Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security titles - 1,415 results

Economics of Information Security and Privacy III

Economics of Information Security and Privacy III

Bruce Schneier

Business & Economics; Economics; Network hardware; Algorithms & data structures; Computer security; Computer networking & communications

Hardback

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information... [more]

$358.95  $323.05

We can order this in for you
How long will it take?
Add this item to my basket
IT Security Governance Innovations: Theory and Research

IT Security Governance Innovations: Theory and Research

Daniel Mellado, Luis Enrique Sanchez, Eduardo Fernandez-Medina, Mario Piattini

Computer security

Hardback

Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Multimedia Security: Watermarking, Steganography, and Forensics

Multimedia Security: Watermarking, Steganography, and Forensics

Frank Y. Shih

Computing: general; Computer security

Hardback

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and... [more]

$334.70  $301.25

We can order this in for you
How long will it take?
Add this item to my basket
CEH Certified Ethical Hacker All-in-One Exam Guide

CEH Certified Ethical Hacker All-in-One Exam Guide

Matt Walker

Coding theory & cryptology; Management accounting & bookkeeping; Network hardware; Computer certification; Computer fraud & hacking; Data encryption; Network security

Mixed media product

Featuring full coverage of v.8 of the Certified Ethical Hacker (CEH) certification exam from the EC-Council, this complete... [more]

$77.05  $69.35

We can order this in for you
How long will it take?
Add this item to my basket
IOS Hacker's Handbook

IOS Hacker's Handbook

Charlie Miller, Dion Blazakis, Dino Dai Zovi, Stefan Esser, Vincenzo Iozzo

Macintosh OS; Computer security; Computer networking & communications

Paperback

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system... [more]

$69.75  $62.80

We can order this in for you
How long will it take?
Add this item to my basket
Flex Mobile in Action

Flex Mobile in Action

Jonathan Campos

Computer programming & software development; Computer security

Paperback

An important resource for learning how to use the powerful Flex Platform to create compelling mobile applications that can... [more]

$62.95  $56.65

We can order this in for you
How long will it take?
Add this item to my basket
Email Security with Cisco Ironport

Email Security with Cisco Ironport

Chris Porter

Computer security; Electronic mail (email): professional; Network security

Paperback

Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today's... [more]

$142.30  $128.05

We can order this in for you
How long will it take?
Add this item to my basket
Constructive Side-Channel Analysis and Secure Design

Constructive Side-Channel Analysis and Secure Design

Werner Schindler, Sorin Huss

Ethical & social aspects of computing; Network hardware; Algorithms & data structures; Computer security; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and... [more]

$130.95  $117.85

We can order this in for you
How long will it take?
Add this item to my basket
Cyber War: The Next Threat to National Security and What to Do About it

Cyber War: The Next Threat to National Security and What to Do About it...

Richard A. Clarke, Robert K. Knake

Defence strategy, planning & research; Computer security

Audio

Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert... [more]

$62.00  $55.80

We can order this in for you
How long will it take?
Add this item to my basket
Secure Software Design

Secure Software Design

Theodor Richardson, Charles N. Thies

Computer programming & software development; Computer security; Network security

Paperback

With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security... [more]

$244.55  $220.10

We can order this in for you
How long will it take?
Add this item to my basket
Policies, Procedures, and Technologies to Defend Against the Insider Threat

Policies, Procedures, and Technologies to Defend Against the Insider Threat...

Gennaro Scalo

Management & management techniques; Computer security; Network management; Network security

Hardback

Securing information from insider threats needs to start early. Policies and procedures need to be in place to mitigate the... [more]

$167.95  $151.15

We can order this in for you
How long will it take?
Add this item to my basket
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic...

Jean-Francois Blanchette

Information theory; Coding theory & cryptology; Computer security

Hardback

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life.... [more]

$70.30  $63.25

We can order this in for you
How long will it take?
Add this item to my basket
Topics in Cryptology - CT-RSA 2012

Topics in Cryptology - CT-RSA 2012

Orr Dunkelman

Coding theory & cryptology; Discrete mathematics; Network hardware; Algorithms & data structures; Computer security; Data encryption

Paperback

Constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco,... [more]

$172.95  $155.65

We can order this in for you
How long will it take?
Add this item to my basket
Engineering Secure Software and Systems

Engineering Secure Software and Systems

Gilles Barthe, Ben Livshits, Riccardo Scandariato

Network hardware; Algorithms & data structures; Software Engineering; Data encryption; Computer science; Maths for computer scientists

Paperback

This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems,... [more]

$130.95  $117.85

We can order this in for you
How long will it take?
Add this item to my basket
Software Safety and Security: Tools for Analysis and Verification

Software Safety and Security: Tools for Analysis and Verification

T. Nipkow, O. Grumberg, B. Hauptmann

Computer security

Hardback

Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic... [more]

$406.35  $365.70

We can order this in for you
How long will it take?
Add this item to my basket
Computer Security Fundamentals

Computer Security Fundamentals

William (Chuck) Easttom II

Databases; Computer security; Network security

Paperback

Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute... [more]

$188.55  $169.70

We can order this in for you
How long will it take?
Add this item to my basket
Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications

Emmanuel Prouff

Network hardware; Algorithms & data structures; Software Engineering; Computer security; Data encryption; Information architecture

Paperback

Constitutes the refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research... [more]

$194.95  $175.45

We can order this in for you
How long will it take?
Add this item to my basket
Digital Identity and Access Management: Technologies and Frameworks

Digital Identity and Access Management: Technologies and Frameworks

Raj Sharman, Sanjukta Das Smith, Manish Gupta

Computer security

Hardback

Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Security De-Engineering: Solving the Problems in Information Risk Management

Security De-Engineering: Solving the Problems in Information Risk Management...

Ian Tibble

Management & management techniques; Computing: general; Computer security; Network management

Paperback

As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something... [more]

$188.05  $169.25

We can order this in for you
How long will it take?
Add this item to my basket
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings

Cryptography and Coding: 13th IMA International Conference, IMACC 2011,...

Liqun Chen

Coding theory & cryptology; Discrete mathematics; Algorithms & data structures; Computer security; Data encryption

Paperback

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC... [more]

$192.95  $173.65

We can order this in for you
How long will it take?
Add this item to my basket
Modern Stream Ciphers: Design and Analysis

Modern Stream Ciphers: Design and Analysis

Thomas Johansson, Willi Meier

Computer security; Data encryption

Hardback

An increased interest in stream ciphers has recently been reflected in a number of applications for securing environments... [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

Strategic and Practical Approaches for Information Security Governance:...

Manish Gupta, Raj Sharman, John Walp

Computer security; Network security

Hardback

Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Communications and Multimedia Security

Communications and Multimedia Security

Bart de Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl (University of Salzburg, Austria)

Ethical & social aspects of computing; Network hardware; Operating systems; Algorithms & data structures; Data encryption

Paperback

Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia... [more]

$170.95  $153.85

We can order this in for you
How long will it take?
Add this item to my basket
Identity Theft

Identity Theft

Emily Finch, Stefan Fafinski

Crime & criminology; Criminal law & procedure; Computer fraud & hacking

Paperback

Identity theft (or identity fraud) has gained prominence as a pressing and prevalent social problem. This book provides a... [more]

$105.05  $94.55

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security: Public Sector Threats and Responses

Cyber Security: Public Sector Threats and Responses

Kim J. Andreasson

Public administration; Central government policies; Business mathematics & systems; Urban & municipal planning; Computer security

Hardback

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents... [more]

$172.10  $154.90

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.