Abbey's Bookshop Logo
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,233 results

The Official (ISC)2 Guide to the SSCP CBK

978/111/920/9781119207467.jpg

The Official (ISC)2 Guide to the SSCP CBK

Steven Hernandez, CISSP, Adam Gordon

Computer certification; Data encryption; Network security

Hardback

The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for... [more]

$164.40  $147.95

We can order this in for you
How long will it take?
Add this item to my basket
Whois Running the Internet: Protocol, Policy, and Privacy

978/111/867/9781118679555.jpg

Whois Running the Internet: Protocol, Policy, and Privacy

Garth O. Bruen

Privacy & data protection

Hardback

Discusses the evolution of WHOIS and how policy changes will affect WHOIS place in IT today and in the future This book... [more]

$210.55  $189.50

We can order this in for you
How long will it take?
Add this item to my basket
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts

978/149/190/9781491902332.jpg

Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts

Nitesh Dhanjani

Computer security

Paperback

A future with billions of connected things includes monumental security concerns. This practical book explores how malicious... [more]

$109.45  $98.50

We can order this in for you
How long will it take?
Add this item to my basket
Data Protection on the Move: Current Developments in ICT and Privacy/Data Protection

978/940/177/9789401773751.jpg

Data Protection on the Move: Current Developments in ICT and Privacy/Data...

Serge Gutwirth, Ronald E. Leenes, Paul de Hert

Data protection law; Privacy & data protection; Computer fraud & hacking

Hardback

This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and... [more]

$308.90  $278.00

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense

978/331/925/9783319251318.jpg

Cyber Denial, Deception and Counter Deception: A Framework for Supporting...

Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow

Information retrieval; Privacy & data protection; Computer fraud & hacking

Hardback

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework... [more]

$226.00  $203.40

We can order this in for you
How long will it take?
Add this item to my basket
Trust, Privacy and Security in Digital Business: 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings

978/331/922/9783319229058.jpg

Trust, Privacy and Security in Digital Business: 12th International Conference,...

Simone Fischer-Hubner, Costas Lambrinoudakis, Javier Lopez

E-commerce: business aspects; Graphical & digital media applications; Computer security; Information architecture

Paperback

This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital... [more]

$154.20  $138.80

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings

978/366/247/9783662479889.jpg

Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference,...

Rosario Gennaro, Matthew Robshaw

Discrete mathematics; Algorithms & data structures; Data encryption

Paperback

The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology... [more]

$271.60  $244.45

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference, Orlando, Fl, USA, January 26-28, 2015, Revised Selected Papers

978/331/924/9783319241227.jpg

Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference,...

Gilbert Peterson, Sujeet Shenoi (Center for Information Security, University of Tulsa, USA)

Criminal investigation & detection; Ethical & social aspects of computing; Computer security

Hardback

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

978/331/922/9783319224244.jpg

Advances in Information and Computer Security: 10th International Workshop...

Keisuke Tanaka, Yuji Suga

Discrete mathematics; Network hardware; Algorithms & data structures; Data encryption

Paperback

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals

978/083/309/9780833091109.jpg

Internet Freedom Software and Illicit Activity: Supporting Human Rights...

Sasha Romanosky, Martin C Libicki (RAND Corporation, California), Zev Winkelman, Olesya Tkacheva

Civil rights & citizenship; Human rights & civil liberties law; Communications engineering & telecommunications; Computer security

Paperback

Examines the portfolio of tools funded by the State Department s Bureau of Democracy, Human Rights, and Labor that help support... [more]

$37.55  $33.80

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Fraud: The Web of Lies

978/151/427/9781514273005.jpg

Cyber Fraud: The Web of Lies

Bryan Seely

Computer security

Paperback

Why did this former US Marine & ethical hacker intercept calls to the Secret Service and FBI, risking a life sentence? To... [more]

$50.90  $45.80

We can order this in for you
How long will it take?
Add this item to my basket
Digital Defense: A Cybersecurity Primer

978/331/919/9783319199528.jpg

Digital Defense: A Cybersecurity Primer

Joseph N. Pelton, Jr., Indu B. Singh

International relations; Business mathematics & systems; Communications engineering & telecommunications; Computer security

Hardback

Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard... [more]

$34.00  $30.60

We can order this in for you
How long will it take?
Add this item to my basket
Wireless Networks and Security: Issues, Challenges and Research Trends

978/364/243/9783642438448.jpg

Wireless Networks and Security: Issues, Challenges and Research Trends

Shafiullah Khan, Al-Sakib Khan Pathan

Communications engineering & telecommunications; Computer security

Paperback

This book provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication,... [more]

$433.30  $389.95

We can order this in for you
How long will it take?
Add this item to my basket
Bitcoin Payments: Implementing Secure Crypto Transactions

978/111/896/9781118968024.jpg

Bitcoin Payments: Implementing Secure Crypto Transactions

Slava Gomzin

Finance; Computer security

Paperback

The practical guide to implementing Bitcoin and other alt currencies in your business<p>Bitcoin Payments, Implementing Secure... [more]

$110.10  $99.10

Forthcoming
Pre-Order now
Add this item to my basket
Mathematical Foundations of Public Key Cryptography

978/149/870/9781498702232.jpg

Mathematical Foundations of Public Key Cryptography

Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng

Applied mathematics; Data encryption

Hardback

The authors present the results of more than 20 years of research and teaching experience to help students bridge the gap... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
The Hacker Playbook 2: Practical Guide to Penetration Testing

978/151/221/9781512214567.jpg

The Hacker Playbook 2: Practical Guide to Penetration Testing

Peter Kim

Computer programming & software development; Computer security

Paperback

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security... [more]

$67.90  $61.10

We can order this in for you
How long will it take?
Add this item to my basket
Physical and Data-Link Security Techniques for Future Communication Systems

978/331/923/9783319236087.jpg

Physical and Data-Link Security Techniques for Future Communication Systems...

Marco Baldi, Stefano Tomasin

Communications engineering & telecommunications; Database design & theory; Computer security

Hardback

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order... [more]

$412.55  $371.30

We can order this in for you
How long will it take?
Add this item to my basket
Principles of Cybercrime

978/110/703/9781107034570.jpg

Principles of Cybercrime

Jonathan Clough

Criminal law & procedure; Computer fraud & hacking

Hardback

A comprehensive doctrinal analysis of cybercrime laws in four major common law jurisdictions: Australia, Canada, the UK and... [more]

$248.75  $223.90

We can order this in for you
How long will it take?
Add this item to my basket
Security of Block Ciphers: From Algorithm Design to Hardware Implementation

978/111/866/9781118660010.jpg

Security of Block Ciphers: From Algorithm Design to Hardware Implementation...

Kazuo Sakiyama, Yu Sasaki, Yang Li

Data encryption

Hardback

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis... [more]

$228.05  $205.25

We can order this in for you
How long will it take?
Add this item to my basket
IP Cores Design from Specifications to Production: Modeling, Verification, Optimization, and Protection

978/331/922/9783319220345.jpg

IP Cores Design from Specifications to Production: Modeling, Verification,...

Khaled Salah Mohamed

Electronics engineering; Computer security; Computer architecture & logic design

Hardback

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification,... [more]

$208.55  $187.70

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security: An Introduction for Non-Technical Managers

978/147/246/9781472466730.jpg

Cyber Security: An Introduction for Non-Technical Managers

Jeremy Swinfen Green

Management & management techniques; Computer security

Hardback

Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology.... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Tor and the Dark Art of Anonymity: How to Be Invisible from Nsa Spying

978/151/204/9781512049589.jpg

Tor and the Dark Art of Anonymity: How to Be Invisible from Nsa Spying

Lance Henderson

Privacy & data protection; Network security

Paperback

The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking... [more]

$32.25  $29.05

We can order this in for you
How long will it take?
Add this item to my basket
Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler Web Debugger

978/151/157/9781511572903.jpg

Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler...

Eric Lawrence

Software Engineering; Computer viruses, Trojans & worms

Paperback

Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers,... [more]

$66.20  $59.60

We can order this in for you
How long will it take?
Add this item to my basket
Transactions on Data Hiding and Multimedia Security X

978/366/246/9783662467381.jpg

Transactions on Data Hiding and Multimedia Security X

Yun Q. Shi

Coding theory & cryptology; Computer security; Image processing

Paperback

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is... [more]

$131.35  $118.20

We can order this in for you
How long will it take?
Add this item to my basket
Principles of Security and Trust: 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings

978/366/246/9783662466650.jpg

Principles of Security and Trust: 4th International Conference, POST 2015,...

Riccardo Focardi, Andrew Myers

Network hardware; Computer security; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.