Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

2,578 results

Honeypots: A New Paradigm to Information Security

978/157/808/9781578087082.jpg

Honeypots: A New Paradigm to Information Security

R. C. Joshi (Michigan Technological University, Houghton, USA, and IIT, Roorkee, India), Anjali Sardana (IIT, Roorkee, India)

Computer security; Systems analysis & design

Hardback

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses honeypots from a variety... [more]

$273.00

We can order this in for you
How long will it take?
Add this item to my basket
Secure Java: For Web Application Development

978/143/982/9781439823514.jpg

Secure Java: For Web Application Development

Abhay Bhargav, B. V. Kumar

Computer security

Paperback

As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware... [more]

$137.00

We can order this in for you
How long will it take?
Add this item to my basket
Retail Security and Loss Prevention Solutions

978/142/009/9781420090062.jpg

Retail Security and Loss Prevention Solutions

Alan Greggo (PROFITRx, Cincinnati, Ohio, USA), Millie Kresevich (Lakewood, Ohio, USA)

Management & management techniques; Computer security

Hardback

Provides an understanding of the fast-paced world of retail loss prevention, the day-to-day challenges retailers face, and... [more]

$150.00

We can order this in for you
How long will it take?
Add this item to my basket
Secure Semantic Service-Oriented Systems

978/142/007/9781420073317.jpg

Secure Semantic Service-Oriented Systems

Bhavani Thuraisingham (The University of Texas at Dallas, USA)

Computer security

Hardback

Presents an exploration of security issues for the SOA and web services. This book demonstrates the applications of these... [more]

$187.00

We can order this in for you
How long will it take?
Add this item to my basket
Official (ISC)2 Guide to the SSCP CBK

978/143/980/9781439804834.jpg

Official (ISC)2 Guide to the SSCP CBK

Harold F. Tipton (HFT Associates, Villa Park, California, USA), Kevin Henry

Computer certification; Computer security

Hardback

The (ISC)^2(R) Systems Security Certified Practitioner (SSCP(R)) certification is one of the most important credentials an... [more]

$133.00

We can order this in for you
How long will it take?
Add this item to my basket
Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques

978/143/980/9781439803653.jpg

Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques...

Francesco Bonchi (Yahoo! Research, Barcelona, Spain), Elena Ferrari (University of Insubria, Italy)

Databases; Data mining; Computer security

Hardback

Covers privacy and anonymity for data mining applications. This book presents novel application domains, such as data mining... [more]

$177.00

We can order this in for you
How long will it take?
Add this item to my basket
Casino Security and Gaming Surveillance

978/142/008/9781420087826.jpg

Casino Security and Gaming Surveillance

Derk J. Boss (Consultant, Newburgh, Indiana, USA), Alan W. Zajic (Security/GamingConsultant, Wadsworth, Nevada, USA)

Sport & leisure industries; Surveillance services; Computer security

Hardback

Offers gaming security professionals with the means to mitigate the myriad security threats facing the gaming world. Providing... [more]

$158.00

We can order this in for you
How long will it take?
Add this item to my basket
Security: An Introduction

978/142/009/9781420092837.jpg

Security: An Introduction

Philip P. Purpura

Domestic trade; Management & management techniques; Computer security

Hardback

An introduction to basic security principles that offers unusual methods of thinking about security challenges and solutions... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
Handbook of Financial Cryptography and Security

978/142/005/9781420059816.jpg

Handbook of Financial Cryptography and Security

Burton Rosenberg (University of Miami, Coral Gables, Florida, USA)

Finance; Data encryption

Hardback

Clarifies the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework... [more]

$242.00

We can order this in for you
How long will it take?
Add this item to my basket
Governance Networks in Public Administration and Public Policy

978/142/007/9781420071269.jpg

Governance Networks in Public Administration and Public Policy

Christopher Koliba, Jack W. Meek, Asim Zia, Russell Mills

Public administration; Computer security

Hardback

Highlighting the interplay between public actors and policy tools, this work provides a theoretical and empirical foundation... [more]

$143.00

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Management Handbook, Volume 4

978/143/981/9781439819029.jpg

Information Security Management Handbook, Volume 4

Harold F. Tipton, Micki Krause Nozaki

Computer security

Hardback

Updated annually, this handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required... [more]

$242.00

We can order this in for you
How long will it take?
Add this item to my basket
Secure and Resilient Software Development

978/143/982/9781439826966.jpg

Secure and Resilient Software Development

Mark S. Merkow (Technical Security Strategy, Scottsdale, Arizona, USA), Lakshmikanth Raghavan (PayPal, San Jose, California, USA)

Computer security

Hardback

Teaches you how to apply best practices and standards for consistent and secure software development. This title details specific... [more]

$150.00

We can order this in for you
How long will it take?
Add this item to my basket
Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings

978/143/982/9781439825129.jpg

Targeted Violence: A Statistical and Tactical Analysis of Assassinations,...

Glenn P. McGovern (Santa Clara County District Attorney's Office, Bureau of Investigation, San Jose, California, USA)

Crime & criminology; Forensic science; Security services; Criminal law & procedure; Computer security

Hardback

Examines incidents of targeted violence, including contract killings, assassinations, and planned kidnappings. This book analyzes... [more]

$177.00

We can order this in for you
How long will it take?
Add this item to my basket
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

978/143/982/9781439821190.jpg

Defense against the Black Arts: How Hackers Do What They Do and How to Protect...

Jesse Varsalone (Elkridge, Maryland, USA), Matthew McFadden (Towson, Maryland, USA)

Production & quality control management; Computer fraud & hacking; Computer networking & communications

Other merchandise

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It [more]

$118.00

We can order this in for you
How long will it take?
Add this item to my basket
Intelligent Video Surveillance: Systems and Technology

978/143/981/9781439813287.jpg

Intelligent Video Surveillance: Systems and Technology

Yunqian Ma, Gang Qian (Arizona State University, Tempe, USA)

Imaging systems & technology; Computer security

Hardback

From streets in London to subway stations in New York City, hundreds of thousands of surveillance cameras are constantly collecting... [more]

$231.00

We can order this in for you
How long will it take?
Add this item to my basket
The Executive MBA in Information Security

978/143/981/9781439810071.jpg

The Executive MBA in Information Security

John J. Trinckes, Jr.

Management & management techniques; Computer security; Network management

Hardback

Supplying a complete overview of the concepts executives need to know, this book provides the tools needed to ensure your... [more]

$133.00

We can order this in for you
How long will it take?
Add this item to my basket
Vulnerability Management

978/143/980/9781439801505.jpg

Vulnerability Management

Park Foreman (GroupM, New York, USA)

Computer security

Hardback

Providing a fundamental understanding of technology risks from an interloper's perspective, this work offers the guidance... [more]

$150.00

We can order this in for you
How long will it take?
Add this item to my basket
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions

978/143/980/9781439804674.jpg

Managing Security Overseas: Protecting Employees and Assets in Volatile...

Scott Alan Ast (Metro Wastewater Reclamation District, Denver, Colorado, USA)

International business; Management & management techniques; Computer security

Hardback

Details the recommended protocol for protecting people and assets in hostile global settings. This work offers the fundamental... [more]

$160.00

We can order this in for you
How long will it take?
Add this item to my basket
Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

978/143/980/9781439809068.jpg

Security Manager's Guide to Disasters: Managing Through Emergencies, Violence,...

Anthony D. Manley (Wantagh, New York, USA)

Computer security

Hardback

Whether the cause of a disaster is a terrorist or criminal attack, fire emergency, civil or geographic disruption, or major... [more]

$202.00

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Management Handbook, Volume 3

978/142/009/9781420090925.jpg

Information Security Management Handbook, Volume 3

Harold F. Tipton (HFT Associates, Villa Park, California, USA), Micki Krause (Pacific Life Insurance Company, Newport Beach, California, USA)

Computer security

Hardback

Includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals... [more]

$196.00

We can order this in for you
How long will it take?
Add this item to my basket
Algorithmic Cryptanalysis

978/142/007/9781420070026.jpg

Algorithmic Cryptanalysis

Antoine Joux (Universite de Versailles Saint-Quentin-en-Yvelines, France)

Data encryption

Hardback

Illustrating the power of algorithms, this book describes algorithmic methods with cryptographically relevant examples. Focusing... [more]

$164.00

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Fraud: Tactics, Techniques and Procedures

978/142/009/9781420091274.jpg

Cyber Fraud: Tactics, Techniques and Procedures

Rick Howard (Verisign iDefense Security Intelligence Services, Dulles, Virginia, USA)

Computer fraud & hacking

Hardback

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors... [more]

$147.00

We can order this in for you
How long will it take?
Add this item to my basket
Understanding and Applying Cryptography and Data Security

978/142/006/9781420061604.jpg

Understanding and Applying Cryptography and Data Security

Adam J. Elbirt (The Charles Stark Draper Laboratory, Cambridge, Massachusetts, USA)

Data encryption

Hardback

A how-to guide for implementing algorithms and protocols. Addressing real-world implementation issues, it emphasizes cryptographic... [more]

$139.00

We can order this in for you
How long will it take?
Add this item to my basket
Computer Misuse: Response, Regulation and the Law

978/184/392/9781843923800.jpg

Computer Misuse: Response, Regulation and the Law

Stefan Fafinski (Brunel University, UK)

Corporate crime; IT & Communications law; Privacy & data protection

Hardback

Discusses the nature of computer misuse and the legal and non-legal responses to it. This book explores what is meant by the... [more]

$187.00

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

978/142/005/9781420052855.jpg

Information Security Management Metrics: A Definitive Guide to Effective...

W. Krag Brotby, CISM

Business mathematics & systems; Data encryption

Hardback

Offers an approach to developing and implementing relevant security metrics essential for effective security management. This... [more]

$147.00

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.