Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,146 results

Circuits and Systems for Security and Privacy

978/148/223/9781482236880.jpg

Circuits and Systems for Security and Privacy

Farhana Sheikh (Portland, Oregon, USA), Leonel Sousa (Instituto Superior Tecnico, Universidade de Lisboa, Portugal)

Circuits & components; Computer security; Computer networking & communications

Hardback

Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in... [more]

$294.00

We can order this in for you
How long will it take?
Add this item to my basket
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

978/039/335/9780393352177.jpg

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your...

Bruce Schneier

Society & Social Sciences; Impact of science & technology on society; Ethical & social aspects of computing; Computer security

Paperback

Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded,... [more]

$27.95

We can order this in for you
How long will it take?
Add this item to my basket
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

978/149/872/9781498729642.jpg

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance...

Dhruba Kumar Bhattacharyya (Tezpur University, Assam, India), Jugal Kumar Kalita (University of Colorado, Colorado Springs, USA)

Mathematical logic; Software Engineering; Computer security

Hardback

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service... [more]

$158.00

We can order this in for you
How long will it take?
Add this item to my basket
Enterprise Level Security: Securing Information Systems in an Uncertain World

978/149/876/9781498764452.jpg

Enterprise Level Security: Securing Information Systems in an Uncertain...

William R. Simpson (Institute for Defense Analyses, Alexandria, Virginia, USA)

Computer security; Network security

Hardback

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress... [more]

$112.00

We can order this in for you
How long will it take?
Add this item to my basket
Handbook of SCADA/Control Systems Security

978/149/871/9781498717076.jpg

Handbook of SCADA/Control Systems Security

Robert Radvanovsky (CIPS, Infracritical, Geneva, Illinois, USA), Jacob Brodsky (Woodbine, Maryland, USA)

Security services; Automatic control engineering; Computer security

Hardback

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory... [more]

$192.00

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Policies, Procedures, and Standards: A Practitioner's Reference

978/148/224/9781482245899.jpg

Information Security Policies, Procedures, and Standards: A Practitioner's...

Douglas J. Landoll (Lantego, LLC, Austin, Texas, USA)

Security services; Computer security; Network management

Hardback

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop... [more]

$112.00

We can order this in for you
How long will it take?
Add this item to my basket
Big Data: Storage, Sharing, and Security

978/149/873/9781498734868.jpg

Big Data: Storage, Sharing, and Security

Fei Hu (University of Alabama, Tuscaloosa, USA)

Data mining; Computer security; Computer networking & communications

Hardback

Although there are already some books published on Big Data, most of them only cover basic concepts and society impacts and... [more]

$221.00

We can order this in for you
How long will it take?
Add this item to my basket
The Official (ISC)2 Guide to the CCSP CBK

978/111/927/9781119276722.jpg

The Official (ISC)2 Guide to the CCSP CBK

Adam Gordon

Privacy & data protection; Data encryption

Hardback

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to... [more]

$125.95

We can order this in for you
How long will it take?
Add this item to my basket
Security Awareness: Applying Practical Security in Your World

978/130/550/9781305500372.jpg

Security Awareness: Applying Practical Security in Your World

Mark D. Ciampa

Data encryption

Paperback

Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks,... [more]

$119.95

We can order this in for you
How long will it take?
Add this item to my basket
Sex and the Internet: A Guide Book for Clinicians

978/113/814/9781138140608.jpg

Sex and the Internet: A Guide Book for Clinicians

Al Cooper

Psychotherapy; Computer fraud & hacking; Sex & sexuality, sex manuals

Hardback

First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company. [more]

$231.00

We can order this in for you
How long will it take?
Add this item to my basket
Digital Rights Management: Protecting and Monetizing Content

978/113/814/9781138140561.jpg

Digital Rights Management: Protecting and Monetizing Content

Joan Van Tassel (PhD Associate Professor, National University)

Communications engineering & telecommunications; Data encryption

Hardback

Digital rights management (DRM) is a type of server software developed to enable secure distribution to disable illegal distribution... [more]

$231.00

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop

978/149/873/9781498734738.jpg

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop...

Peng Cheng, Heng Zhang, Jiming Chen

Power generation & distribution; Computer security; Computer networking & communications

Hardback

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on... [more]

$294.00

We can order this in for you
How long will it take?
Add this item to my basket
The Complete Guide to Cybersecurity Risks and Controls

978/149/874/9781498740548.jpg

The Complete Guide to Cybersecurity Risks and Controls

Anne Kohnke (Lawrence Technological University, Southfield, Michigan, USA), Dan Shoemaker (University of Detroit Mercy, Michigan, USA), Ken E. Sigler (Oakland Community College, Auburn Hills, Michigan, USA)

Computer security; Network management; Network security

Hardback

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication... [more]

$124.00

We can order this in for you
How long will it take?
Add this item to my basket
Operational Assessment of IT

978/149/873/9781498737685.jpg

Operational Assessment of IT

Steve Katzman

Computer security; Network management

Hardback

Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization's business processes... [more]

$112.00

We can order this in for you
How long will it take?
Add this item to my basket
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

978/149/872/9781498723183.jpg

Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and...

Fei Hu (The University of Alabama, Electrical and Computer Engineering, Tuscaloosa, USA)

Instruments & instrumentation engineering; WAP (wireless) technology; Computer security

Hardback

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted... [more]

$124.00

We can order this in for you
How long will it take?
Add this item to my basket
The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age

978/161/039/9781610394154.jpg

The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate...

Adam Segal

International relations; Privacy & data protection; Network security

Hardback

A leading expert in cyberspace policy shows how governments are waging war online-and the chilling implications for geopolitics,... [more]

$40.99

We can order this in for you
How long will it take?
Add this item to my basket
Security without Obscurity: A Guide to PKI Operations

978/149/870/9781498707473.jpg

Security without Obscurity: A Guide to PKI Operations

Jeff Stapleton, W. Clay Epstein

Data encryption

Hardback

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority... [more]

$112.00

We can order this in for you
How long will it take?
Add this item to my basket
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

978/149/873/9781498739962.jpg

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity...

Dan Shoemaker (International Cyber Security Education Coalition/MCISSE, Belleville, Michigan, USA), Anne Kohnke (Lawrence Technological University, Southfield, Michigan, USA), Ken Sigler (Oakland Community College, Auburn Hills, Michigan, USA)

Security services; Computer security; Network management

Hardback

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive... [more]

$145.00

We can order this in for you
How long will it take?
Add this item to my basket
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285

978/111/915/9781119155034.jpg

SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System...

Todd Lammle, Alex Tatistcheff, John Gay

Privacy & data protection; Network security

Paperback

Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire... [more]

$109.95

We can order this in for you
How long will it take?
Add this item to my basket
Securing an IT Organization through Governance, Risk Management, and Audit

978/149/873/9781498737319.jpg

Securing an IT Organization through Governance, Risk Management, and Audit...

Ken E. Sigler, James L. Rainey, III

Management of specific areas; Accounting software; Computer security; Network management

Hardback

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been... [more]

$124.00

We can order this in for you
How long will it take?
Add this item to my basket
The Cognitive Early Warning Predictive System Using the Smart Vaccine: The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure

978/149/872/9781498726511.jpg

The Cognitive Early Warning Predictive System Using the Smart Vaccine: The...

Rocky Termanini

Software Engineering; Computer security

Hardback

Here's an interesting revelation ... during the plague of Athens in 430 BC, the Greeks realized that people who had previously... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries

978/161/039/9781610395731.jpg

The Red Web: The Struggle Between Russia's Digital Dictators and the New...

Andrei Soldatov, Irina Borogan

European history; Computer security

Hardback

This incisive investigation into the Kremlin's massive online surveillance state and the activists and rebels trying to take... [more]

$40.99

We can order this in for you
How long will it take?
Add this item to my basket
Anti-Spam Techniques Based on Artificial Immune System

978/149/872/9781498725187.jpg

Anti-Spam Techniques Based on Artificial Immune System

Ying Tan (Peking University, China)

Spam; Electronic mail (email): professional

Hardback

Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere... [more]

$263.00

We can order this in for you
How long will it take?
Add this item to my basket
Honeypots and Routers: Collecting Internet Attacks

978/149/870/9781498702195.jpg

Honeypots and Routers: Collecting Internet Attacks

Mohssen Mohammed (Al-Imam Muhammad Ibn Saud University, Saudi Arabia), Habib-ur Rehman (Al-Imam Muhammad Ibn Saud University, Saudi Arabia)

Computer security; Computer networking & communications

Hardback

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking... [more]

$118.00

We can order this in for you
How long will it take?
Add this item to my basket
Mathematical Foundations of Public Key Cryptography

978/149/870/9781498702232.jpg

Mathematical Foundations of Public Key Cryptography

Xiaoyun Wang, Guangwu Xu (University of Wisconsin-Milwaukee, USA), Mingqiang Wang, Xianmeng Meng

Applied mathematics; Data encryption

Hardback

The authors present the results of more than 20 years of research and teaching experience to help students bridge the gap... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.