Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,776 results

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

978/147/894/9781478945567.jpg

The Art of Invisibility: The World's Most Famous Hacker Teaches You How...

Kevin Mitnick

Ethical & social aspects of computing; Privacy & data protection; Network security

Audio

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in... [more]

$64.95  $58.45

Forthcoming
Pre-Order now
Add this item to my basket
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

978/147/894/9781478945536.jpg

The Art of Invisibility: The World's Most Famous Hacker Teaches You How...

Kevin Mitnick

Impact of science & technology on society; Ethical & social aspects of computing; Privacy & data protection; Network security

Audio

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in... [more]

$159.95  $143.95

Forthcoming
Pre-Order now
Add this item to my basket
Protecting Privacy in Data Release

978/331/916/9783319161082.jpg

Protecting Privacy in Data Release

Giovanni Livraga

Privacy & data protection

Hardback

Protecting Privacy in Data Release [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : Revised Selected Papers

978/331/915/9783319150864.jpg

Information Security Applications: 15th International Workshop, WISA 2014,...

Kyung-Hyune Rhee, Jeong Hyun Yi, Kyung-Hyune Rhee

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Oracle Database 12C Security

978/007/182/9780071824286.jpg

Oracle Database 12C Security

David C. Knox, William Maroulis, Scott Gaetjen

Enterprise software; Data warehousing; Computer security; Network security

Paperback

Renowned Oracle security expert David Knox provides trusted advice and best practices for comprehensive Oracle Database security.... [more]

$125.95  $113.35

We can order this in for you
How long will it take?
Add this item to my basket
Cloud-Centric Cybersecurity and Critical Infrastructure Protection

no-image-available.jpg

Cloud-Centric Cybersecurity and Critical Infrastructure Protection

Joe B. Wilson

Data encryption

Hardback

The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection and simulation... [more]

$210.55  $189.50

Forthcoming
Pre-Order now
Add this item to my basket
Cyber Warfare: A Reference Handbook

978/161/069/9781610694438.jpg

Cyber Warfare: A Reference Handbook

Paul J. Springer

Military tactics; Computer security

Hardback

This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to... [more]

$177.95  $160.15

We can order this in for you
How long will it take?
Add this item to my basket
CEH Certified Ethical Hacker All-in-One Exam Guide

978/125/983/9781259836558.jpg

CEH Certified Ethical Hacker All-in-One Exam Guide

Matt Walker

Computer fraud & hacking

Mixed media product

Fully up-to-date coverage of every topic on the CEH v9 certification exam [more]

$89.95  $80.95

We can order this in for you
How long will it take?
Add this item to my basket
Usable Security: History, Themes, and Challenges

978/162/705/9781627055291.jpg

Usable Security: History, Themes, and Challenges

Simson Garfinkel, Heather Richter Lipford

Computer security

Paperback

There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer... [more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
Developing Secure Applications

978/143/025/9781430258759.jpg

Developing Secure Applications

Nishant Das Patnaik

Computer security

Paperback

Developing Secure Applications is targeted towards all developers and security programmers. Mobile apps, website applications,... [more]

$109.45  $98.50

We can order this in for you
How long will it take?
Add this item to my basket
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings

978/331/912/9783319120591.jpg

Security, Privacy, and Applied Cryptography Engineering: 4th International...

Rajat Subhra Chakraborty, Vaclav Vashek Matyas, Patrick R. Schaumont

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident Responder

978/150/073/9781500734756.jpg

Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident...

Don Murdoch Gse

Computer security

Paperback

BTHb: INRE - Version 2.2 now available. The Blue Team Handbook is a zero fluff reference guide for cyber security incident... [more]

$44.15  $39.75

We can order this in for you
How long will it take?
Add this item to my basket
Organized Chaos: Reimagining the Internet

978/192/809/9781928096047.jpg

Organized Chaos: Reimagining the Internet

Mark Raymond, Gordon Smith

International relations; Computer security

Paperback

Organized Chaos examines the contemporary international politics of Internet governance problems. In this book, some of the... [more]

$79.95  $71.95

We can order this in for you
How long will it take?
Add this item to my basket
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

no-image-available.jpg

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage...

Gordon Corera

Espionage & secret services; History of engineering & technology; Computing: general; Computer security

Audio

The previously untold and previously highly classified story of the conflux of espionage and technology, with a compelling... [more]

$73.95  $66.55

We can order this in for you
How long will it take?
Add this item to my basket
Securing the Cloud: Security Strategies for the Ubiquitous Data Center

no-image-available.jpg

Securing the Cloud: Security Strategies for the Ubiquitous Data Center

Curtis Franklin, Jr., Brian Chee

Computer security; Network security

Hardback

A must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional... [more]

$242.95  $218.65

We can order this in for you
How long will it take?
Add this item to my basket
Mastering Kali Linux for Advanced Penetration Testing

978/178/216/9781782163121.jpg

Mastering Kali Linux for Advanced Penetration Testing

Robert W. Beggs

Computer security

Paperback

This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to... [more]

$143.75  $129.40

We can order this in for you
How long will it take?
Add this item to my basket
Computer Security: Principles and Practice

978/013/377/9780133773927.jpg

Computer Security: Principles and Practice

William Stallings, Lawrie Brown

Computer security

Hardback

Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer/Network Security. It also provides... [more]

$435.95  $392.35

We can order this in for you
How long will it take?
Add this item to my basket
Identity and Access Management: Business Performance Through Connected Intelligence

978/012/408/9780124081406.jpg

Identity and Access Management: Business Performance Through Connected Intelligence...

Ertem Osmanoglu

Computer security; Network security

Paperback

Provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks... [more]

$154.95  $139.45

We can order this in for you
How long will it take?
Add this item to my basket
Security, Privacy, and Trust in Ubiquitous Computing: New Trends and Applications

no-image-available.jpg

Security, Privacy, and Trust in Ubiquitous Computing: New Trends and Applications...

Sheikh Ahamed, Munirul Haque

Computer security

Hardback

This book addresses the integration of new devices (such as the iPhone), new technologies (such as cloud computing and green... [more]

$417.95  $376.15

We can order this in for you
How long will it take?
Add this item to my basket
Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do about It

978/080/419/9780804193054.jpg

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What...

Marc Goodman

Cybernetics & systems theory; Laws of Specific jurisdictions; Impact of science & technology on society; Computer security; Computer science

Audio

Technological advances have benefited our world in immeasurable ways, but there is an ominous flipside. Criminals are often... [more]

$130.70  $117.65

Forthcoming
Pre-Order now
Add this item to my basket
Cyber Defense: Countering Targeted Attacks

978/144/221/9781442219175.jpg

Cyber Defense: Countering Targeted Attacks

Richard Stiennon

Computer security; Network security

Hardback

In this new book, Stiennon presents a comprehensive view of the technology, methodology, and tools needed to defend digital... [more]

$124.95  $112.45

Forthcoming
Pre-Order now
Add this item to my basket
E-Commerce Security and Privacy

978/146/135/9781461355687.jpg

E-Commerce Security and Privacy

Anup K. Ghosh

Privacy & data protection; Information architecture

Paperback

Brings together researchers and practitioners in diverse areas of computer science and software engineering to explore their... [more]

$499.95  $449.95

We can order this in for you
How long will it take?
Add this item to my basket
CompTIA Security+ Certification Bundle (Exam SY0-401)

978/007/183/9780071834261.jpg

CompTIA Security+ Certification Bundle (Exam SY0-401)

Glen E. Clarke, Daniel Lachance

Computer certification: CompTia; Computer security; Network security

Mixed media product

This money-saving CompTIA Security+ Certification self-study bundle saves readers 12% off the manufacturer's suggested retail... [more]

$125.95  $113.35

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Warfare: How Conflicts in Cyberspace are Challenging America and Changing the World

978/031/339/9780313398957.jpg

Cyber Warfare: How Conflicts in Cyberspace are Challenging America and Changing...

Paul Rosenzweig

Military tactics; Computer security

Hardback

This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private... [more]

$159.95  $143.95

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Terrorism

no-image-available.jpg

Introduction to Terrorism

David H. McElreath, Carl J. Jensen, Michael Wigginton, Jr., Chester L. Quarles, Stephen Mallory

Computer security

Hardback

No further information found for this title. [more]

$273.95  $246.55

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.