Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,708 results

The Tao of Open Source Intelligence

978/184/928/9781849287289.jpg

The Tao of Open Source Intelligence

Stewart K. Bertram

Computer security

Paperback

OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for... [more]

$119.45  $107.50

We can order this in for you
How long will it take?
Add this item to my basket
Protecting Privacy in Data Release

978/331/916/9783319161082.jpg

Protecting Privacy in Data Release

Giovanni Livraga

Privacy & data protection

Hardback

Protecting Privacy in Data Release [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : Revised Selected Papers

978/331/915/9783319150864.jpg

Information Security Applications: 15th International Workshop, WISA 2014,...

Kyung-Hyune Rhee, Jeong Hyun Yi, Kyung-Hyune Rhee

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Warfare: Building the Scientific Foundation

978/331/914/9783319140384.jpg

Cyber Warfare: Building the Scientific Foundation

Sushil Jajodia, Dr. Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang

Information retrieval; Computer security; Data encryption

Hardback

Cyber Warfare [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Cloud-Centric Cybersecurity and Critical Infrastructure Protection

no-image-available.jpg

Cloud-Centric Cybersecurity and Critical Infrastructure Protection

Joe B. Wilson

Data encryption

Hardback

The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection and simulation... [more]

$210.55  $189.50

Forthcoming
Pre-Order now
Add this item to my basket
Dark Mirror: Edward Snowden and the American Surveillance State

978/073/528/9780735285323.jpg

Dark Mirror: Edward Snowden and the American Surveillance State

Barton Gellman

Biography: historical, political & military; Central government; Espionage & secret services; Computer security

Audio

<b>From the three-time Pulitzer Prize-winning author of the <i>New York Times</i> bestseller <i>Angler</i>, who unearthed... [more]

$68.95  $62.05

Forthcoming
Pre-Order now
Add this item to my basket
Understanding Network Hacks: Attack and Defense with Python

978/366/244/9783662444368.jpg

Understanding Network Hacks: Attack and Defense with Python

Bastian Ballmann

Web programming; Computer security

Hardback

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively... [more]

$109.45  $98.50

We can order this in for you
How long will it take?
Add this item to my basket
Usable Security: History, Themes, and Challenges

978/162/705/9781627055291.jpg

Usable Security: History, Themes, and Challenges

Simson Garfinkel, Heather Richter Lipford

Computer security

Paperback

There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer... [more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
Developing Secure Applications

978/143/025/9781430258759.jpg

Developing Secure Applications

Nishant Das Patnaik

Computer security

Paperback

Developing Secure Applications is targeted towards all developers and security programmers. Mobile apps, website applications,... [more]

$109.45  $98.50

We can order this in for you
How long will it take?
Add this item to my basket
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings

978/331/912/9783319120591.jpg

Security, Privacy, and Applied Cryptography Engineering: 4th International...

Rajat Subhra Chakraborty, Vaclav Vashek Matyas, Patrick R. Schaumont

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident Responder

978/150/073/9781500734756.jpg

Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident...

Don Murdoch Gse

Computer security

Paperback

Updated, Expanded, and released to print on 10/5/14! Complete details below! Two new sections, five protocol header illustrations,... [more]

$44.15  $39.75

We can order this in for you
How long will it take?
Add this item to my basket
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

no-image-available.jpg

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage...

Gordon Corera

Espionage & secret services; History of engineering & technology; Computing: general; Computer security

Audio

The previously untold and previously highly classified story of the conflux of espionage and technology, with a compelling... [more]

$61.90  $55.70

Forthcoming
Pre-Order now
Add this item to my basket
Securing the Cloud: Security Strategies for the Ubiquitous Data Center

no-image-available.jpg

Securing the Cloud: Security Strategies for the Ubiquitous Data Center

Curtis Franklin, Jr., Brian Chee

Computer security; Network security

Hardback

A must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Mastering Kali Linux for Advanced Penetration Testing

978/178/216/9781782163121.jpg

Mastering Kali Linux for Advanced Penetration Testing

Robert W. Beggs

Computer security

Paperback

This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to... [more]

$143.75  $129.40

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Attack: The Truth about Digital Crime, Cyber Warfare and Government Snooping

978/178/097/9781780975337.jpg

Cyber Attack: The Truth about Digital Crime, Cyber Warfare and Government...

Paul Day, (Co

Privacy & data protection; Network security

Paperback

There are an estimated 8.7 billion devices currently connected to the Internet - and each one is a threat to its owner. Confronting... [more]

$33.95  $30.55

We can order this in for you
How long will it take?
Add this item to my basket
Identity and Access Management: Business Performance Through Connected Intelligence

978/012/408/9780124081406.jpg

Identity and Access Management: Business Performance Through Connected Intelligence...

Ertem Osmanoglu

Computer security; Network security

Paperback

Provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks... [more]

$132.25  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Security, Privacy, and Trust in Ubiquitous Computing: New Trends and Applications

no-image-available.jpg

Security, Privacy, and Trust in Ubiquitous Computing: New Trends and Applications...

Sheikh Ahamed, Munirul Haque

Computer security

Hardback

This book addresses the integration of new devices (such as the iPhone), new technologies (such as cloud computing and green... [more]

$344.55  $310.10

We can order this in for you
How long will it take?
Add this item to my basket
An Introduction to Information Security and ISO 27001: A Pocket Guide

978/184/928/9781849285261.jpg

An Introduction to Information Security and ISO 27001: A Pocket Guide

Steve G. Watkins

Management & management techniques; Computer security

Paperback

The perfect introduction to the principles of information security management and ISO27001:2013 [more]

$44.05  $39.65

We can order this in for you
How long will it take?
Add this item to my basket
Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do about It

978/080/419/9780804193054.jpg

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What...

Marc Goodman

Cybernetics & systems theory; Laws of Specific jurisdictions; Impact of science & technology on society; Computer security; Computer science

Audio

Technological advances have benefited our world in immeasurable ways, but there is an ominous flipside. Criminals are often... [more]

$130.70  $117.65

Forthcoming
Pre-Order now
Add this item to my basket
Cyber Defense: Countering Targeted Attacks

978/144/221/9781442219175.jpg

Cyber Defense: Countering Targeted Attacks

Richard Stiennon

Computer security; Network security

Hardback

In this new book, Stiennon presents a comprehensive view of the technology, methodology, and tools needed to defend digital... [more]

$105.05  $94.55

Forthcoming
Pre-Order now
Add this item to my basket
@War: The Rise of the Military-Internet Complex

978/148/151/9781481510288.jpg

@War: The Rise of the Military-Internet Complex

Shane Harris

Military history; International relations; Military engineering; Privacy & data protection; Network security

Audio

Cloak-and-dagger, high tech, and big business converge in this revelatory, page-turning account of a new kind of conflict,... [more]

$47.15  $42.45

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Terrorism

no-image-available.jpg

Introduction to Terrorism

David H. McElreath, Carl J. Jensen, Michael Wigginton, Jr., Chester L. Quarles, Stephen Mallory

Computer security

Hardback

No further information found for this title. [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Email Security with Cisco Ironport

978/158/714/9781587142925.jpg

Email Security with Cisco Ironport

Chris Porter

Computer security; Electronic mail (email): professional; Network security

Paperback

Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today's... [more]

$142.30  $128.05

We can order this in for you
How long will it take?
Add this item to my basket
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7

978/159/749/9781597497275.jpg

Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows...

Harlan Carvey

Computer security

Paperback

Windows is the largest operating system on desktops and servers worldwide, which mean more intrusions, malware infections,... [more]

$153.70  $138.35

We can order this in for you
How long will it take?
Add this item to my basket
Laboratory Manual to Accompany Hacker Techniques, Tools, and Incident Handling

no-image-available.jpg

Laboratory Manual to Accompany Hacker Techniques, Tools, and Incident Handling...

vLab Solutions

Computer fraud & hacking; Network security

Paperback

The Laboratory Manual to Accompany Hacker Techniques, Tools, and Incident Handling is the lab companion to Sean-Philip Oriyano's... [more]

$67.35  $60.60

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.