Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,142 results

Network Attacks and Defenses: A Hands-on Approach

978/113/837/9781138374713.jpg

Network Attacks and Defenses: A Hands-on Approach

Zouheir Trabelsi (United Arabs Emirates University, Al-Ain), Kadhim Hayawi (University of Waterloo, Ontario, Canada), Arwa Al Braiki (United Arabs Emirates University, Al-Ain), Sujith Samuel Mathew (University of Adelaide, Australia)

Computer security

Paperback

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how... [more]

$108.00

We can order this in for you
How long will it take?
Add this item to my basket
Managing Trust in Cyberspace

978/113/837/9781138374775.jpg

Managing Trust in Cyberspace

Sabu M. Thampi (Trivandrum, India), Bharat Bhargava (Purdue University, West Lafayette, Indiana, USA), Pradeep K. Atrey

Mathematical logic; Computer security; Computer networking & communications

Paperback

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents'... [more]

$108.00

We can order this in for you
How long will it take?
Add this item to my basket
Conducting Network Penetration and Espionage in a Global Environment

978/113/837/9781138374911.jpg

Conducting Network Penetration and Espionage in a Global Environment

Bruce Middleton (Security Refuge LLC, Melbourne, Florida, USA)

Peace studies & conflict resolution; Forensic science; Computer security

Paperback

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer... [more]

$108.00

We can order this in for you
How long will it take?
Add this item to my basket
Multilevel Security for Relational Databases

978/113/837/9781138374904.jpg

Multilevel Security for Relational Databases

Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie (Menoufia University, Egypt), Ahmed I. Sallam, Hala S. El-Sayed

Software Engineering; Databases; Computer security

Paperback

Since databases are the primary repositories of information for today's organizations and governments, database security has... [more]

$108.00

We can order this in for you
How long will it take?
Add this item to my basket
Security for Software Engineers

978/113/858/9781138583825.jpg

Security for Software Engineers

James N. Helfrich (Brigham Young University, Idaho, USA)

Software Engineering; Computer fraud & hacking

Hardback

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students.... [more]

$114.00

We can order this in for you
How long will it take?
Add this item to my basket
The Identity Trade: Selling Privacy and Reputation Online

978/147/989/9781479895656.jpg

The Identity Trade: Selling Privacy and Reputation Online

Nora A. Draper

Media studies; Privacy & data protection

Hardback

The successes and failures of an industry that claims to protect and promote our online identities What does... [more]

$69.00

We can order this in for you
How long will it take?
Add this item to my basket
Software-Defined Networking and Security: From Theory to Practice

978/081/538/9780815381143.jpg

Software-Defined Networking and Security: From Theory to Practice

Dijiang Huang (Arizona State University, Tempe, USA), Ankur Chowdhary (Arizona State University), Sandeep Pisharody (Arizona State University)

Software Engineering; Computer security

Hardback

This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required... [more]

$202.00

We can order this in for you
How long will it take?
Add this item to my basket
Digital Image Watermarking: Theoretical and Computational Advances

978/113/839/9781138390638.jpg

Digital Image Watermarking: Theoretical and Computational Advances

Surekha Borra (K.S. Institute of Technology, Bangalore, INDIA), Rohit Thanki (C. U. Shah University, Wadhwan City, INDIA), Nilanjan Dey

Legal aspects of computing; Privacy & data protection; Image processing; Information visualisation

Hardback

The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers... [more]

$114.00

We can order this in for you
How long will it take?
Add this item to my basket
The Insider Threat: Assessment and Mitigation of Risks

978/149/874/9781498747080.jpg

The Insider Threat: Assessment and Mitigation of Risks

Eleanor E. Thompson

Security services; Computer security; Network management

Hardback

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

978/149/874/9781498740449.jpg

CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights...

Todd Fitzgerald (Grant Thornton International, Ltd., Oak Brook Terrace, Illinois, USA)

Security services; Computer security; Network management

Hardback

Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
Artificial Intelligence Safety and Security

978/081/536/9780815369820.jpg

Artificial Intelligence Safety and Security

Roman V. Yampolskiy (University of Louisville, Kentucky, USA)

Computer security; Artificial intelligence

Paperback

A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa... [more]

$98.99

We can order this in for you
How long will it take?
Add this item to my basket
Internet of Things Security: Challenges, Advances, and Analytics

978/113/831/9781138318632.jpg

Internet of Things Security: Challenges, Advances, and Analytics

Chintan Patel, Nishant Doshi

Privacy & data protection

Paperback

This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication... [more]

$114.00

We can order this in for you
How long will it take?
Add this item to my basket
Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

978/081/537/9780815371335.jpg

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives...

Brij B. Gupta (NIT Kurukshetra, Department of Computer Engineering, Kurukshetra, India)

Science: general issues; Operating systems; Computer security; Network management

Hardback

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers... [more]

$194.00

We can order this in for you
How long will it take?
Add this item to my basket
Solving Cyber Risk: Protecting Your Company and Society

978/111/949/9781119490937.jpg

Solving Cyber Risk: Protecting Your Company and Society

Andrew Coburn, Eireann Leverett, Gordon Woo

Data encryption

Hardback

The non-technical handbook for cyber security in the insurance industry Solving Cyber Risk distills a decade of research... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
The CIO's Guide to Information Security Incident Management

978/146/655/9781466558250.jpg

The CIO's Guide to Information Security Incident Management

Matthew William Arthur Pemble, Wendy Fiona Goucher

Computer security; Network management

Hardback

This book will help IT and business operations managers who have been tasked with addressing security issues. It provides... [more]

$114.00

We can order this in for you
How long will it take?
Add this item to my basket
The Science of Biometrics: Security Technology for Identity Verification

978/149/876/9781498761246.jpg

The Science of Biometrics: Security Technology for Identity Verification...

Ravindra Das (President, HTG Solutions, IL, USA)

Software Engineering; Computer security

Paperback

The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition,... [more]

$92.99

We can order this in for you
How long will it take?
Add this item to my basket
You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches

978/026/203/9780262038850.jpg

You'll see this message when it is too late: The Legal and Economic Aftermath...

Josephine Wolff (Assistant Professor of Cybersecurity Policy, Tufts University)

Legal aspects of computing; Computer security

Hardback

What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. [more]

$64.99

We can order this in for you
How long will it take?
Add this item to my basket
Hacking For Dummies

978/111/948/9781119485476.jpg

Hacking For Dummies

Kevin Beaver

Computer fraud & hacking

Paperback

Prevent Windows 10 , Linux , and macOS attacks; use the latest tools and techniques; develop a security testing plan --Cover.... [more]

$46.95

We can order this in for you
How long will it take?
Add this item to my basket
Digital Criminology: Crime and Justice in Digital Society

978/113/863/9781138636743.jpg

Digital Criminology: Crime and Justice in Digital Society

Anastasia Powell, Robin Cameron

Crime & criminology; Computer fraud & hacking

Paperback

The infusion of digital technology into contemporary society has had significant effects for everyday life and for everyday... [more]

$77.99

We can order this in for you
How long will it take?
Add this item to my basket
Deconstruction Machines: Writing in the Age of Cyberwar

978/151/790/9781517902520.jpg

Deconstruction Machines: Writing in the Age of Cyberwar

Justin Joque

Cybernetics & systems theory; Computer fraud & hacking

Paperback

Justin Joque explores the fundamental nature of cyberwar through a detailed investigation of the crisis points when cybersecurity... [more]

$39.99

We can order this in for you
How long will it take?
Add this item to my basket
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

978/111/948/9781119480587.jpg

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing...

Nick Furneaux

Coding theory & cryptology; Data encryption

Paperback

Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment... [more]

$93.95

We can order this in for you
How long will it take?
Add this item to my basket
Ethical Data and Information Management: Concepts, Tools and Methods

978/074/948/9780749482046.jpg

Ethical Data and Information Management: Concepts, Tools and Methods

Katherine O'Keefe, Daragh O'Brien

Library, archive & information management; Legal ethics & professional conduct; Data capture & analysis; Privacy & data protection

Paperback

Get a practical guide for information management professionals that provides a framework for applying ethical principles and... [more]

$99.00

We can order this in for you
How long will it take?
Add this item to my basket
Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness

978/148/225/9781482259780.jpg

Configuring Internal Controls for Software as a Service: Between Fragility...

Chong Ee (Trulia Inc., San Francisco, California, USA)

Computer security; Network security

Hardback

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
Internet of Things Security: Challenges, Advances, and Analytics

978/113/834/9781138341364.jpg

Internet of Things Security: Challenges, Advances, and Analytics

Chintan Patel, Nishant Doshi

Privacy & data protection

Hardback

This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication... [more]

$294.00

We can order this in for you
How long will it take?
Add this item to my basket
Management of Information Security

978/133/740/9781337405713.jpg

Management of Information Security

Michael Whitman (Michael J. Coles College of Business, Kennesaw State University), Herbert Mattord (Michael J. Coles College of Business, Kennesaw State University)

Data encryption

Paperback

Beginning with the foundational and technical components of information security, this title focuses on access control models,... [more]

$119.95

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.