Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

1,136 results

Information Security and IT Risk Management

978/111/833/9781118335895.jpg

Information Security and IT Risk Management

Manish Agrawal, Alex Campoe, Eric Pierce

Computer security

Paperback

* Integrates a unifying theme throughout the book - 'efficiency of network resource utilization' to reinforce strategic organizational... [more]

$277.95

We can order this in for you
How long will it take?
Add this item to my basket
The Browser Hacker's Handbook

978/111/866/9781118662090.jpg

The Browser Hacker's Handbook

Wade Alcorn, Christian Frichot, Michele Orru

Computer fraud & hacking

Paperback

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical... [more]

$86.95

We can order this in for you
How long will it take?
Add this item to my basket
Threat Modeling: Designing for Security

978/111/880/9781118809990.jpg

Threat Modeling: Designing for Security

Adam Shostack

Computer security

Paperback

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied... [more]

$93.95

We can order this in for you
How long will it take?
Add this item to my basket
Data-Driven Security: Analysis, Visualization and Dashboards

978/111/879/9781118793725.jpg

Data-Driven Security: Analysis, Visualization and Dashboards

Jay Jacobs, Bob Rudis

Computer security; Network security

Paperback

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity

978/146/659/9781466592148.jpg

Security without Obscurity: A Guide to Confidentiality, Authentication,...

J. J. Stapleton

Computer security; Network management

Hardback

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability;... [more]

$164.00

We can order this in for you
How long will it take?
Add this item to my basket
Conducting Network Penetration and Espionage in a Global Environment

978/148/220/9781482206470.jpg

Conducting Network Penetration and Espionage in a Global Environment

Bruce Middleton (Security Refuge LLC, Melbourne, Florida, USA)

Forensic science; Security services; Computer security

Hardback

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer... [more]

$129.00

We can order this in for you
How long will it take?
Add this item to my basket
Cybersecurity and Cyberwar: What Everyone Needs to Know (R)

978/019/991/9780199918096.jpg

Cybersecurity and Cyberwar: What Everyone Needs to Know (R)

Peter W. Singer (Senior Fellow, Brookings Institution), Allan Friedman (fellow in Governance Studies, and Research Director of the Center for Technology Innovation, Brookings Institution)

Media, information & communication industries; Computing: general; Computer fraud & hacking

Hardback

In Cybersecurity and CyberWar: What Everyone Needs to Know, New York Times best-selling author P. W. Singer and noted cyber... [more]

$134.95

We can order this in for you
How long will it take?
Add this item to my basket
What Every Engineer Should Know About Cyber Security and Digital Forensics

978/146/656/9781466564527.jpg

What Every Engineer Should Know About Cyber Security and Digital Forensics...

Joanna F. DeFranco (The Pennsylvania State University, Malvern, USA)

Engineering: general; Computer security

Paperback

Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers... [more]

$105.00

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Fundamentals

978/143/981/9781439810620.jpg

Information Security Fundamentals

Thomas R. Peltier

Domestic trade; Computer security; Network security

Paperback

Examines the elements of computer security, employee roles and responsibilities, and common threats. This book presents a... [more]

$120.00

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Crime & Warfare: All That Matters

978/144/418/9781444189988.jpg

Cyber Crime & Warfare: All That Matters

Peter Warren, Michael Streeter

True crime; Computer fraud & hacking

Paperback

All That Matters about cyber crime and warfare. All That Matters books are a fast way to get right to the heart of key issues.... [more]

$20.99

We can order this in for you
How long will it take?
Add this item to my basket
Software Test Attacks to Break Mobile and Embedded Devices

978/146/657/9781466575301.jpg

Software Test Attacks to Break Mobile and Embedded Devices

Jon Duncan Hagar

Embedded systems; Software testing & verification; Computer security

Paperback

Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded... [more]

$105.00

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Biometrics for Secure Human Authentication and Recognition

978/146/658/9781466582422.jpg

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku (Asansol Engineering College, Barddhaman, India), Phalguni Gupta, Jamuna Kanta Sing (Jadavpur University, Kolkata, India)

Electronics engineering; Computer security

Hardback

Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns... [more]

$242.00

We can order this in for you
How long will it take?
Add this item to my basket
Carry On: Sound Advice from Schneier on Security

978/111/879/9781118790816.jpg

Carry On: Sound Advice from Schneier on Security

Bruce Schneier

Security services; Computer security; Network security

Hardback

Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority... [more]

$46.95

We can order this in for you
How long will it take?
Add this item to my basket
The CRC Press Terrorism Reader

978/146/658/9781466588325.jpg

The CRC Press Terrorism Reader

Marie-Helen Maras

Crime & criminology; Terrorism, armed struggle; Computer security

Hardback

The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive... [more]

$79.99

We can order this in for you
How long will it take?
Add this item to my basket
Unauthorized Access: The Crisis in Online Privacy and Security

978/143/983/9781439830130.jpg

Unauthorized Access: The Crisis in Online Privacy and Security

Robert H. Sloan (University of Illinois at Chicago, USA), Richard Warner (Chicago-Kent College of Law, Illinois, USA)

Mathematical logic; Databases; Computer security

Paperback

This text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors... [more]

$108.00

We can order this in for you
How long will it take?
Add this item to my basket
Industrial Espionage: Developing a Counterespionage Program

978/146/656/9781466568143.jpg

Industrial Espionage: Developing a Counterespionage Program

Daniel J. Benny, PhD (Embry-Riddle Aeronautical University Worldwide and Private Investigator & Security Consultant, Harrisburg, Pennsylvania, USA)

Management of specific areas; Computer security

Hardback

The FBI estimates that billions of U.S. dollars are lost each year to foreign and domestic competitors who deliberately target... [more]

$120.00

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Management Handbook, Volume 7

978/146/656/9781466567498.jpg

Information Security Management Handbook, Volume 7

Richard O'Hanley (Auerbach Publications, New York, New York), James S. Tiller (Raleigh, North Carolina, USA)

Computer security; Network management

Hardback

The 'Information Security Management Handbook' serves not only as an everyday reference for information security practitioners,... [more]

$166.00

We can order this in for you
How long will it take?
Add this item to my basket
Official (ISC)2 (R) Guide to the ISSAP (R) CBK

978/146/657/9781466579002.jpg

Official (ISC)2 (R) Guide to the ISSAP (R) CBK

(ISC)2

Software Engineering; Computer security

Hardback

Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six... [more]

$147.00

We can order this in for you
How long will it take?
Add this item to my basket
Official (ISC)2 Guide to the CSSLP CBK

978/146/657/9781466571273.jpg

Official (ISC)2 Guide to the CSSLP CBK

Mano Paul (SecuRisk Solutions, Pflugerville, Texas, USA)

Computer security

Hardback

Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue... [more]

$156.00

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Computer and Network Security: Navigating Shades of Gray

978/143/986/9781439860717.jpg

Introduction to Computer and Network Security: Navigating Shades of Gray...

Richard R. Brooks (Clemson University, South Carolina, USA)

Computer security

Hardback

This text provides a classroom-tested, practical introduction to software design and implementation, cryptographic tools,... [more]

$139.00

We can order this in for you
How long will it take?
Add this item to my basket
Enterprise Architecture and Information Assurance: Developing a Secure Foundation

978/143/984/9781439841594.jpg

Enterprise Architecture and Information Assurance: Developing a Secure Foundation...

James A. Scholz (Computer Security Consulting, Inc., Mabelvale, Arkansas, USA)

Business applications; Computer security

Hardback

Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning... [more]

$143.00

We can order this in for you
How long will it take?
Add this item to my basket
The Data Bank Society: Organizations, Computers and Social Freedom

978/041/572/9780415720939.jpg

The Data Bank Society: Organizations, Computers and Social Freedom

Malcolm Warner, Mike Stone

Library & information sciences; Communication studies; Internet browsers; Databases & the Web; Privacy & data protection

Hardback

This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the... [more]

$252.00

We can order this in for you
How long will it take?
Add this item to my basket
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues

978/143/988/9781439883242.jpg

Effective Surveillance for Homeland Security: Balancing Technology and Social...

Francesco Flammini, Roberto Setola, Giorgio Franceschetti

Human rights; Defence strategy, planning & research; Computer security

Hardback

Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art... [more]

$242.00

We can order this in for you
How long will it take?
Add this item to my basket
Implementing Information Security in Healthcare: Building a Security Program

978/193/890/9781938904349.jpg

Implementing Information Security in Healthcare: Building a Security Program...

Terrell Herzig, Tom Walsh

Health systems & services; Computer security

Paperback

Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare... [more]

$166.00

We can order this in for you
How long will it take?
Add this item to my basket
Iris Biometric Model for Secured Network Access

978/146/650/9781466502130.jpg

Iris Biometric Model for Secured Network Access

Franjieh El Khoury (Universite Claude Bernard, Villeurbanne, France)

Computer security; Network security; Image processing

Hardback

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various... [more]

$242.00

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.