Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,737 results

Handling Bad: Inside a Cyber Era Private Investigation Firm

978/159/932/9781599325910.jpg

Handling Bad: Inside a Cyber Era Private Investigation Firm

Daniel Robert Weiss

Cybernetics & systems theory; Business ethics; Computer security; Computer science

Paperback

You wake up and find out that you re being targeted for blackmail by a one night stand you met online, that your child has... [more]

$26.05  $22.90

We can order this in for you
How long will it take?
Add this item to my basket
Trust, Privacy and Security in Digital Business: 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings

978/331/922/9783319229058.jpg

Trust, Privacy and Security in Digital Business: 12th International Conference,...

Simone Fischer-Hubner, Costas Lambrinoudakis, Javier Lopez

E-commerce: business aspects; Graphical & digital media applications; Computer security; Information architecture

Paperback

This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital... [more]

$154.20  $138.80

We can order this in for you
How long will it take?
Add this item to my basket
Cryptography Made Simple

978/331/921/9783319219356.jpg

Cryptography Made Simple

Nigel P. Smart

Data encryption

Hardback

This introductory textbook explains cryptography with a strongly mathematical foundation. The major book parts are mathematical... [more]

$132.30  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference, Orlando, Fl, USA, January 26-28, 2015, Revised Selected Papers

978/331/924/9783319241227.jpg

Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference,...

Gilbert Peterson, Sujeet Shenoi (Center for Information Security, University of Tulsa, USA)

Criminal investigation & detection; Ethical & social aspects of computing; Computer security

Hardback

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

978/331/922/9783319224244.jpg

Advances in Information and Computer Security: 10th International Workshop...

Keisuke Tanaka, Yuji Suga

Discrete mathematics; Network hardware; Algorithms & data structures; Data encryption

Paperback

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Digital Defense: A Cybersecurity Primer

978/331/919/9783319199528.jpg

Digital Defense: A Cybersecurity Primer

Joseph N. Pelton, Jr., Indu B. Singh

International relations; Business mathematics & systems; Communications engineering & telecommunications; Computer security

Hardback

Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard... [more]

$34.00  $30.60

We can order this in for you
How long will it take?
Add this item to my basket
Privacy in a Digital, Networked World: Technologies, Implications and Solutions

978/331/908/9783319084695.jpg

Privacy in a Digital, Networked World: Technologies, Implications and Solutions...

Sherali Zeadally, Mohamad Badra

Privacy & data protection; Network security; Information architecture

Hardback

This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing... [more]

$132.30  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Bitcoin Payments: Implementing Secure Crypto Transactions

978/111/896/9781118968024.jpg

Bitcoin Payments: Implementing Secure Crypto Transactions

Slava Gomzin

Finance; Computer security

Paperback

The practical guide to implementing Bitcoin and other alt currencies in your business<p>Bitcoin Payments, Implementing Secure... [more]

$110.10  $99.10

Forthcoming
Pre-Order now
Add this item to my basket
Mathematical Foundations of Public Key Cryptography

978/149/870/9781498702232.jpg

Mathematical Foundations of Public Key Cryptography

Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng

Applied mathematics; Data encryption

Hardback

The authors present the results of more than 20 years of research and teaching experience to help students bridge the gap... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
The Hacker Playbook 2: Practical Guide to Penetration Testing

978/151/221/9781512214567.jpg

The Hacker Playbook 2: Practical Guide to Penetration Testing

Peter Kim

Computer programming & software development; Computer security

Paperback

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security... [more]

$67.90  $61.10

We can order this in for you
How long will it take?
Add this item to my basket
Physical and Data-Link Security Techniques for Future Communication Systems

978/331/923/9783319236087.jpg

Physical and Data-Link Security Techniques for Future Communication Systems...

Marco Baldi, Stefano Tomasin

Communications engineering & telecommunications; Database design & theory; Computer security

Hardback

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order... [more]

$515.70  $464.15

We can order this in for you
How long will it take?
Add this item to my basket
IP Cores Design from Specifications to Production: Modeling, Verification, Optimization, and Protection

978/331/922/9783319220345.jpg

IP Cores Design from Specifications to Production: Modeling, Verification,...

Khaled Salah Mohamed

Electronics engineering; Computer security; Computer architecture & logic design

Hardback

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification,... [more]

$208.55  $187.70

We can order this in for you
How long will it take?
Add this item to my basket
Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler Web Debugger

978/151/157/9781511572903.jpg

Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler...

Eric Lawrence

Software Engineering; Computer viruses, Trojans & worms

Paperback

Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers,... [more]

$66.20  $59.60

We can order this in for you
How long will it take?
Add this item to my basket
The Tao of Open Source Intelligence

978/184/928/9781849287289.jpg

The Tao of Open Source Intelligence

Stewart K. Bertram

Computer security

Paperback

OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for... [more]

$119.45  $107.50

We can order this in for you
How long will it take?
Add this item to my basket
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

978/147/894/9781478945567.jpg

The Art of Invisibility: The World's Most Famous Hacker Teaches You How...

Kevin Mitnick

Ethical & social aspects of computing; Privacy & data protection; Network security

Audio

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in... [more]

$54.95  $49.45

Forthcoming
Pre-Order now
Add this item to my basket
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

978/147/894/9781478945536.jpg

The Art of Invisibility: The World's Most Famous Hacker Teaches You How...

Kevin Mitnick

Impact of science & technology on society; Ethical & social aspects of computing; Privacy & data protection; Network security

Audio

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in... [more]

$131.35  $118.20

Forthcoming
Pre-Order now
Add this item to my basket
Protecting Privacy in Data Release

978/331/916/9783319161082.jpg

Protecting Privacy in Data Release

Giovanni Livraga

Privacy & data protection

Hardback

Protecting Privacy in Data Release [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : Revised Selected Papers

978/331/915/9783319150864.jpg

Information Security Applications: 15th International Workshop, WISA 2014,...

Kyung-Hyune Rhee, Jeong Hyun Yi, Kyung-Hyune Rhee

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Cloud-Centric Cybersecurity and Critical Infrastructure Protection

no-image-available.jpg

Cloud-Centric Cybersecurity and Critical Infrastructure Protection

Joe B. Wilson

Data encryption

Hardback

The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection and simulation... [more]

$210.55  $189.50

Forthcoming
Pre-Order now
Add this item to my basket
CEH Certified Ethical Hacker All-in-One Exam Guide

978/125/983/9781259836558.jpg

CEH Certified Ethical Hacker All-in-One Exam Guide

Matt Walker

Computer fraud & hacking

Mixed media product

Fully up-to-date coverage of every topic on the CEH v9 certification exam [more]

$77.05  $69.35

We can order this in for you
How long will it take?
Add this item to my basket
Usable Security: History, Themes, and Challenges

978/162/705/9781627055291.jpg

Usable Security: History, Themes, and Challenges

Simson Garfinkel, Heather Richter Lipford

Computer security

Paperback

There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer... [more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
Developing Secure Applications

978/143/025/9781430258759.jpg

Developing Secure Applications

Nishant Das Patnaik

Computer security

Paperback

Developing Secure Applications is targeted towards all developers and security programmers. Mobile apps, website applications,... [more]

$109.45  $98.50

We can order this in for you
How long will it take?
Add this item to my basket
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings

978/331/912/9783319120591.jpg

Security, Privacy, and Applied Cryptography Engineering: 4th International...

Rajat Subhra Chakraborty, Vaclav Vashek Matyas, Patrick R. Schaumont

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident Responder

978/150/073/9781500734756.jpg

Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident...

Don Murdoch Gse

Computer security

Paperback

BTHb: INRE - Version 2.2 now available. The Blue Team Handbook is a zero fluff reference guide for cyber security incident... [more]

$44.15  $39.75

We can order this in for you
How long will it take?
Add this item to my basket
Securing the Cloud: Security Strategies for the Ubiquitous Data Center

no-image-available.jpg

Securing the Cloud: Security Strategies for the Ubiquitous Data Center

Curtis Franklin, Jr., Brian Chee

Computer security; Network security

Hardback

A must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.