Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security titles - 1,402 results

Comptia Security+ SY0-401 Authorized Cert Guide

Comptia Security+ SY0-401 Authorized Cert Guide

David L. Prowse

Computer certification: CompTia; Computer security; Network security

Mixed media product

DVD Features Three Complete Practice Exams, 31 videos, and 31 Interactive Exercises * Master every topic on CompTIA's new... [more]

$92.65  $83.40

We can order this in for you
How long will it take?
Add this item to my basket
Guide to Cloud Computing: Principles and Practice

Guide to Cloud Computing: Principles and Practice

Richard Hill, Laurie Hirsch, Peter Lake, Siavash Moshiri

Computer programming & software development; Algorithms & data structures; Data mining; Data encryption; Systems analysis & design

Hardback

This book describes the landscape of cloud computing from first principles, progressing step-by-step through the process of... [more]

$226.00  $203.40

We can order this in for you
How long will it take?
Add this item to my basket
The Death of the Internet: How it May Happen and How it Can be Stopped

The Death of the Internet: How it May Happen and How it Can be Stopped

Markus Jakobsson

Computer security; Computer networking & communications; Network security

Paperback

Covering internet security, malware, phishing, and how to combat these serious and growing issues on both desktop and smart... [more]

$156.20  $140.60

We can order this in for you
How long will it take?
Add this item to my basket
CISSP For Dummies

CISSP For Dummies

Lawrence C. Miller, Peter Gregory

Education; Computer certification; Computer security

Paperback

A fully updated guide to CISSP certification CISSP certification is the most prestigious and highly valued of the security... [more]

$62.00  $55.80

We can order this in for you
How long will it take?
Add this item to my basket
Reverse Deception Organized Cyber Threat Counter-Exploitation

Reverse Deception Organized Cyber Threat Counter-Exploitation

Sean M. Bodmer, Max Kilger, Gregory S. Carpenter, Jeff R. Jones, Jade Jones

Computer security

Paperback

This is the first book dedicated to understanding and fighting advanced persistent threats, today's most pernicious, most... [more]

$62.00  $55.80

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Terrorism

Introduction to Terrorism

David H. McElreath, Carl J. Jensen, Michael Wigginton, Jr., Chester L. Quarles, Stephen Mallory

Computer security

Hardback

No further information found for this title. [more]

$224.25  $201.85

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Surveillance Studies

Introduction to Surveillance Studies

J. K. Petersen

Communications engineering & telecommunications; Privacy & data protection

Hardback

Surveillance is a divisive issue-one might say it is inherently controversial. Used by private industry, law enforcement,... [more]

$188.05  $169.25

We can order this in for you
How long will it take?
Add this item to my basket
Convergence and Hybrid Information Technology

Convergence and Hybrid Information Technology

Geuk Lee, Daniel Howard, Jeong Jin Kang, Dominik Slezak

Network hardware; Software Engineering; Data mining; Computer security; User interface design & usability

Paperback

Constitutes the refereed proceedings of the 5th International Conference on Convergence and Hybrid Information Technology,... [more]

$214.95  $193.45

We can order this in for you
How long will it take?
Add this item to my basket
Economics of Information Security and Privacy III

Economics of Information Security and Privacy III

Bruce Schneier

Economics; Network hardware; Computer security; Computer networking & communications

Hardback

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information... [more]

$358.95  $323.05

We can order this in for you
How long will it take?
Add this item to my basket
IT Security Governance Innovations: Theory and Research

IT Security Governance Innovations: Theory and Research

Daniel Mellado, Luis Enrique Sanchez, Eduardo Fernandez-Medina, Mario Piattini

Computer security

Hardback

Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Multimedia Security: Watermarking, Steganography, and Forensics

Multimedia Security: Watermarking, Steganography, and Forensics

Frank Y. Shih

Computing: general; Computer security

Hardback

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and... [more]

$334.70  $301.25

We can order this in for you
How long will it take?
Add this item to my basket
CEH Certified Ethical Hacker All-in-One Exam Guide

CEH Certified Ethical Hacker All-in-One Exam Guide

Matt Walker

Computer certification; Computer fraud & hacking; Network security

Mixed media product

Featuring full coverage of v.8 of the Certified Ethical Hacker (CEH) certification exam from the EC-Council, this complete... [more]

$77.05  $69.35

We can order this in for you
How long will it take?
Add this item to my basket
IOS Hacker's Handbook

IOS Hacker's Handbook

Charlie Miller, Dion Blazakis, Dino Dai Zovi, Stefan Esser, Vincenzo Iozzo

Macintosh OS; Computer security; Computer networking & communications

Paperback

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system... [more]

$69.75  $62.80

We can order this in for you
How long will it take?
Add this item to my basket
Flex Mobile in Action

Flex Mobile in Action

Jonathan Campos

Computer programming & software development; Computer security

Paperback

An important resource for learning how to use the powerful Flex Platform to create compelling mobile applications that can... [more]

$62.95  $56.65

We can order this in for you
How long will it take?
Add this item to my basket
Email Security with Cisco Ironport

Email Security with Cisco Ironport

Chris Porter

Computer security; Electronic mail (email): professional; Network security

Paperback

Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today's... [more]

$142.30  $128.05

We can order this in for you
How long will it take?
Add this item to my basket
Constructive Side-Channel Analysis and Secure Design

Constructive Side-Channel Analysis and Secure Design

Werner Schindler, Sorin Huss

Ethical & social aspects of computing; Network hardware; Algorithms & data structures; Computer security; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and... [more]

$130.95  $117.85

We can order this in for you
How long will it take?
Add this item to my basket
Secure Software Design

Secure Software Design

Theodor Richardson, Charles N. Thies

Computer programming & software development; Computer security; Network security

Paperback

With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security... [more]

$244.55  $220.10

We can order this in for you
How long will it take?
Add this item to my basket
Policies, Procedures, and Technologies to Defend Against the Insider Threat

Policies, Procedures, and Technologies to Defend Against the Insider Threat...

Gennaro Scalo

Management & management techniques; Computer security; Network management; Network security

Hardback

Securing information from insider threats needs to start early. Policies and procedures need to be in place to mitigate the... [more]

$167.95  $151.15

We can order this in for you
How long will it take?
Add this item to my basket
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic...

Jean-Francois Blanchette

Information theory; Coding theory & cryptology; Computer security

Hardback

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life.... [more]

$70.30  $63.25

We can order this in for you
How long will it take?
Add this item to my basket
Topics in Cryptology - CT-RSA 2012

Topics in Cryptology - CT-RSA 2012

Orr Dunkelman

Coding theory & cryptology; Discrete mathematics; Algorithms & data structures; Data encryption

Paperback

Constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco,... [more]

$172.95  $155.65

We can order this in for you
How long will it take?
Add this item to my basket
Engineering Secure Software and Systems

Engineering Secure Software and Systems

Gilles Barthe, Ben Livshits, Riccardo Scandariato

Network hardware; Algorithms & data structures; Software Engineering; Data encryption; Maths for computer scientists

Paperback

This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems,... [more]

$130.95  $117.85

We can order this in for you
How long will it take?
Add this item to my basket
Software Safety and Security: Tools for Analysis and Verification

Software Safety and Security: Tools for Analysis and Verification

T. Nipkow, O. Grumberg, B. Hauptmann

Computer security

Hardback

Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic... [more]

$406.35  $365.70

We can order this in for you
How long will it take?
Add this item to my basket
Computer Security Fundamentals

Computer Security Fundamentals

William (Chuck) Easttom II

Databases; Computer security; Network security

Paperback

Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute... [more]

$188.55  $169.70

We can order this in for you
How long will it take?
Add this item to my basket
Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications

Emmanuel Prouff

Network hardware; Algorithms & data structures; Software Engineering; Data encryption

Paperback

Constitutes the refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research... [more]

$194.95  $175.45

We can order this in for you
How long will it take?
Add this item to my basket
Digital Identity and Access Management: Technologies and Frameworks

Digital Identity and Access Management: Technologies and Frameworks

Raj Sharman, Sanjukta Das Smith, Manish Gupta

Computer security

Hardback

Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and... [more]

$404.30  $363.85

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.