Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,802 results

The Hacker Playbook 2: Practical Guide to Penetration Testing

978/151/221/9781512214567.jpg

The Hacker Playbook 2: Practical Guide to Penetration Testing

Peter Kim

Computer programming & software development; Computer security

Paperback

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security... [more]

$79.95  $71.95

We can order this in for you
How long will it take?
Add this item to my basket
Physical and Data-Link Security Techniques for Future Communication Systems

978/331/923/9783319236087.jpg

Physical and Data-Link Security Techniques for Future Communication Systems...

Marco Baldi, Stefano Tomasin

Communications engineering & telecommunications; Database design & theory; Computer security

Hardback

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order... [more]

$515.70  $464.15

We can order this in for you
How long will it take?
Add this item to my basket
IP Cores Design from Specifications to Production: Modeling, Verification, Optimization, and Protection

978/331/922/9783319220345.jpg

IP Cores Design from Specifications to Production: Modeling, Verification,...

Khaled Salah Mohamed

Electronics engineering; Computer security; Computer architecture & logic design

Hardback

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification,... [more]

$208.55  $187.70

We can order this in for you
How long will it take?
Add this item to my basket
Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler Web Debugger

978/151/157/9781511572903.jpg

Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler...

Eric Lawrence

Software Engineering; Computer viruses, Trojans & worms

Paperback

Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers,... [more]

$66.20  $59.60

We can order this in for you
How long will it take?
Add this item to my basket
The Tao of Open Source Intelligence

978/184/928/9781849287289.jpg

The Tao of Open Source Intelligence

Stewart K. Bertram

Computer security

Paperback

OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for... [more]

$119.45  $107.50

We can order this in for you
How long will it take?
Add this item to my basket
Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice

978/113/745/9781137455543.jpg

Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice...

Frederic Lemieux

Criminal investigation & detection; Organised crime; International relations; Computer security

Hardback

This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by... [more]

$251.95  $226.75

We can order this in for you
How long will it take?
Add this item to my basket
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

978/147/894/9781478945567.jpg

The Art of Invisibility: The World's Most Famous Hacker Teaches You How...

Kevin Mitnick

Ethical & social aspects of computing; Privacy & data protection; Network security

Audio

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in... [more]

$64.95  $58.45

We can order this in for you
How long will it take?
Add this item to my basket
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

978/147/894/9781478945536.jpg

The Art of Invisibility: The World's Most Famous Hacker Teaches You How...

Kevin Mitnick

Impact of science & technology on society; Ethical & social aspects of computing; Privacy & data protection; Network security

Audio

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in... [more]

$159.95  $143.95

We can order this in for you
How long will it take?
Add this item to my basket
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

978/151/591/9781515916949.jpg

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

Gabriella Coleman

Anarchism; Pressure groups & lobbying; Computer fraud & hacking

Audio

Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name... [more]

$77.95  $70.15

We can order this in for you
How long will it take?
Add this item to my basket
Hacking Exposed Wireless: Wireless Security Secrets and Solutions

978/007/182/9780071827638.jpg

Hacking Exposed Wireless: Wireless Security Secrets and Solutions

Joshua Wright, Johnny Cache

Computer security; Computer networking & communications

Paperback

Featuring the proven Hacking Exposed method, this new edition of this bestseller reveals how to defend against the latest... [more]

$108.95  $98.05

We can order this in for you
How long will it take?
Add this item to my basket
Protecting Privacy in Data Release

978/331/916/9783319161082.jpg

Protecting Privacy in Data Release

Giovanni Livraga

Privacy & data protection

Hardback

Protecting Privacy in Data Release [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : Revised Selected Papers

978/331/915/9783319150864.jpg

Information Security Applications: 15th International Workshop, WISA 2014,...

Kyung-Hyune Rhee, Jeong Hyun Yi, Kyung-Hyune Rhee

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Cloud-Centric Cybersecurity and Critical Infrastructure Protection

no-image-available.jpg

Cloud-Centric Cybersecurity and Critical Infrastructure Protection

Joe B. Wilson

Data encryption

Hardback

The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection and simulation... [more]

$210.55  $189.50

Forthcoming
Pre-Order now
Add this item to my basket
Usable Security: History, Themes, and Challenges

978/162/705/9781627055291.jpg

Usable Security: History, Themes, and Challenges

Simson Garfinkel, Heather Richter Lipford

Computer security

Paperback

There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer... [more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
Developing Secure Applications

978/143/025/9781430258759.jpg

Developing Secure Applications

Nishant Das Patnaik

Computer security

Paperback

Developing Secure Applications is targeted towards all developers and security programmers. Mobile apps, website applications,... [more]

$109.45  $98.50

We can order this in for you
How long will it take?
Add this item to my basket
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings

978/331/912/9783319120591.jpg

Security, Privacy, and Applied Cryptography Engineering: 4th International...

Rajat Subhra Chakraborty, Vaclav Vashek Matyas, Patrick R. Schaumont

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident Responder

978/150/073/9781500734756.jpg

Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident...

Don Murdoch Gse

Computer security

Paperback

BTHb: INRE - Version 2.2 now available. The Blue Team Handbook is a zero fluff reference guide for cyber security incident... [more]

$44.15  $39.75

We can order this in for you
How long will it take?
Add this item to my basket
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

no-image-available.jpg

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage...

Gordon Corera

Espionage & secret services; History of engineering & technology; Computing: general; Computer security

Audio

The previously untold and previously highly classified story of the conflux of espionage and technology, with a compelling... [more]

$73.95  $66.55

We can order this in for you
How long will it take?
Add this item to my basket
Securing the Cloud: Security Strategies for the Ubiquitous Data Center

no-image-available.jpg

Securing the Cloud: Security Strategies for the Ubiquitous Data Center

Curtis Franklin, Jr., Brian Chee

Computer security; Network security

Hardback

A must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional... [more]

$242.95  $218.65

We can order this in for you
How long will it take?
Add this item to my basket
Mastering Kali Linux for Advanced Penetration Testing

978/178/216/9781782163121.jpg

Mastering Kali Linux for Advanced Penetration Testing

Robert W. Beggs

Computer security

Paperback

This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to... [more]

$143.75  $129.40

We can order this in for you
How long will it take?
Add this item to my basket
CompTIA Security+ Study Guide: SY0-401

978/111/887/9781118875070.jpg

CompTIA Security+ Study Guide: SY0-401

Emmett Dulaney, Chuck Easttom

Computer certification: CompTia; Computer security; Network security

Paperback

Join over 250,000 IT professionals who've earned Security+ certification If you're an IT professional hoping to progress... [more]

$89.95  $80.95

We can order this in for you
How long will it take?
Add this item to my basket
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference

978/143/026/9781430264064.jpg

Disaster Recovery, Crisis Response, and Business Continuity: A Management...

Jamie Watters, Janet Watters

Computer security

Paperback

You're in charge of IT, facilities, or core operations for your organization when a hurricane or a fast-moving wildfire hits.... [more]

$115.95  $104.35

We can order this in for you
How long will it take?
Add this item to my basket
Identity and Access Management: Business Performance Through Connected Intelligence

978/012/408/9780124081406.jpg

Identity and Access Management: Business Performance Through Connected Intelligence...

Ertem Osmanoglu

Computer security; Network security

Paperback

Provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks... [more]

$154.95  $139.45

We can order this in for you
How long will it take?
Add this item to my basket
Security, Privacy, and Trust in Ubiquitous Computing: New Trends and Applications

no-image-available.jpg

Security, Privacy, and Trust in Ubiquitous Computing: New Trends and Applications...

Sheikh Ahamed, Munirul Haque

Computer security

Hardback

This book addresses the integration of new devices (such as the iPhone), new technologies (such as cloud computing and green... [more]

$417.95  $376.15

We can order this in for you
How long will it take?
Add this item to my basket
Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do about It

978/080/419/9780804193054.jpg

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What...

Marc Goodman

Cybernetics & systems theory; Laws of Specific jurisdictions; Impact of science & technology on society; Computer security; Computer science

Audio

Technological advances have benefited our world in immeasurable ways, but there is an ominous flipside. Criminals are often... [more]

$130.70  $117.65

Forthcoming
Pre-Order now
Add this item to my basket
Your cart does not contain any items.