Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,791 results

Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

978/331/922/9783319224244.jpg

Advances in Information and Computer Security: 10th International Workshop...

Keisuke Tanaka, Yuji Suga

Discrete mathematics; Network hardware; Algorithms & data structures; Data encryption

Paperback

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Convergent Media and Privacy

978/113/730/9781137306869.jpg

Convergent Media and Privacy

Timothy Dwyer

Media studies; Privacy & data protection

Hardback

A lot of personal data is being collected and stored as we use our media devices for business and pleasure in mobile and online... [more]

$238.95  $215.05

We can order this in for you
How long will it take?
Add this item to my basket
Bitcoin Payments: Implementing Secure Crypto Transactions

978/111/896/9781118968024.jpg

Bitcoin Payments: Implementing Secure Crypto Transactions

Slava Gomzin

Finance; Computer security

Paperback

The practical guide to implementing Bitcoin and other alt currencies in your business<p>Bitcoin Payments, Implementing Secure... [more]

$128.95  $116.05

Forthcoming
Pre-Order now
Add this item to my basket
The Hacker Playbook 2: Practical Guide to Penetration Testing

978/151/221/9781512214567.jpg

The Hacker Playbook 2: Practical Guide to Penetration Testing

Peter Kim

Computer programming & software development; Computer security

Paperback

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security... [more]

$79.95  $71.95

We can order this in for you
How long will it take?
Add this item to my basket
Physical and Data-Link Security Techniques for Future Communication Systems

978/331/923/9783319236087.jpg

Physical and Data-Link Security Techniques for Future Communication Systems...

Marco Baldi, Stefano Tomasin

Communications engineering & telecommunications; Database design & theory; Computer security

Hardback

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order... [more]

$515.70  $464.15

We can order this in for you
How long will it take?
Add this item to my basket
Dark Mirror: Edward Snowden and the American Surveillance State

978/073/528/9780735285323.jpg

Dark Mirror: Edward Snowden and the American Surveillance State

Barton Gellman

Biography: historical, political & military; Central government; Espionage & secret services; Computer security

Audio

<b>From the three-time Pulitzer Prize-winning author of the <i>New York Times</i> bestseller <i>Angler</i>, who unearthed... [more]

$80.95  $72.85

We can order this in for you
How long will it take?
Add this item to my basket
IP Cores Design from Specifications to Production: Modeling, Verification, Optimization, and Protection

978/331/922/9783319220345.jpg

IP Cores Design from Specifications to Production: Modeling, Verification,...

Khaled Salah Mohamed

Electronics engineering; Computer security; Computer architecture & logic design

Hardback

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification,... [more]

$208.55  $187.70

We can order this in for you
How long will it take?
Add this item to my basket
Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler Web Debugger

978/151/157/9781511572903.jpg

Debugging with Fiddler: The Complete Reference from the Creator of the Fiddler...

Eric Lawrence

Software Engineering; Computer viruses, Trojans & worms

Paperback

Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers,... [more]

$66.20  $59.60

We can order this in for you
How long will it take?
Add this item to my basket
The Tao of Open Source Intelligence

978/184/928/9781849287289.jpg

The Tao of Open Source Intelligence

Stewart K. Bertram

Computer security

Paperback

OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for... [more]

$119.45  $107.50

We can order this in for you
How long will it take?
Add this item to my basket
Hacking Exposed Wireless: Wireless Security Secrets and Solutions

978/007/182/9780071827638.jpg

Hacking Exposed Wireless: Wireless Security Secrets and Solutions

Joshua Wright, Johnny Cache

Computer security; Computer networking & communications

Paperback

Featuring the proven Hacking Exposed method, this new edition of this bestseller reveals how to defend against the latest... [more]

$108.95  $98.05

We can order this in for you
How long will it take?
Add this item to my basket
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

978/147/894/9781478945567.jpg

The Art of Invisibility: The World's Most Famous Hacker Teaches You How...

Kevin Mitnick

Ethical & social aspects of computing; Privacy & data protection; Network security

Audio

Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in... [more]

$64.95  $58.45

We can order this in for you
How long will it take?
Add this item to my basket
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

978/151/591/9781515916949.jpg

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

Gabriella Coleman

Anarchism; Pressure groups & lobbying; Computer fraud & hacking

Audio

Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name... [more]

$77.95  $70.15

We can order this in for you
How long will it take?
Add this item to my basket
Protecting Privacy in Data Release

978/331/916/9783319161082.jpg

Protecting Privacy in Data Release

Giovanni Livraga

Privacy & data protection

Hardback

Protecting Privacy in Data Release [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014 : Revised Selected Papers

978/331/915/9783319150864.jpg

Information Security Applications: 15th International Workshop, WISA 2014,...

Kyung-Hyune Rhee, Jeong Hyun Yi, Kyung-Hyune Rhee

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Dark Territory: The Secret History of Cyber War

no-image-available.jpg

Dark Territory: The Secret History of Cyber War

Fred Kaplan (CUNY Graduate Center)

History of the Americas; Military history; Terrorism, armed struggle; Military engineering; Computer viruses, Trojans & worms

Pre-recorded MP3 player

Previously released by Blackstone Audio, Inc. A2016. [more]

$169.95  $152.95

We can order this in for you
How long will it take?
Add this item to my basket
Cloud-Centric Cybersecurity and Critical Infrastructure Protection

no-image-available.jpg

Cloud-Centric Cybersecurity and Critical Infrastructure Protection

Joe B. Wilson

Data encryption

Hardback

The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection and simulation... [more]

$210.55  $189.50

Forthcoming
Pre-Order now
Add this item to my basket
Personal Mobile Devices in the Enterprise: Security and Privacy Concerns

978/146/659/9781466593084.jpg

Personal Mobile Devices in the Enterprise: Security and Privacy Concerns...

Lawrence Gerard Dobranski

PDA & Handheld programming; Computer security; Network management

Hardback

Leaders of many public and private organizations face increased pressure to allow the use of personal mobile devices in their... [more]

$214.95  $193.45

Forthcoming
Pre-Order now
Add this item to my basket
Cyber Warfare: A Reference Handbook

978/161/069/9781610694438.jpg

Cyber Warfare: A Reference Handbook

Paul J. Springer

Military tactics; Computer security

Hardback

This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to... [more]

$177.95  $160.15

We can order this in for you
How long will it take?
Add this item to my basket
Usable Security: History, Themes, and Challenges

978/162/705/9781627055291.jpg

Usable Security: History, Themes, and Challenges

Simson Garfinkel, Heather Richter Lipford

Computer security

Paperback

There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer... [more]

$88.55  $79.70

We can order this in for you
How long will it take?
Add this item to my basket
Developing Secure Applications

978/143/025/9781430258759.jpg

Developing Secure Applications

Nishant Das Patnaik

Computer security

Paperback

Developing Secure Applications is targeted towards all developers and security programmers. Mobile apps, website applications,... [more]

$109.45  $98.50

We can order this in for you
How long will it take?
Add this item to my basket
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings

978/331/912/9783319120591.jpg

Security, Privacy, and Applied Cryptography Engineering: 4th International...

Rajat Subhra Chakraborty, Vaclav Vashek Matyas, Patrick R. Schaumont

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography... [more]

$172.65  $155.40

We can order this in for you
How long will it take?
Add this item to my basket
Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident Responder

978/150/073/9781500734756.jpg

Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident...

Don Murdoch Gse

Computer security

Paperback

BTHb: INRE - Version 2.2 now available. The Blue Team Handbook is a zero fluff reference guide for cyber security incident... [more]

$44.15  $39.75

We can order this in for you
How long will it take?
Add this item to my basket
Securing the Cloud: Security Strategies for the Ubiquitous Data Center

no-image-available.jpg

Securing the Cloud: Security Strategies for the Ubiquitous Data Center

Curtis Franklin, Jr., Brian Chee

Computer security; Network security

Hardback

A must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional... [more]

$242.95  $218.65

We can order this in for you
How long will it take?
Add this item to my basket
Mastering Kali Linux for Advanced Penetration Testing

978/178/216/9781782163121.jpg

Mastering Kali Linux for Advanced Penetration Testing

Robert W. Beggs

Computer security

Paperback

This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to... [more]

$143.75  $129.40

We can order this in for you
How long will it take?
Add this item to my basket
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference

978/143/026/9781430264064.jpg

Disaster Recovery, Crisis Response, and Business Continuity: A Management...

Jamie Watters, Janet Watters

Computer security

Paperback

You're in charge of IT, facilities, or core operations for your organization when a hurricane or a fast-moving wildfire hits.... [more]

$115.95  $104.35

We can order this in for you
How long will it take?
Add this item to my basket
Your cart does not contain any items.