Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,146 results

CRACK99: The Takedown of a $100 Million Chinese Software Pirate

978/039/324/9780393249545.jpg

CRACK99: The Takedown of a $100 Million Chinese Software Pirate

David Locke Hall

True crime; Computer security

Hardback

The inside story of the largest digital piracy sting to date. [more]

$41.95

We can order this in for you
How long will it take?
Add this item to my basket
Securing Cyber-Physical Systems

978/149/870/9781498700986.jpg

Securing Cyber-Physical Systems

Al-Sakib Khan Pathan (International Islamic University Malaysia, Kuala Lumpur)

WAP (wireless) technology; Internet guides & online services; Computer security

Hardback

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control.... [more]

$166.00

We can order this in for you
How long will it take?
Add this item to my basket
Handbook of Digital Forensics of Multimedia Data and Devices

978/111/864/9781118640500.jpg

Handbook of Digital Forensics of Multimedia Data and Devices

Anthony T. S. Ho, Shujun Li

Forensic science; Computer security

Hardback

Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and... [more]

$257.95

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Security: An Introduction for Non-Technical Managers

978/147/246/9781472466730.jpg

Cyber Security: An Introduction for Non-Technical Managers

Jeremy Swinfen Green

Management & management techniques; Computer security

Hardback

Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology.... [more]

$141.00

We can order this in for you
How long will it take?
Add this item to my basket
Spam Nation: The Inside Story of Organised Cybercrime - from Global Experience to Your Front Door

978/149/260/9781492603238.jpg

Spam Nation: The Inside Story of Organised Cybercrime - from Global Experience...

Brian Krebs

Society & Social Sciences; Crime & criminology; Computer security

Paperback

Now in paperback, an expose of the global cybercrime epidemic and its threat to consumers everywhere. [more]

$24.99

We can order this in for you
How long will it take?
Add this item to my basket
Business Continuity Planning: A Project Management Approach

978/148/225/9781482251784.jpg

Business Continuity Planning: A Project Management Approach

Ralph L. Kliem, Gregg D. Richie

Risk assessment; Project management; Natural disasters; Computer security

Hardback

If a major event such as a terrorist attack, 7.2 earthquake, tsunami, or hacker attack were to disrupt business operations,... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
Multilevel Modeling of Secure Systems in QoP-ML

978/148/220/9781482202557.jpg

Multilevel Modeling of Secure Systems in QoP-ML

Bogdan Ksiezopolski

Computer security

Hardback

In order to perform effective analysis of today's information security systems, numerous components must be taken into consideration.... [more]

$166.00

We can order this in for you
How long will it take?
Add this item to my basket
Getting an Information Security Job For Dummies

978/111/900/9781119002819.jpg

Getting an Information Security Job For Dummies

Peter H. Gregory, Peter H. Gregory

Computer security; Network security

Paperback

Get prepared for your Information Security job search!<br /><br />Do you... [more]

$46.95

We can order this in for you
How long will it take?
Add this item to my basket
Securing Systems: Applied Security Architecture and Threat Models

978/148/223/9781482233971.jpg

Securing Systems: Applied Security Architecture and Threat Models

Brook S. E. Schoenfield (Melusine Productions, Oakland, California, USA)

Privacy & data protection; Network management

Hardback

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected... [more]

$122.00

We can order this in for you
How long will it take?
Add this item to my basket
Official (ISC)2 (R) Guide to the CISSP (R)-ISSMP (R) CBK (R)

978/146/657/9781466578951.jpg

Official (ISC)2 (R) Guide to the CISSP (R)-ISSMP (R) CBK (R)

Joseph Steinberg, (ISC)^2 Corporate

Computer certification; Computer security

Hardback

Offers an overview of management topics related to information security. This resource promotes an understanding of Enterprise... [more]

$139.00

We can order this in for you
How long will it take?
Add this item to my basket
The Data Bank Society: Organizations, Computers and Social Freedom

978/041/572/9780415720977.jpg

The Data Bank Society: Organizations, Computers and Social Freedom

John Smith

Library & information sciences; Communication studies; Privacy & data protection

Paperback

This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the... [more]

$67.99

We can order this in for you
How long will it take?
Add this item to my basket
Corporate Security Intelligence and Strategic Decision Making

978/146/659/9781466592704.jpg

Corporate Security Intelligence and Strategic Decision Making

Justin Crump (CEO and Founder, Sibylline Ltd, London, UK)

Peace studies & conflict resolution; Business & management; Computer security

Hardback

Despite a clear and compelling need for an intelligence-led approach to security, operational, and reputational risks, the... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
Spam: A Shadow History of the Internet

978/026/252/9780262527576.jpg

Spam: A Shadow History of the Internet

Finn Brunton

Spam

Paperback

What spam is, how it works, and how it has shaped online communities and the Internet itself. [more]

$43.99

We can order this in for you
How long will it take?
Add this item to my basket
Group Theoretic Cryptography

978/158/488/9781584888369.jpg

Group Theoretic Cryptography

Maria Isabel Gonzalez Vasco, Spyros Magliveras, Rainer Steinwandt

Data encryption

Hardback

Group theoretic problems appear to be the most promising source of hard computational problems for deploying cryptographic... [more]

$166.00

We can order this in for you
How long will it take?
Add this item to my basket
Applied Cryptography: Protocols, Algorithms and Source Code in C

978/111/909/9781119096726.jpg

Applied Cryptography: Protocols, Algorithms and Source Code in C

Bruce Schneier

Data encryption

Hardback

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive... [more]

$109.95

We can order this in for you
How long will it take?
Add this item to my basket
CISSP Guide to Security Essentials

978/128/506/9781285060422.jpg

CISSP Guide to Security Essentials

Peter H. Gregory

Computer certification; Computer security

Paperback

Provides complete, focused coverage to prepare students and professionals alike for success on the Certified Information Systems... [more]

$144.95

We can order this in for you
How long will it take?
Add this item to my basket
Official (ISC)2 Guide to the CISSP CBK

978/148/226/9781482262759.jpg

Official (ISC)2 Guide to the CISSP CBK

Adam Gordon

Music; Computer security

Hardback

As a result of a rigorous, methodical process that (ISC)(2) follows to routinely update its credential exams, it has announced... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
Hands-On Ethical Hacking and Network Defense

978/128/545/9781285454610.jpg

Hands-On Ethical Hacking and Network Defense

Michael Simpson, Nicholas Antill, Kent Backman, James Corley

Privacy & data protection; Data encryption; Network security

Mixed media product

Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book... [more]

$204.95

We can order this in for you
How long will it take?
Add this item to my basket
Data Privacy for the Smart Grid

978/146/657/9781466573376.jpg

Data Privacy for the Smart Grid

Rebecca Herold, Christine Hertzog

Power generation & distribution; Privacy & data protection

Hardback

Many Smart Grid books include privacy in their title, but only touch on privacy, with most of the discussion focusing on... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
Multilevel Security for Relational Databases

978/148/220/9781482205398.jpg

Multilevel Security for Relational Databases

Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie (Menoufia University, Egypt), Ahmed I. Sallam, Hala S. El-Sayed

Relational databases; Computer security

Hardback

Since databases are the primary repositories of information for today's organizations and governments, database security has... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
Practical Cryptography: Algorithms and Implementations Using C++

978/148/222/9781482228892.jpg

Practical Cryptography: Algorithms and Implementations Using C++

Saiful Azad, Al-Sakib Khan Pathan

Data encryption

Hardback

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make... [more]

$118.00

We can order this in for you
How long will it take?
Add this item to my basket
Ethical Hacking and Penetration Testing Guide

978/148/223/9781482231618.jpg

Ethical Hacking and Penetration Testing Guide

Rafay Baloch

Criminal investigation & detection; Computer fraud & hacking

Paperback

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the... [more]

$105.00

We can order this in for you
How long will it take?
Add this item to my basket
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

978/111/882/9781118825099.jpg

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux,...

Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters

Computer security

Paperback

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing... [more]

$101.95

We can order this in for you
How long will it take?
Add this item to my basket
Android Malware and Analysis

978/148/225/9781482252194.jpg

Android Malware and Analysis

Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere

Software Engineering; Computer security

Hardback

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices... [more]

$105.00

We can order this in for you
How long will it take?
Add this item to my basket
The Practical Guide to HIPAA Privacy and Security Compliance

978/143/985/9781439855584.jpg

The Practical Guide to HIPAA Privacy and Security Compliance

Rebecca Herold (Rebecca Herold, LLC, Van Meter, Iowa, USA), Kevin Beaver (Principle Logic, Acworth, GA, USA)

Health systems & services; Computer security; Network management

Hardback

Offers a resource for HIPAA privacy and security advice that can be applied to various organizations' unique situation. This... [more]

$152.00

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.