Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

2,575 results

Cyber Power: Crime, Conflict and Security in Cyberspace

978/146/657/9781466573048.jpg

Cyber Power: Crime, Conflict and Security in Cyberspace

Solange Ghernaouti-Helie (University of Lausanne, Switzerland)

Development studies; Security services; Computer security

Hardback

Most books on cybercrime are written by national security or political experts, and rarely propose an integrated and comprehensive... [more]

$145.00

We can order this in for you
How long will it take?
Add this item to my basket
Coding Freedom: The Ethics and Aesthetics of Hacking

978/069/114/9780691144610.jpg

Coding Freedom: The Ethics and Aesthetics of Hacking

E. Gabriella Coleman

Ethics & moral philosophy; Society & Social Sciences; Ethical issues: censorship; Sociology; Computer fraud & hacking

Paperback

Exploring the rise and political significance of the free and open source software (F/OSS) movement in the US and Europe,... [more]

$55.99

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0

978/146/658/9781466580589.jpg

Information Security Policy Development for Compliance: ISO/IEC 27001, NIST...

Barry L. Williams (Williams Technology Audit Services, Alton, Illinois, USA)

Computer security

Hardback

Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state... [more]

$101.00

We can order this in for you
How long will it take?
Add this item to my basket
Computer Security Literacy: Staying Safe in a Digital World

978/143/985/9781439856185.jpg

Computer Security Literacy: Staying Safe in a Digital World

Douglas Jacobson (Iowa State University, Ames, USA), Joseph Idziorek (Iowa State University, Ames, USA)

Mathematical logic; Computer security

Paperback

Traditional computer security books typically focus on the implementation or theory of security controls and mechanisms at... [more]

$94.99

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Computer Networks and Cybersecurity

978/146/657/9781466572133.jpg

Introduction to Computer Networks and Cybersecurity

Chwan-Hwa (John) Wu, J. David Irwin

Computer security

Hardback

If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach... [more]

$389.00

We can order this in for you
How long will it take?
Add this item to my basket
Public Key Cryptography: Applications and Attacks

978/111/831/9781118317129.jpg

Public Key Cryptography: Applications and Attacks

Lynn Margaret Batten

Data encryption; Network security

Hardback

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]

$139.95

We can order this in for you
How long will it take?
Add this item to my basket
Digital Forensics Explained

978/143/987/9781439874950.jpg

Digital Forensics Explained

Greg Gogolin (Ferris State University, Big Rapids, Michigan, USA)

Computer security

Hardback

Many of those who are actively involved in the digital forensics process have a limited background in computer science and... [more]

$131.00

We can order this in for you
How long will it take?
Add this item to my basket
Network Attacks and Defenses: A Hands-on Approach

978/146/651/9781466517943.jpg

Network Attacks and Defenses: A Hands-on Approach

Zouheir Trabelsi (United Arabs Emirates University, Al-Ain), Kadhim Hayawi (University of Waterloo, Ontario, Canada), Arwa Al Braiki (United Arabs Emirates University, Al-Ain), Sujith Samuel Mathew (University of Adelaide, Australia)

Computer security

Hardback

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how... [more]

$150.00

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Surveillance Studies

978/146/655/9781466555099.jpg

Introduction to Surveillance Studies

J. K. Petersen

Communications engineering & telecommunications; Privacy & data protection

Hardback

Surveillance is a divisive issue-one might say it is inherently controversial. Used by private industry, law enforcement,... [more]

$118.00

We can order this in for you
How long will it take?
Add this item to my basket
Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct

978/143/989/9781439892275.jpg

Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and...

Christopher J. Cubbage, CPP, David J. Brooks, PhD

Management & management techniques; Computer security

Hardback

As corporations and governments become more litigious and risk averse, international risk management becomes more complex.... [more]

$141.00

We can order this in for you
How long will it take?
Add this item to my basket
Group Theoretic Cryptography

978/158/488/9781584888369.jpg

Group Theoretic Cryptography

Maria Isabel Gonzalez Vasco, Spyros Magliveras, Rainer Steinwandt

Data encryption

Hardback

Group theoretic problems appear to be the most promising source of hard computational problems for deploying cryptographic... [more]

$160.00

We can order this in for you
How long will it take?
Add this item to my basket
Official (ISC)2 (R) Guide to the CAP (R) CBK (R)

978/143/982/9781439820759.jpg

Official (ISC)2 (R) Guide to the CAP (R) CBK (R)

Patrick D. Howard (Chief Information Security Officer, Nuclear Regulatory Commission, USA)

Computer security

Hardback

Demonstrates the effectiveness of certification and accreditation as a risk management methodology for IT systems in public... [more]

$133.00

We can order this in for you
How long will it take?
Add this item to my basket
Managing Emerging Risk: The Capstone of Preparedness

978/143/982/9781439826416.jpg

Managing Emerging Risk: The Capstone of Preparedness

Kevin D. Burton (KDB Legacy Holdings, LLC, Scottsdale, Arizona, USA)

Risk assessment; Computer security

Paperback

Offering ideas, tools, and a fresh way of thinking, this guide introduces the concept of emerging risk and the effective mitigation... [more]

$110.00

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Management Handbook, 2013 CD-ROM Edition

978/146/656/9781466567269.jpg

Information Security Management Handbook, 2013 CD-ROM Edition

Richard O'Hanley (Auerbach Publications, New York, New York), James S. Tiller (Raleigh, North Carolina, USA)

Computer security; Network management

CD-ROM

The 'Information Security Management Handbook' serves not only as an everyday reference for information security practitioners,... [more]

$301.00

We can order this in for you
How long will it take?
Add this item to my basket
Investigations in the Workplace

no-image-available.jpg

Investigations in the Workplace

Eugene F. Ferraro, CPP, SPHR

Crime & criminology; Computer security

Hardback

Focusing on both the private security professional and the consumer of corporate investigative services, this text provides... [more]

$147.00

We can order this in for you
How long will it take?
Add this item to my basket
Cybersecurity: Public Sector Threats and Responses

978/143/984/9781439846636.jpg

Cybersecurity: Public Sector Threats and Responses

Kim J. Andreasson (DAKA Advisory AB, Varberg, Sweden)

Public administration; Computer security

Hardback

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents... [more]

$122.00

We can order this in for you
How long will it take?
Add this item to my basket
Data Mining Tools for Malware Detection

978/143/985/9781439854549.jpg

Data Mining Tools for Malware Detection

Mehedy Masud (University of Texas at Dallas, Richardson, Texas, USA), Latifur Khan (University of Texas at Dallas, Richardson, Texas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA), Kim J. Andreasson

Data mining; Computer security

Hardback

Presenting theoretical concepts, practical techniques, and experimental results, this book provides a step-by-step illustration... [more]

$147.00

We can order this in for you
How long will it take?
Add this item to my basket
Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

978/143/985/9781439855874.jpg

Smart Grid Security: An End-to-End View of Security in the New Electrical...

Gilbert N. Sorebo (SAIC, McLean, Virginia, USA), Michael C. Echols (Utility Security Professional, Litchfield Park, Arizona, USA)

Electrical power industries; Power networks, systems, stations & plants; Computer security

Hardback

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is... [more]

$147.00

We can order this in for you
How long will it take?
Add this item to my basket
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

no-image-available.jpg

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and...

Tyson Macaulay, Bryan L. Singer (Principal Consultant, Kenexis Consulting Corporation, Madison, Alabama, USA)

Computer security

Hardback

SCADA (Supervisory Control and Data Acquisition) systems do not necessarily mesh well with standard IT security. Nevertheless,... [more]

$118.00

We can order this in for you
How long will it take?
Add this item to my basket
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods

978/143/986/9781439866214.jpg

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods...

Mark S. Merkow (Technical Security Strategy, Scottsdale, Arizona, USA), Lakshmikanth Raghavan (PayPal, San Jose, California, USA)

Software Engineering; Computer security

Hardback

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements... [more]

$141.00

We can order this in for you
How long will it take?
Add this item to my basket
A Multidisciplinary Introduction to Information Security

978/142/008/9781420085907.jpg

A Multidisciplinary Introduction to Information Security

Stig F. Mjolsnes (Norwegian University of Science & Technology, Trondheim)

Computer security

Hardback

The rapid shift in business and government communications from mail and telephone to computer services, email, web transactions,... [more]

$336.00

We can order this in for you
How long will it take?
Add this item to my basket
Someone's Watching You!: From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It

978/144/051/9781440512735.jpg

Someone's Watching You!: From Micropchips in your Underwear to Satellites...

Forest Lee

Society & Social Sciences; Human rights; Privacy & data protection

Paperback

Synopsis coming soon....... [more]

$22.99

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Management Handbook, Volume 5

no-image-available.jpg

Information Security Management Handbook, Volume 5

Harold F. Tipton, Micki Krause Nozaki

Management & management techniques; Computer security

Hardback

Updated annually, this handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required... [more]

$242.00

We can order this in for you
How long will it take?
Add this item to my basket
Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications

978/143/980/9781439807026.jpg

Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications...

Murray R. Bremner (University of Saskatchewan, Saskatoon, Canada)

Mathematical logic; Number theory; Algorithms & data structures; Computer security

Hardback

First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time... [more]

$173.00

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Evaluation: A Holistic Approach from a Business Perspective

$160.00

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.