Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Sub-Categories of Computer security


Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Computer security

2,671 results

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security

978/146/651/9781466511064.jpg

Windows Networking Tools: The Complete Guide to Management, Troubleshooting,...

Gilbert Held

Computer security

Paperback

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows... [more]

$110.00

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Computer Networks and Cybersecurity

978/146/657/9781466572133.jpg

Introduction to Computer Networks and Cybersecurity

Chwan-Hwa (John) Wu, J. David Irwin

Computer security

Hardback

If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach... [more]

$399.00

We can order this in for you
How long will it take?
Add this item to my basket
Unauthorized Access: The Crisis in Online Privacy and Security

978/143/983/9781439830130.jpg

Unauthorized Access: The Crisis in Online Privacy and Security

Robert H. Sloan (University of Illinois at Chicago, USA), Richard Warner (Chicago-Kent College of Law, Illinois, USA)

Mathematical logic; Databases; Computer security

Paperback

This text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors... [more]

$108.00

We can order this in for you
How long will it take?
Add this item to my basket
Public Key Cryptography: Applications and Attacks

978/111/831/9781118317129.jpg

Public Key Cryptography: Applications and Attacks

Lynn Margaret Batten

Data encryption; Network security

Hardback

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]

$139.95

We can order this in for you
How long will it take?
Add this item to my basket
Digital Forensics Explained

978/143/987/9781439874950.jpg

Digital Forensics Explained

Greg Gogolin (Ferris State University, Big Rapids, Michigan, USA)

Computer security

Hardback

Many of those who are actively involved in the digital forensics process have a limited background in computer science and... [more]

$135.00

We can order this in for you
How long will it take?
Add this item to my basket
Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct

978/143/989/9781439892275.jpg

Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and...

Christopher J. Cubbage, CPP, David J. Brooks, PhD

Management & management techniques; Computer security

Hardback

As corporations and governments become more litigious and risk averse, international risk management becomes more complex.... [more]

$147.00

We can order this in for you
How long will it take?
Add this item to my basket
Official (ISC)2 (R) Guide to the CAP (R) CBK (R)

978/143/982/9781439820759.jpg

Official (ISC)2 (R) Guide to the CAP (R) CBK (R)

Patrick D. Howard (Chief Information Security Officer, Nuclear Regulatory Commission, USA)

Computer security

Hardback

Demonstrates the effectiveness of certification and accreditation as a risk management methodology for IT systems in public... [more]

$139.00

We can order this in for you
How long will it take?
Add this item to my basket
Managing Emerging Risk: The Capstone of Preparedness

978/143/982/9781439826416.jpg

Managing Emerging Risk: The Capstone of Preparedness

Kevin D. Burton (KDB Legacy Holdings, LLC, Scottsdale, Arizona, USA)

Risk assessment; Computer security

Paperback

Offering ideas, tools, and a fresh way of thinking, this guide introduces the concept of emerging risk and the effective mitigation... [more]

$114.00

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Management Handbook, 2013 CD-ROM Edition

978/146/656/9781466567269.jpg

Information Security Management Handbook, 2013 CD-ROM Edition

Richard O'Hanley (Auerbach Publications, New York, New York), James S. Tiller (Raleigh, North Carolina, USA)

Computer security; Network management

CD-ROM

The 'Information Security Management Handbook' serves not only as an everyday reference for information security practitioners,... [more]

$315.00

We can order this in for you
How long will it take?
Add this item to my basket
Investigations in the Workplace

no-image-available.jpg

Investigations in the Workplace

Eugene F. Ferraro, CPP, SPHR

Crime & criminology; Computer security

Hardback

Focusing on both the private security professional and the consumer of corporate investigative services, this text provides... [more]

$154.00

We can order this in for you
How long will it take?
Add this item to my basket
Cybersecurity: Public Sector Threats and Responses

978/143/984/9781439846636.jpg

Cybersecurity: Public Sector Threats and Responses

Kim J. Andreasson (DAKA Advisory AB, Varberg, Sweden)

Public administration; Computer security

Hardback

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents... [more]

$126.00

We can order this in for you
How long will it take?
Add this item to my basket
Data Mining Tools for Malware Detection

978/143/985/9781439854549.jpg

Data Mining Tools for Malware Detection

Mehedy Masud (University of Texas at Dallas, Richardson, Texas, USA), Latifur Khan (University of Texas at Dallas, Richardson, Texas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA), Kim J. Andreasson

Data mining; Computer security

Hardback

Presenting theoretical concepts, practical techniques, and experimental results, this book provides a step-by-step illustration... [more]

$154.00

We can order this in for you
How long will it take?
Add this item to my basket
Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

978/143/985/9781439855874.jpg

Smart Grid Security: An End-to-End View of Security in the New Electrical...

Gilbert N. Sorebo (SAIC, McLean, Virginia, USA), Michael C. Echols (Utility Security Professional, Litchfield Park, Arizona, USA)

Electrical power industries; Power networks, systems, stations & plants; Computer security

Hardback

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is... [more]

$154.00

We can order this in for you
How long will it take?
Add this item to my basket
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

no-image-available.jpg

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and...

Tyson Macaulay, Bryan L. Singer (Principal Consultant, Kenexis Consulting Corporation, Madison, Alabama, USA)

Computer security

Hardback

SCADA (Supervisory Control and Data Acquisition) systems do not necessarily mesh well with standard IT security. Nevertheless,... [more]

$124.00

We can order this in for you
How long will it take?
Add this item to my basket
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods

978/143/986/9781439866214.jpg

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods...

Mark S. Merkow (Technical Security Strategy, Scottsdale, Arizona, USA), Lakshmikanth Raghavan (PayPal, San Jose, California, USA)

Software Engineering; Computer security

Hardback

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements... [more]

$147.00

We can order this in for you
How long will it take?
Add this item to my basket
A Multidisciplinary Introduction to Information Security

978/142/008/9781420085907.jpg

A Multidisciplinary Introduction to Information Security

Stig F. Mjolsnes (Norwegian University of Science & Technology, Trondheim)

Computer security

Hardback

The rapid shift in business and government communications from mail and telephone to computer services, email, web transactions,... [more]

$347.00

We can order this in for you
How long will it take?
Add this item to my basket
Someone's Watching You!: From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It

978/144/051/9781440512735.jpg

Someone's Watching You!: From Micropchips in your Underwear to Satellites...

Forest Lee

Society & Social Sciences; Human rights; Privacy & data protection

Paperback

Synopsis coming soon....... [more]

$22.99

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Management Handbook, Volume 5

no-image-available.jpg

Information Security Management Handbook, Volume 5

Harold F. Tipton, Micki Krause Nozaki

Management & management techniques; Computer security

Hardback

Updated annually, this handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required... [more]

$252.00

We can order this in for you
How long will it take?
Add this item to my basket
Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications

978/143/980/9781439807026.jpg

Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications...

Murray R. Bremner (University of Saskatchewan, Saskatoon, Canada)

Mathematical logic; Number theory; Algorithms & data structures; Computer security

Hardback

First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time... [more]

$183.00

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Evaluation: A Holistic Approach from a Business Perspective

$166.00

We can order this in for you
How long will it take?
Add this item to my basket
Kingpin: The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network

978/073/362/9780733627712.jpg

Kingpin: The true story of Max Butler, the master hacker who ran a billion...

Kevin Poulsen

True crime; Society & Social Sciences; Computer fraud & hacking

Paperback

Max Vision Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to... [more]

$32.99

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Cryptography with Open-Source Software

978/143/982/9781439825709.jpg

Introduction to Cryptography with Open-Source Software

Alasdair McAndrew (Victoria University, Melbourne, Australia)

Combinatorics & graph theory; Data encryption

Hardback

Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography... [more]

$145.00

We can order this in for you
How long will it take?
Add this item to my basket
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

978/143/982/9781439821480.jpg

The Security Risk Assessment Handbook: A Complete Guide for Performing Security...

Douglas Landoll (Lantego, LLC, Austin, Texas, USA)

Computer security

Hardback

Provides insight into precisely how to conduct an information security risk assessment. Designed for security professionals... [more]

$124.00

We can order this in for you
How long will it take?
Add this item to my basket
Data Mining and Machine Learning in Cybersecurity

978/143/983/9781439839423.jpg

Data Mining and Machine Learning in Cybersecurity

Sumeet Dua (Louisiana Tech University, Ruston, USA), Xian Du (Louisiana Tech University, Ruston, USA)

Data mining; Computer security; Systems analysis & design

Hardback

With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant... [more]

$166.00

We can order this in for you
How long will it take?
Add this item to my basket
Practical Risk Management for the CIO

978/143/985/9781439856536.jpg

Practical Risk Management for the CIO

Mark Scherling (M3P Consulting, Inc., Victoria, British Columbia, Canada)

Management & management techniques; Computer security

Hardback

The growing complexity of today's interconnected systems has not only increased the need for improved information security,... [more]

$143.00

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.