Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,728 results

An Introduction to the Theory and Practice of Finite Fields

no-image-available.jpg

An Introduction to the Theory and Practice of Finite Fields

Scott A. Vanstone

Coding theory & cryptology; Data encryption

Hardback

Written by two renowned researchers, this graduate level textbook provides a thorough grounding in the field of cryptography.... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18

978/331/926/9783319265667.jpg

Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference,...

Mason Rice, Sujeet Shenoi (Center for Information Security, University of Tulsa, USA)

Computer security

Hardback

The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day... [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Handling Bad: Inside a Cyber Era Private Investigation Firm

978/159/932/9781599325910.jpg

Handling Bad: Inside a Cyber Era Private Investigation Firm

Daniel Robert Weiss

Cybernetics & systems theory; Business ethics; Computer security; Computer science

Paperback

You wake up and find out that you re being targeted for blackmail by a one night stand you met online, that your child has... [more]

$26.05  $22.90

We can order this in for you
How long will it take?
Add this item to my basket
Trust, Privacy and Security in Digital Business: 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings

978/331/922/9783319229058.jpg

Trust, Privacy and Security in Digital Business: 12th International Conference,...

Simone Fischer-Hubner, Costas Lambrinoudakis, Javier Lopez

E-commerce: business aspects; Graphical & digital media applications; Computer security; Information architecture

Paperback

This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital... [more]

$154.20  $138.80

We can order this in for you
How long will it take?
Add this item to my basket
Cryptography Made Simple

978/331/921/9783319219356.jpg

Cryptography Made Simple

Nigel P. Smart

Data encryption

Hardback

This introductory textbook explains cryptography with a strongly mathematical foundation. The major book parts are mathematical... [more]

$132.30  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference, Orlando, Fl, USA, January 26-28, 2015, Revised Selected Papers

978/331/924/9783319241227.jpg

Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference,...

Gilbert Peterson, Sujeet Shenoi (Center for Information Security, University of Tulsa, USA)

Criminal investigation & detection; Ethical & social aspects of computing; Computer security

Hardback

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

978/331/922/9783319224244.jpg

Advances in Information and Computer Security: 10th International Workshop...

Keisuke Tanaka, Yuji Suga

Discrete mathematics; Network hardware; Algorithms & data structures; Data encryption

Paperback

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Digital Defense: A Cybersecurity Primer

978/331/919/9783319199528.jpg

Digital Defense: A Cybersecurity Primer

Joseph N. Pelton, Jr., Indu B. Singh

International relations; Business mathematics & systems; Communications engineering & telecommunications; Computer security

Hardback

Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard... [more]

$34.00  $30.60

We can order this in for you
How long will it take?
Add this item to my basket
Privacy in a Digital, Networked World: Technologies, Implications and Solutions

978/331/908/9783319084695.jpg

Privacy in a Digital, Networked World: Technologies, Implications and Solutions...

Sherali Zeadally, Mohamad Badra

Privacy & data protection; Network security; Information architecture

Hardback

This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing... [more]

$132.30  $119.05

We can order this in for you
How long will it take?
Add this item to my basket
Bitcoin Payments: Implementing Secure Crypto Transactions

978/111/896/9781118968024.jpg

Bitcoin Payments: Implementing Secure Crypto Transactions

Slava Gomzin

Finance; Computer security

Paperback

The practical guide to implementing Bitcoin and other alt currencies in your business<p>Bitcoin Payments, Implementing Secure... [more]

$110.10  $99.10

Forthcoming
Pre-Order now
Add this item to my basket
Mathematical Foundations of Public Key Cryptography

978/149/870/9781498702232.jpg

Mathematical Foundations of Public Key Cryptography

Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng

Applied mathematics; Data encryption

Hardback

The authors present the results of more than 20 years of research and teaching experience to help students bridge the gap... [more]

$198.95  $179.05

We can order this in for you
How long will it take?
Add this item to my basket
The Hacker Playbook 2: Practical Guide to Penetration Testing

978/151/221/9781512214567.jpg

The Hacker Playbook 2: Practical Guide to Penetration Testing

Peter Kim

Computer programming & software development; Computer security

Paperback

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security... [more]

$67.90  $61.10

We can order this in for you
How long will it take?
Add this item to my basket
Physical and Data-Link Security Techniques for Future Communication Systems

978/331/923/9783319236087.jpg

Physical and Data-Link Security Techniques for Future Communication Systems...

Marco Baldi, Stefano Tomasin

Communications engineering & telecommunications; Database design & theory; Computer security

Hardback

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order... [more]

$515.70  $464.15

We can order this in for you
How long will it take?
Add this item to my basket
IP Cores Design from Specifications to Production: Modeling, Verification, Optimization, and Protection

978/331/922/9783319220345.jpg

IP Cores Design from Specifications to Production: Modeling, Verification,...

Khaled Salah Mohamed

Electronics engineering; Computer security; Computer architecture & logic design

Hardback

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification,... [more]

$208.55  $187.70

We can order this in for you
How long will it take?
Add this item to my basket
Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler Web Debugger

978/151/157/9781511572903.jpg

Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler...

Eric Lawrence

Software Engineering; Computer viruses, Trojans & worms

Paperback

Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers,... [more]

$66.20  $59.60

We can order this in for you
How long will it take?
Add this item to my basket
The Tao of Open Source Intelligence

/978/184/928/9781849287289.jpg

The Tao of Open Source Intelligence

Stewart K. Bertram

Computer security

Paperback

OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for... [more]

$119.45  $107.50

We can order this in for you
How long will it take?
Add this item to my basket
Protecting Privacy in Data Release

978/331/916/9783319161082.jpg

Protecting Privacy in Data Release

Giovanni Livraga

Privacy & data protection

Hardback

Protecting Privacy in Data Release [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : Revised Selected Papers

978/331/915/9783319150864.jpg

Information Security Applications: 15th International Workshop, WISA 2014,...

Kyung-Hyune Rhee, Jeong Hyun Yi, Kyung-Hyune Rhee

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Cloud-Centric Cybersecurity and Critical Infrastructure Protection

no-image-available.jpg

Cloud-Centric Cybersecurity and Critical Infrastructure Protection

Joe B. Wilson

Data encryption

Hardback

The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection and simulation... [more]

$210.55  $189.50

Forthcoming
Pre-Order now
Add this item to my basket
CEH Certified Ethical Hacker All-in-One Exam Guide

978/125/983/9781259836558.jpg

CEH Certified Ethical Hacker All-in-One Exam Guide

Matt Walker

Computer fraud & hacking

Mixed media product

Fully up-to-date coverage of every topic on the CEH v9 certification exam [more]

$77.05  $69.35

We can order this in for you
How long will it take?
Add this item to my basket
Usable Security: History, Themes, and Challenges

978/162/705/9781627055291.jpg

Usable Security: History, Themes, and Challenges

Simson Garfinkel, Heather Richter Lipford

Computer security

Paperback

There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer... [more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
Developing Secure Applications

978/143/025/9781430258759.jpg

Developing Secure Applications

Nishant Das Patnaik

Computer security

Paperback

Developing Secure Applications is targeted towards all developers and security programmers. Mobile apps, website applications,... [more]

$109.45  $98.50

We can order this in for you
How long will it take?
Add this item to my basket
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings

978/331/912/9783319120591.jpg

Security, Privacy, and Applied Cryptography Engineering: 4th International...

Rajat Subhra Chakraborty, Vaclav Vashek Matyas, Patrick R. Schaumont

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident Responder

/978/150/073/9781500734756.jpg

Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident...

Don Murdoch Gse

Computer security

Paperback

BTHb: INRE - Version 2.2 now available. The Blue Team Handbook is a zero fluff reference guide for cyber security incident... [more]

$44.15  $39.75

We can order this in for you
How long will it take?
Add this item to my basket
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

no-image-available.jpg

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage...

Gordon Corera

Espionage & secret services; History of engineering & technology; Computing: general; Computer security

Audio

The previously untold and previously highly classified story of the conflux of espionage and technology, with a compelling... [more]

$61.90  $55.70

Forthcoming
Pre-Order now
Add this item to my basket
Your cart does not contain any items.