Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

2,575 results

Why CISOs Fail: The Missing Link in Security Management--and How to Fix It

978/113/856/9781138563162.jpg

Why CISOs Fail: The Missing Link in Security Management--and How to Fix...

Barak Engel

Computer security; Network management

Hardback

This book serves as an introduction into the world of security and provides insight into why and how current security management... [more]

$114.00

We can order this in for you
How long will it take?
Add this item to my basket
Big Data Analytics in Cybersecurity

978/149/877/9781498772129.jpg

Big Data Analytics in Cybersecurity

Onur Savas (Intelligent Automation, Inc., Rockville, Maryland, USA), Julia Deng (Intelligent Automation, Inc., Rockville, Maryland, USA)

Probability & statistics; Computer security; Network management

Hardback

Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate... [more]

$162.00

We can order this in for you
How long will it take?
Add this item to my basket
CRACK99: The Takedown of a $100 Million Chinese Software Pirate

978/039/335/9780393354331.jpg

CRACK99: The Takedown of a $100 Million Chinese Software Pirate

David Locke Hall

True crime; Computer security

Paperback

The inside story of the largest digital piracy sting to date. [more]

$24.95

We can order this in for you
How long will it take?
Add this item to my basket
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

978/111/939/9781119396215.jpg

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Roger A. Grimes

Computer fraud & hacking; Data encryption

Paperback

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of... [more]

$38.95

We can order this in for you
How long will it take?
Add this item to my basket
A History of Cyber Security Attacks: 1980 to Present

978/149/878/9781498785860.jpg

A History of Cyber Security Attacks: 1980 to Present

Bruce Middleton (Security Refuge LLC, Melbourne, Florida, USA)

Forensic science; Terrorism, armed struggle; Computer security

Hardback

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information... [more]

$81.99

We can order this in for you
How long will it take?
Add this item to my basket
Threat Level Red: Cybersecurity Research Programs of the U.S. Government

978/113/805/9781138052802.jpg

Threat Level Red: Cybersecurity Research Programs of the U.S. Government...

Michael Erbschloe

Peace studies & conflict resolution; Software Engineering; Computer security

Hardback

There is extensive government research on cyber security science, technology, and applications. Much of this research will... [more]

$114.00

We can order this in for you
How long will it take?
Add this item to my basket
Multimedia Security: Watermarking, Steganography, and Forensics

978/113/807/9781138072541.jpg

Multimedia Security: Watermarking, Steganography, and Forensics

Frank Y. Shih (New Jersey Institute of Technology, Newark, NJ, USA)

Communications engineering & telecommunications; Computing: general; Computer security

Paperback

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and... [more]

$133.00

We can order this in for you
How long will it take?
Add this item to my basket
Content Management: Bridging the Gap Between Theory and Practice

978/113/863/9781138637245.jpg

Content Management: Bridging the Gap Between Theory and Practice

George Pullman, Gu Baotung

Database design & theory; Information retrieval; Computer security; Computer networking & communications

Paperback

A collection of articles that delves into the world of content management systems. [more]

$88.99

We can order this in for you
How long will it take?
Add this item to my basket
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

978/111/891/9781118918210.jpg

Wireshark for Security Professionals: Using Wireshark and the Metasploit...

Jessey Bullock, Jeff T. Parker, Jan Kadijk

Computer security; Network security

Paperback

Master Wireshark to solve real-world security problems If you don t already use Wireshark for a wide range of information... [more]

$86.95

We can order this in for you
How long will it take?
Add this item to my basket
Advanced Penetration Testing: Hacking the World's Most Secure Networks

978/111/936/9781119367680.jpg

Advanced Penetration Testing: Hacking the World's Most Secure Networks

Wil Allsopp

Computer security; Computer networking & communications

Paperback

Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

978/113/819/9781138197398.jpg

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional...

Eugene M Fredriksen

Computer security; Network management

Hardback

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience... [more]

$96.99

We can order this in for you
How long will it take?
Add this item to my basket
How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

978/113/819/9781138197756.jpg

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive...

John J. Trinckes, Jr.

Medical administration & management; Privacy & data protection

Hardback

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual... [more]

$208.00

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Biometrics for Secure Human Authentication and Recognition

978/113/803/9781138033771.jpg

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku (Asansol Engineering College, Barddhaman, India), Phalguni Gupta, Jamuna Kanta Sing (Jadavpur University, Kolkata, India)

Electronics engineering; Automatic control engineering; Computer security

Paperback

Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns... [more]

$86.99

We can order this in for you
How long will it take?
Add this item to my basket
Obfuscation: A User's Guide for Privacy and Protest

978/026/252/9780262529860.jpg

Obfuscation: A User's Guide for Privacy and Protest

Finn Brunton, Helen Nissenbaum

Society & Social Sciences; Privacy & data protection; Data encryption; Network security

Paperback

How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less-and why we... [more]

$32.99

We can order this in for you
How long will it take?
Add this item to my basket
Biometrics in a Data Driven World: Trends, Technologies, and Challenges

978/149/873/9781498737647.jpg

Biometrics in a Data Driven World: Trends, Technologies, and Challenges...

Sinjini Mitra (California State University, Fullerton, California, USA), Mikhail Gofman (California State University, Fullerton, USA)

Automatic control engineering; Computer security; Artificial intelligence

Hardback

Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications... [more]

$181.00

We can order this in for you
How long will it take?
Add this item to my basket
Network and Data Security for Non-Engineers

978/149/876/9781498767866.jpg

Network and Data Security for Non-Engineers

Frank M. Groom (Ball State University, Muncie, Indiana, USA), Kevin Groom, Stephan S. Jones (Ball State University, Muncie, Indiana, USA)

Computer security; Network security

Paperback

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software,... [more]

$110.00

We can order this in for you
How long will it take?
Add this item to my basket
Terrorism Online: Politics, Law and Technology

no-image-available.jpg

Terrorism Online: Politics, Law and Technology

Thomas M. Chen, Stuart Macdonald, Thomas M. Chen

Peace studies & conflict resolution; Terrorism, armed struggle; IT & Communications law; Computer security

Paperback

This book investigates the intersection of terrorism, digital technologies... [more]

$69.99

We can order this in for you
How long will it take?
Add this item to my basket
Psychosocial Dynamics of Cyber Security

978/184/872/9781848725669.jpg

Psychosocial Dynamics of Cyber Security

Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Julie A. Steinke

Occupational & industrial psychology; Internet & WWW industries; Computer security

Paperback

This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security... [more]

$96.99

We can order this in for you
How long will it take?
Add this item to my basket
Your Right to Privacy: Minimize Your Digital Footprint

978/177/040/9781770402638.jpg

Your Right to Privacy: Minimize Your Digital Footprint

Jim Bronskill, Instructor School of Journalism and Communication David McKie (Carleton University)

Privacy law; Privacy & data protection; Network security; Law for the lay person

Paperback

Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your... [more]

$24.99

We can order this in for you
How long will it take?
Add this item to my basket
Cyberphobia: Identity, Trust, Security and the Internet

978/140/885/9781408850152.jpg

Cyberphobia: Identity, Trust, Security and the Internet

Edward Lucas

Digital lifestyle; Computer security

Paperback

A sobering and insightful book on the dangers of cybercrime and its potentially catastrophic consequences. [more]

$20.99

We can order this in for you
How long will it take?
Add this item to my basket
Security in the Private Cloud

978/148/225/9781482259551.jpg

Security in the Private Cloud

John R. Vacca (TechWrite, Pomeroy, Ohio, USA)

Internet guides & online services; Computer security

Hardback

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise... [more]

$181.00

We can order this in for you
How long will it take?
Add this item to my basket
Data Privacy: Principles and Practice

978/149/872/9781498721042.jpg

Data Privacy: Principles and Practice

Nataraj Venkataramanan (Global Operations Director, Technology Solutions Group, HCL Technologies Ltd, INDIA), Ashwin Shriram (Senior Technical Manager, HCL technologies, Bangalore, INDIA)

Privacy & data protection

Hardback

The book covers data privacy in depth with respect to data mining, test data management, synthetic data generation etc. It... [more]

$196.00

We can order this in for you
How long will it take?
Add this item to my basket
Cloud Computing Security: Foundations and Challenges

978/148/226/9781482260946.jpg

Cloud Computing Security: Foundations and Challenges

John R. Vacca (TechWrite, Pomeroy, Ohio, USA)

Computer security

Hardback

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical... [more]

$181.00

We can order this in for you
How long will it take?
Add this item to my basket
Psychosocial Dynamics of Cyber Security

978/184/872/9781848725652.jpg

Psychosocial Dynamics of Cyber Security

Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Julie A. Steinke

Occupational & industrial psychology; Internet & WWW industries; Computer security

Hardback

This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security... [more]

$315.00

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Certificateless Cryptography

978/148/224/9781482248609.jpg

Introduction to Certificateless Cryptography

Hu Xiong (University of Electronic Science and Technology of China), Zhen Qin (University of Electronic Science and Technology of China, Chengdu, Sichuan, People's Republic of China), Athanasios V. Vasilakos (Lulea University of Technology, Sweden)

Applied mathematics; Data encryption

Hardback

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management... [more]

$129.00

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.