Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,181 results

Big Data Analytics in Cybersecurity

978/149/877/9781498772129.jpg

Big Data Analytics in Cybersecurity

Onur Savas (Intelligent Automation, Inc., Rockville, Maryland, USA), Julia Deng (Intelligent Automation, Inc., Rockville, Maryland, USA)

Probability & statistics; Computer security; Network management

Hardback

Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate... [more]

$168.00

We can order this in for you
How long will it take?
Add this item to my basket
CRACK99: The Takedown of a $100 Million Chinese Software Pirate

978/039/335/9780393354331.jpg

CRACK99: The Takedown of a $100 Million Chinese Software Pirate

David Locke Hall

True crime; Computer security

Paperback

The inside story of the largest digital piracy sting to date. [more]

$24.95

We can order this in for you
How long will it take?
Add this item to my basket
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

978/111/939/9781119396215.jpg

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Roger A. Grimes

Computer fraud & hacking; Data encryption

Paperback

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of... [more]

$38.95

We can order this in for you
How long will it take?
Add this item to my basket
A History of Cyber Security Attacks: 1980 to Present

978/149/878/9781498785860.jpg

A History of Cyber Security Attacks: 1980 to Present

Bruce Middleton (Security Refuge LLC, Melbourne, Florida, USA)

Forensic science; Terrorism, armed struggle; Computer security

Hardback

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information... [more]

$86.99

We can order this in for you
How long will it take?
Add this item to my basket
Threat Level Red: Cybersecurity Research Programs of the U.S. Government

978/113/805/9781138052802.jpg

Threat Level Red: Cybersecurity Research Programs of the U.S. Government...

Michael Erbschloe

Peace studies & conflict resolution; Software Engineering; Computer security

Hardback

There is extensive government research on cyber security science, technology, and applications. Much of this research will... [more]

$118.00

We can order this in for you
How long will it take?
Add this item to my basket
Wireless Multimedia Communication Systems: Design, Analysis, and Implementation

978/113/807/9781138076143.jpg

Wireless Multimedia Communication Systems: Design, Analysis, and Implementation...

K. R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz

WAP (wireless) technology; Internet guides & online services; Computer security

Paperback

Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers,... [more]

$171.00

We can order this in for you
How long will it take?
Add this item to my basket
Multimedia Security: Watermarking, Steganography, and Forensics

978/113/807/9781138072541.jpg

Multimedia Security: Watermarking, Steganography, and Forensics

Frank Y. Shih (New Jersey Institute of Technology, Newark, NJ, USA)

Communications engineering & telecommunications; Computing: general; Computer security

Paperback

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and... [more]

$139.00

We can order this in for you
How long will it take?
Add this item to my basket
Principles of Information Security

978/133/710/9781337102063.jpg

Principles of Information Security

Michael Whitman (Michael J. Coles College of Business, Kennesaw State University), Herbert Mattord (Michael J. Coles College of Business, Kennesaw State University)

Data encryption

Paperback

Specifically oriented to the needs of information systems students, this book delivers the technology and developments from... [more]

$149.95

We can order this in for you
How long will it take?
Add this item to my basket
Content Management: Bridging the Gap Between Theory and Practice

978/113/863/9781138637245.jpg

Content Management: Bridging the Gap Between Theory and Practice

George Pullman, Gu Baotung

Database design & theory; Information retrieval; Computer security; Computer networking & communications

Paperback

A collection of articles that delves into the world of content management systems. [more]

$92.99

We can order this in for you
How long will it take?
Add this item to my basket
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

978/111/891/9781118918210.jpg

Wireshark for Security Professionals: Using Wireshark and the Metasploit...

Jessey Bullock, Jeff T. Parker, Jan Kadijk

Computer security; Network security

Paperback

Master Wireshark to solve real-world security problems If you don t already use Wireshark for a wide range of information... [more]

$86.95

We can order this in for you
How long will it take?
Add this item to my basket
Advanced Penetration Testing: Hacking the World's Most Secure Networks

978/111/936/9781119367680.jpg

Advanced Penetration Testing: Hacking the World's Most Secure Networks

Wil Allsopp

Computer security; Computer networking & communications

Paperback

Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

978/113/819/9781138197398.jpg

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional...

Eugene M Fredriksen

Computer security; Network management

Hardback

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience... [more]

$101.00

We can order this in for you
How long will it take?
Add this item to my basket
Noiseless Steganography: The Key to Covert Communications

978/113/819/9781138199361.jpg

Noiseless Steganography: The Key to Covert Communications

Abdelrahman Desoky

Data encryption

Paperback

Among the features that make Noiseless Steganography: The Key to Covert... [more]

$90.99

We can order this in for you
How long will it take?
Add this item to my basket
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption

978/069/114/9780691141756.jpg

The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital...

Joshua Holden

Coding theory & cryptology; Mathematics & Sciences; History of mathematics; Data encryption

Hardback

The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography - the science of sending... [more]

$69.99

We can order this in for you
How long will it take?
Add this item to my basket
How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

978/113/819/9781138197756.jpg

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive...

John J. Trinckes, Jr.

Medical administration & management; Privacy & data protection

Hardback

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual... [more]

$221.00

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Biometrics for Secure Human Authentication and Recognition

978/113/803/9781138033771.jpg

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku (Asansol Engineering College, Barddhaman, India), Phalguni Gupta, Jamuna Kanta Sing (Jadavpur University, Kolkata, India)

Electronics engineering; Automatic control engineering; Computer security

Paperback

Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns... [more]

$90.99

We can order this in for you
How long will it take?
Add this item to my basket
Fundamentals Of Information Systems Security

978/128/411/9781284116458.jpg

Fundamentals Of Information Systems Security

Michael G. Solomon, David Kim

Computer security; Network security

Paperback

Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers... [more]

$154.95

We can order this in for you
How long will it take?
Add this item to my basket
Biometrics in a Data Driven World: Trends, Technologies, and Challenges

978/149/873/9781498737647.jpg

Biometrics in a Data Driven World: Trends, Technologies, and Challenges...

Sinjini Mitra (California State University, Fullerton, California, USA), Mikhail Gofman (California State University, Fullerton, USA)

Automatic control engineering; Computer security; Artificial intelligence

Hardback

Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications... [more]

$192.00

We can order this in for you
How long will it take?
Add this item to my basket
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security

978/069/117/9780691176543.jpg

Understanding the Digital World: What You Need to Know about Computers,...

Brian W. Kernighan

Network programming; Computer security; Network security; Computer science

Hardback

Revised edition of: D is for digital. 2011. [more]

$54.99

We can order this in for you
How long will it take?
Add this item to my basket
Network and Data Security for Non-Engineers

978/149/876/9781498767866.jpg

Network and Data Security for Non-Engineers

Frank M. Groom (Ball State University, Muncie, Indiana, USA), Kevin Groom, Stephan S. Jones (Ball State University, Muncie, Indiana, USA)

Computer security; Network security

Paperback

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software,... [more]

$116.00

We can order this in for you
How long will it take?
Add this item to my basket
Terrorism Online: Politics, Law and Technology

no-image-available.jpg

Terrorism Online: Politics, Law and Technology

Lee Jarvis (University of East Anglia, UK), Stuart MacDonald (Swansea University, UK), Thomas M. Chen (City University London, UK)

Peace studies & conflict resolution; Terrorism, armed struggle; IT & Communications law; Computer security

Paperback

This book investigates the intersection of terrorism, digital technologies... [more]

$71.99

We can order this in for you
How long will it take?
Add this item to my basket
Psychosocial Dynamics of Cyber Security

978/184/872/9781848725669.jpg

Psychosocial Dynamics of Cyber Security

Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Julie A. Steinke

Occupational & industrial psychology; Internet & WWW industries; Computer security

Paperback

This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security... [more]

$103.00

We can order this in for you
How long will it take?
Add this item to my basket
Intercept: The Secret History of Computers and Spies

978/178/022/9781780227849.jpg

Intercept: The Secret History of Computers and Spies

Gordon Corera

History; History: specific events & topics; Espionage & secret services; Computer fraud & hacking

Paperback

From Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies: past, present... [more]

$24.99

We can order this in for you
How long will it take?
Add this item to my basket
Protecting Mobile Networks and Devices: Challenges and Solutions

978/149/873/9781498735834.jpg

Protecting Mobile Networks and Devices: Challenges and Solutions

Jianying Zhou, Weizhi Meng, Xiapu Luo, Jianying Zhou (Institute for Infocomm Research, Singapore)

WAP (wireless) technology; Computer security

Hardback

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks... [more]

$116.00

We can order this in for you
How long will it take?
Add this item to my basket
Your Right to Privacy: Minimize Your Digital Footprint

978/177/040/9781770402638.jpg

Your Right to Privacy: Minimize Your Digital Footprint

Jim Bronskill, Instructor School of Journalism and Communication David McKie (Carleton University)

Privacy law; Privacy & data protection; Network security; Law for the lay person

Paperback

Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your... [more]

$26.99

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.