Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,199 results

Effective Surveillance for Homeland Security: Balancing Technology and Social Issues

978/143/988/9781439883242.jpg

Effective Surveillance for Homeland Security: Balancing Technology and Social...

Francesco Flammini, Roberto Setola, Giorgio Franceschetti

Human rights; Defence strategy, planning & research; Computer security

Hardback

Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art... [more]

$310.10  $279.10

We can order this in for you
How long will it take?
Add this item to my basket
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

978/146/655/9781466557277.jpg

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks...

Mohssen Mohammed, Al-Sakib Khan Pathan

Computer viruses, Trojans & worms

Hardback

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the... [more]

$232.55  $209.30

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Defense: Countering Targeted Attacks

978/144/221/9781442219175.jpg

Cyber Defense: Countering Targeted Attacks

Richard Stiennon

Computer security; Network security

Hardback

In this new book, Stiennon presents a comprehensive view of the technology, methodology, and tools needed to defend digital... [more]

$105.05  $94.55

Forthcoming
Pre-Order now
Add this item to my basket
@War: The Rise of the Military-Internet Complex

978/148/151/9781481510288.jpg

@War: The Rise of the Military-Internet Complex

Shane Harris

Military history; International relations; Military engineering; Privacy & data protection; Network security

Audio

Cloak-and-dagger, high tech, and big business converge in this revelatory, page-turning account of a new kind of conflict,... [more]

$47.15  $42.45

Forthcoming
Pre-Order now
Add this item to my basket
Resilient Thinking: Protecting Organisations in the 21st Century

978/184/928/9781849283823.jpg

Resilient Thinking: Protecting Organisations in the 21st Century

Phillip Wood

Organisational theory & behaviour; Computer security

Paperback

In Resilient Thinking, Phillip Wood discusses the importance of thinking laterally about potential impacts on your organisation... [more]

$79.95  $71.95

We can order this in for you
How long will it take?
Add this item to my basket
Unauthorized Access: The Crisis in Online Privacy and Security

978/143/983/9781439830130.jpg

Unauthorized Access: The Crisis in Online Privacy and Security

Robert H. Sloan, Richard Warner

Mathematical logic; Databases; Computer security

Paperback

This text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors... [more]

$163.65  $147.30

We can order this in for you
How long will it take?
Add this item to my basket
Computational Number Theory and Modern Cryptography

978/111/818/9781118188583.jpg

Computational Number Theory and Modern Cryptography

Song Y. Yan

Number theory; Data encryption

Hardback

* Makes deep mathematical problems accessible to computer scientists and engineers * Based on classroom tested materials... [more]

$209.30  $188.35

We can order this in for you
How long will it take?
Add this item to my basket
Network Security: A Beginner's Guide

978/007/179/9780071795708.jpg

Network Security: A Beginner's Guide

Eric Maiwald

Computing & IT; Computer security; Network security

Paperback

New in the Secure Beginner's Guide series, this is the ideal get-up-and-running guide for IT professionals seeking complete... [more]

$62.00  $55.80

We can order this in for you
How long will it take?
Add this item to my basket
Mobile Access Safety: Beyond BYOD

no-image-available.jpg

Mobile Access Safety: Beyond BYOD

Dominique Assing, Stephane Cale

Mobile phone technology; WAP (wireless) technology; Computer security

Hardback

Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones,... [more]

$209.30  $188.35

We can order this in for you
How long will it take?
Add this item to my basket
CompTIA Security+ Certification Study Guide (Exam SY0-401)

978/007/184/9780071841283.jpg

CompTIA Security+ Certification Study Guide (Exam SY0-401)

Glen E. Clarke

Computer certification: CompTia; Computer security; Network security

Mixed media product

Fully revised to cover the 2014 CompTIA Security+ objectives and featuring electronic practice exams and video training, this... [more]

$77.05  $69.35

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Terrorism

no-image-available.jpg

Introduction to Terrorism

David H. McElreath, Carl J. Jensen, Michael Wigginton, Jr., Chester L. Quarles, Stephen Mallory

Computer security

Hardback

No further information found for this title. [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Securing Cloud Services: A Pragmatic Approach to Security Architecture in the Cloud

978/184/928/9781849283960.jpg

Securing Cloud Services: A Pragmatic Approach to Security Architecture in...

Lee Newcombe

Business applications; Computer security

Paperback

This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate... [more]

$105.05  $94.55

We can order this in for you
How long will it take?
Add this item to my basket
Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security

978/111/816/9781118166130.jpg

Predicting Malicious Behavior: Tools and Techniques for Ensuring Global...

Gary M. Jackson, Daniel Jackson

Computer security; Network security

Paperback

A groundbreaking exploration of how to identify and fight security threats at every level <p>This revolutionary book combines... [more]

$84.75  $76.30

We can order this in for you
How long will it take?
Add this item to my basket
Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler Web Debugger

978/147/502/9781475024487.jpg

Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler...

Eric Lawrence

Software Engineering; Computer viruses, Trojans & worms

Paperback

Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers,... [more]

$56.05  $50.45

We can order this in for you
How long will it take?
Add this item to my basket
CCNA Security (640-554) Portable Command Guide

978/158/720/9781587204487.jpg

CCNA Security (640-554) Portable Command Guide

Bob Vachon

Databases; Computer certification: Cisco; Computer security

Paperback

All the CCNA Security 640-554 commands in one compact, portable resource Preparing for the latest CCNA(R) Security exam? Here... [more]

$47.20  $42.50

We can order this in for you
How long will it take?
Add this item to my basket
Intrusions: How Hackers Get in and the Evidence They Leave Behind

no-image-available.jpg

Intrusions: How Hackers Get in and the Evidence They Leave Behind

Jesse Varsalone (Elkridge, Maryland, USA)

Production & quality control management; Computer security; Computer networking & communications

Paperback

In the age of the Internet, hackers rob banks and other financial instructions without having to fire a weapon or knowing... [more]

$182.55  $164.30

We can order this in for you
How long will it take?
Add this item to my basket
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

978/159/327/9781593272906.jpg

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software...

Michael Sikorski, Andrew Honig

Computer security

Paperback

More than 100 malicious computer attacks (malware) occur every second. The skills required to analyze and assess these attacks... [more]

$92.55  $83.30

We can order this in for you
How long will it take?
Add this item to my basket
SSH Mastery: Openssh, Putty, Tunnels and Keys

978/147/006/9781470069711.jpg

SSH Mastery: Openssh, Putty, Tunnels and Keys

Michael W Lucas

Computer security

Paperback

Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH... [more]

$57.55  $51.80

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Crime: Concepts, Methodologies, Tools and Applications

978/161/350/9781613503232.jpg

Cyber Crime: Concepts, Methodologies, Tools and Applications

Information Resources Management Association

Computer fraud & hacking

Hardback

Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based... [more]

$4011.70  $3610.55

We can order this in for you
How long will it take?
Add this item to my basket
Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned

978/110/709/9781107096424.jpg

Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned...

Milind Tambe

Computer security; Network security

Hardback

This study describes deployed applications of game theory for security for the LAX police and US Federal Air Marshals Service.... [more]

$224.35  $201.90

We can order this in for you
How long will it take?
Add this item to my basket
Metasploit: The Penetration Tester's Guide

978/159/327/9781593272883.jpg

Metasploit: The Penetration Tester's Guide

David Kennedy, Jr., Jim O'Gorman, Devon Kearns, Mati Aharoni

Computer security; Network security

Paperback

The Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network... [more]

$76.55  $68.90

We can order this in for you
How long will it take?
Add this item to my basket
Worm: The First Digital World War

978/080/211/9780802119834.jpg

Worm: The First Digital World War

Mark Bowden

History of engineering & technology; Computing: general; Computer viruses, Trojans & worms

Hardback

In Worm, one of the world's biggest selling authors of narrative non-fiction returns to bestselling form. [more]

$39.40  $35.45

We can order this in for you
How long will it take?
Add this item to my basket
Influences on the Adoption of Multifactor Authentication

no-image-available.jpg

Influences on the Adoption of Multifactor Authentication

Martin C Libicki (RAND Corporation, California), Edward Balkovich, Brian A Jackson, Rena Rudavsky, Katharine Watkins Webb

Information technology industries; Computer security

Paperback

Sponsored by the National Institute of Standards and Technology. [more]

$56.05  $50.45

We can order this in for you
How long will it take?
Add this item to my basket
Advanced Linear Cryptanalysis of Block and Stream Ciphers

no-image-available.jpg

Advanced Linear Cryptanalysis of Block and Stream Ciphers

Pascal Junod, Anne Canteaut

Data encryption

Hardback

The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. This book deals with... [more]

$271.60  $244.45

We can order this in for you
How long will it take?
Add this item to my basket
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

978/031/603/9780316037709.jpg

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Kevin D. Mitnick, William L. Simon

Biography: general; Computer fraud & hacking

Hardback

Kevin Mitnick's long-awaited memoir of computer hacking and FBI skirting, revealed now after seven years of government-mandated... [more]

$41.00  $36.90

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.