th International Workshop...

Keisuke Tanaka, Yuji Suga

Discrete mathematics; Network hardware; Algorithms & data structures; Data encryption

Paperback

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Digital Defense: A Cybersecurity Primer

978/331/919/9783319199528.jpg

Digital Defense: A Cybersecurity Primer

Joseph N. Pelton, Jr., Indu B. Singh

International relations; Business mathematics & systems; Communications engineering & telecommunications; Computer security

Hardback

Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard... [more]

$60.70  $54.65

We can order this in for you
How long will it take?
Add this item to my basket
Wireless Networks and Security: Issues, Challenges and Research Trends

978/364/243/9783642438448.jpg

Wireless Networks and Security: Issues, Challenges and Research Trends

Shafiullah Khan, Al-Sakib Khan Pathan

Communications engineering & telecommunications; Computer security

Paperback

This book provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication,... [more]

$433.30  $389.95

We can order this in for you
How long will it take?
Add this item to my basket
The Defender S Dilemma: Charting a Course Toward Cybersecurity

978/083/308/9780833089113.jpg

The Defender S Dilemma: Charting a Course Toward Cybersecurity

Martin C Libicki (RAND Corporation, California), Lillian Ablon, Tim Webb, (En

Sales & marketing; Privacy & data protection; Computer viruses, Trojans & worms; Network security

Paperback

This report, the second in a series, reveals insights from chief information security officers; examines network defense measures... [more]

$68.20  $61.40

We can order this in for you
How long will it take?
Add this item to my basket
Bitcoin Payments: Implementing Secure Crypto Transactions

978/111/896/9781118968024.jpg

Bitcoin Payments: Implementing Secure Crypto Transactions

Slava Gomzin

Finance; Computer security

Paperback

The practical guide to implementing Bitcoin and other alt currencies in your business<p>Bitcoin Payments, Implementing Secure... [more]

$137.60  $123.85

Forthcoming
Pre-Order now
Add this item to my basket
The Hacker Playbook 2: Practical Guide to Penetration Testing

978/151/221/9781512214567.jpg

The Hacker Playbook 2: Practical Guide to Penetration Testing

Peter Kim

Computer programming & software development; Computer security

Paperback

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security... [more]

$71.45  $64.30

We can order this in for you
How long will it take?
Add this item to my basket
Physical and Data-Link Security Techniques for Future Communication Systems

978/331/923/9783319236087.jpg

Physical and Data-Link Security Techniques for Future Communication Systems...

Marco Baldi, Stefano Tomasin

Communications engineering & telecommunications; Database design & theory; Computer security

Hardback

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order... [more]

$515.70  $464.15

We can order this in for you
How long will it take?
Add this item to my basket
Principles of Cybercrime

978/110/703/9781107034570.jpg

Principles of Cybercrime

Jonathan Clough

Criminal law & procedure; Computer fraud & hacking

Hardback

A comprehensive doctrinal analysis of cybercrime laws in four major common law jurisdictions: Australia, Canada, the UK and... [more]

$310.95  $279.85

We can order this in for you
How long will it take?
Add this item to my basket
Security of Block Ciphers: From Algorithm Design to Hardware Implementation

978/111/866/9781118660010.jpg

Security of Block Ciphers: From Algorithm Design to Hardware Implementation...

Kazuo Sakiyama, Yu Sasaki, Yang Li

Data encryption

Hardback

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis... [more]

$285.05  $256.55

We can order this in for you
How long will it take?
Add this item to my basket
IP Cores Design from Specifications to Production: Modeling, Verification, Optimization, and Protection

978/331/922/9783319220345.jpg

IP Cores Design from Specifications to Production: Modeling, Verification,...

Khaled Salah Mohamed

Electronics engineering; Computer security; Computer architecture & logic design

Hardback

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification,... [more]

$208.55  $187.70

We can order this in for you
How long will it take?
Add this item to my basket
Tor and the Dark Art of Anonymity: How to Be Invisible from Nsa Spying

978/151/204/9781512049589.jpg

Tor and the Dark Art of Anonymity: How to Be Invisible from Nsa Spying

Lance Henderson

Privacy & data protection; Network security

Paperback

The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking... [more]

$32.25  $29.05

We can order this in for you
How long will it take?
Add this item to my basket
Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler Web Debugger

978/151/157/9781511572903.jpg

Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler...

Eric Lawrence

Software Engineering; Computer viruses, Trojans & worms

Paperback

Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers,... [more]

$66.20  $59.60

We can order this in for you
How long will it take?
Add this item to my basket
Transactions on Data Hiding and Multimedia Security X

978/366/246/9783662467381.jpg

Transactions on Data Hiding and Multimedia Security X

Yun Q. Shi

Coding theory & cryptology; Computer security; Image processing

Paperback

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is... [more]

$131.35  $118.20

We can order this in for you
How long will it take?
Add this item to my basket
Principles of Security and Trust: 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings

978/366/246/9783662466650.jpg

Principles of Security and Trust: 4th International Conference, POST 2015,...

Riccardo Focardi, Andrew Myers

Network hardware; Computer security; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers

978/331/918/9783319186207.jpg

Privacy and Identity Management for the Future Internet in the Age of Globalisation:...

Jan Camenisch, Simone Fischer-Hubner, Marit Hansen

Ethical & social aspects of computing; Computer security; Information architecture

Hardback

This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG... [more]

$226.00  $203.40

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security: Analytics, Technology and Automation

978/331/918/9783319183015.jpg

Cyber Security: Analytics, Technology and Automation

Martti Lehto, Pekka Neittaanmaki

Communications engineering & telecommunications; Security & fire alarm systems; Computer security

Hardback

Cyber Security: Analytics, Technology and Automation [more]

$371.10  $334.00

We can order this in for you
How long will it take?
Add this item to my basket
The Internet of Things: Emergence, Perspectives, Privacy and Security Issues

978/163/482/9781634824422.jpg

The Internet of Things: Emergence, Perspectives, Privacy and Security Issues...

Emanuel Delgado

Computer security

Hardback

The Internet of Things (IoT) refers to the ability of everyday objects to connect to the Internet and to send and receive... [more]

$375.75  $338.20

We can order this in for you
How long will it take?
Add this item to my basket
Protecting Privacy in Data Release

978/331/916/9783319161082.jpg

Protecting Privacy in Data Release

Giovanni Livraga

Privacy & data protection

Hardback

Protecting Privacy in Data Release [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Identity in a Digital World: What it is and How to Protect it

978/146/656/9781466565463.jpg

Identity in a Digital World: What it is and How to Protect it

Dallas Bishoff

Computer security

Hardback

Supplying helpful guidelines for identity management, system procurement, and management, this book discusses how legal identity... [more]

$182.55  $164.30

Forthcoming
Pre-Order now
Add this item to my basket
Applied Cryptography: Protocols, Algorithms and Source Code in C

978/111/909/9781119096726.jpg

Applied Cryptography: Protocols, Algorithms and Source Code in C

Bruce Schneier

Data encryption

Hardback

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive... [more]

$187.35  $168.60

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : Revised Selected Papers

978/331/915/9783319150864.jpg

Information Security Applications: 15th International Workshop, WISA 2014,...

Kyung-Hyune Rhee, Jeong Hyun Yi, Kyung-Hyune Rhee

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Secrets and Lies: Digital Security in a Networked World

978/111/909/9781119092438.jpg

Secrets and Lies: Digital Security in a Networked World

Bruce Schneier

Computer security; Computer networking & communications

Hardback

This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward... [more]

$83.80  $75.40

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Warfare: Building the Scientific Foundation

978/331/914/9783319140384.jpg

Cyber Warfare: Building the Scientific Foundation

Sushil Jajodia, Dr. Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang

Information retrieval; Computer security; Data encryption

Hardback

Cyber Warfare [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Cloud-Centric Cybersecurity and Critical Infrastructure Protection

no-image-available.jpg

Cloud-Centric Cybersecurity and Critical Infrastructure Protection

Joe B. Wilson

Data encryption

Hardback

The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection and simulation... [more]

$263.20  $236.90

Forthcoming
Pre-Order now
Add this item to my basket
Your cart does not contain any items.