Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,709 results

Laboratory Manual to Accompany Hacker Techniques, Tools, and Incident Handling

no-image-available.jpg

Laboratory Manual to Accompany Hacker Techniques, Tools, and Incident Handling...

vLab Solutions

Computer fraud & hacking; Network security

Paperback

The Laboratory Manual to Accompany Hacker Techniques, Tools, and Incident Handling is the lab companion to Sean-Philip Oriyano's... [more]

$67.35  $60.60

We can order this in for you
How long will it take?
Add this item to my basket
Metasploit: The Penetration Tester's Guide

978/159/327/9781593272883.jpg

Metasploit: The Penetration Tester's Guide

David Kennedy, Jr., Jim O'Gorman, Devon Kearns, Mati Aharoni

Computer security; Network security

Paperback

The Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network... [more]

$76.55  $68.90

We can order this in for you
How long will it take?
Add this item to my basket
Advanced Linear Cryptanalysis of Block and Stream Ciphers

no-image-available.jpg

Advanced Linear Cryptanalysis of Block and Stream Ciphers

Pascal Junod, Anne Canteaut

Data encryption

Hardback

The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. This book deals with... [more]

$271.60  $244.45

We can order this in for you
How long will it take?
Add this item to my basket
Digital Investigation in Communication Systems

no-image-available.jpg

Digital Investigation in Communication Systems

Noureddine A. Boudriga

Communications engineering & telecommunications; Computer security

Hardback

[more]

$182.55  $164.30

We can order this in for you
How long will it take?
Add this item to my basket
Handbook of Elliptic and Hyperelliptic Curve Cryptography

no-image-available.jpg

Handbook of Elliptic and Hyperelliptic Curve Cryptography

Henri Cohen, Gerhard Frey, Roberto Avanzi, Christophe Doche, Tanja Lange

Coding theory & cryptology; Combinatorics & graph theory; Operating systems; Data encryption

Hardback

Introduces the theory and algorithms involved in curve-based cryptography. This book provides ready-to-implement algorithms... [more]

$369.15  $332.25

We can order this in for you
How long will it take?
Add this item to my basket
Privacy in Context: Technology, Policy, and the Integrity of Social Life

978/080/475/9780804752367.jpg

Privacy in Context: Technology, Policy, and the Integrity of Social Life...

Helen F. Nissenbaum

Privacy & data protection

Hardback

Arguing that privacy concerns should not be limited solely to concern about control over personal information, this book counters... [more]

$178.00  $160.20

We can order this in for you
How long will it take?
Add this item to my basket
Digital Forensics

no-image-available.jpg

Digital Forensics

Yong Guan

Data encryption; Network security

Paperback

[more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
Intrusion Detection Systems

978/038/777/9780387772653.jpg

Intrusion Detection Systems

Roberto Di Pietro, Luigi V. Mancini

Data encryption

Hardback

This carefully written book is an edited volume by world class leaders within computer network and information security presented... [more]

$329.65  $296.70

We can order this in for you
How long will it take?
Add this item to my basket
Encyclopedia of Information Ethics and Security

978/159/140/9781591409878.jpg

Encyclopedia of Information Ethics and Security

Marian Quigley

Reference works; Business ethics; Data encryption

Hardback

Presents a comprehensive reference source on ethical and security issues relating to technologies. This title includes topics... [more]

$673.80  $606.40

We can order this in for you
How long will it take?
Add this item to my basket
Designing BSD Rootkits: A Introduction to Kernel Hacking

978/159/327/9781593271428.jpg

Designing BSD Rootkits: A Introduction to Kernel Hacking

Joseph Kong

Operating systems; Data encryption

Paperback

Designing BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system.... [more]

$47.15  $42.45

We can order this in for you
How long will it take?
Add this item to my basket
Encyclopedia of Privacy

978/031/333/9780313334771.jpg

Encyclopedia of Privacy

William G. Staples

Encyclopaedias & reference works; Privacy & data protection

Hardback

Offers a comprehensive guide to various aspects of privacy throughout US history including significant legal cases, events,... [more]

$470.25  $423.25

We can order this in for you
How long will it take?
Add this item to my basket
Essential PHP Security

978/059/600/9780596006563.jpg

Essential PHP Security

Chris Shiflett

Internet guides & online services; Data encryption

Paperback

Security demands attention, given the frequency of attacks on web sites. This work explains the common types of attacks and... [more]

$47.15  $42.45

We can order this in for you
How long will it take?
Add this item to my basket
The Hacker Diaries: Confessions of Teenage Hackers

978/007/222/9780072223644.jpg

The Hacker Diaries: Confessions of Teenage Hackers

Dan Verton

Age groups: adolescents; Crime & criminology; Ethical & social aspects of computing; Computer fraud & hacking

Hardback

A glimpse inside the mind of today's teenage hacker, including fascinating interviews with FBI agents, criminal psychologists,... [more]

$40.00  $36.00

We can order this in for you
How long will it take?
Add this item to my basket
Protecting Your Internet Identity: Are You Naked Online?

978/144/226/9781442265394.jpg

Protecting Your Internet Identity: Are You Naked Online?

Ted Claypoole, Theresa M. Payton

Computer security

Paperback

Protecting Your Internet Identity illustrates the depth and importance of a person's online persona and reputation. This updated... [more]

$33.00  $29.70

We can order this in for you
How long will it take?
Add this item to my basket
Physical Security: 150 Things You Should Know

978/012/809/9780128094877.jpg

Physical Security: 150 Things You Should Know

Lawrence J. Fennelly, Marianna Perry

Management & management techniques; Computer security

Paperback

Serving as a reference for the security professional, this book covers aspects of security operations, from lighting and fencing... [more]

$94.95

We can order this in for you
How long will it take?
Add this item to my basket
The Weakest Link: Why Your Employees Might be Your Biggest Cyber Risk

no-image-available.jpg

The Weakest Link: Why Your Employees Might be Your Biggest Cyber Risk

Jeremy Swinfen Green, Paul Dorey

Personnel & human resources management; Knowledge management; Computer security

Paperback

The Weakest Link looks at one of the biggest issues in cyber security: how to protect organisations from their own employees.... [more]

$29.99

Forthcoming
Pre-Order now
Add this item to my basket
Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

978/013/418/9780134189802.jpg

Cyber Security Engineering: A Practical Approach for Systems and Software...

Nancy R. Mead, Carol Woody

Computer security; Network security

Paperback

This book brings together comprehensive best practices for building software systems that exhibit superior operational security,... [more]

$59.95

Forthcoming
Pre-Order now
Add this item to my basket
SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide and SSCP CBK Kit

978/111/931/9781119314028.jpg

SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide...

Adam Gordon, George Murphy

Computer certification; Computer security; Computer networking & communications

Paperback

[more]

$199.95

We can order this in for you
How long will it take?
Add this item to my basket
Mastering the American Accent

978/143/800/9781438008103.jpg

Mastering the American Accent

Lisa Mojsin

Privacy & data protection

Paperback

This combination book and audio instructional program is designed to help non-native Americans speak standard American English... [more]

$45.00

Forthcoming
Pre-Order now
Add this item to my basket
Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves

978/161/039/9781610397209.jpg

Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and...

Adam Levin

Computer security

Paperback

<p>Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight... [more]

$29.99

Forthcoming
Pre-Order now
Add this item to my basket
Exam Ref 70-744 Securing Windows Server 2016

no-image-available.jpg

Exam Ref 70-744 Securing Windows Server 2016

Timothy L Warner, Craig Zacker

Servers; Microsoft Windows; Computer security

Paperback

The Exam Ref is the official study guide for Microsoft certification exams. Featuring concise coverage of the skills measured... [more]

$57.95

Forthcoming
Pre-Order now
Add this item to my basket
Building a Practical Information Security Program

978/012/802/9780128020425.jpg

Building a Practical Information Security Program

Jason Andress, Mark Leary, David Guretz

Computer security

Paperback

Building a Practical Information Security Program provides users with a strategic view on how to build an information security... [more]

$153.70  $138.35

We can order this in for you
How long will it take?
Add this item to my basket
Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

no-image-available.jpg

Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive...

Ira Winkler

Computer fraud & hacking

Paperback

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data... [more]

$58.95

Forthcoming
Pre-Order now
Add this item to my basket
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking

no-image-available.jpg

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking

Jennifer Kurtz

Computer fraud & hacking

Paperback

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the... [more]

$58.95

Forthcoming
Pre-Order now
Add this item to my basket
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

978/159/327/9781593277932.jpg

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Bruce Nikkel

Linux; Information retrieval; Computer security

Paperback

Forensic image acquisition is an important part of post-mortem incident response and evidence collection. Digital forensic... [more]

$109.35  $98.40

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.