Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Data encryption

263 results

SonicWALL Secure Wireless Networks Integrated Solutions Guide

978/159/749/9781597491938.jpg

SonicWALL Secure Wireless Networks Integrated Solutions Guide

Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock, Susan Weigand

Data encryption; Computer networking & communications

Paperback

Provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model.... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Secure Software Development: A Security Programmer's Guide

978/141/806/9781418065478.jpg

Secure Software Development: A Security Programmer's Guide

Jason Grembi

Computer programming & software development; Data encryption

Paperback

Teaches the essentials of developing secure software in accordance with industry standards. This book leads readers through... [more]

$179.95

We can order this in for you
How long will it take?
Add this item to my basket
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography

978/047/019/9780470193396.jpg

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics...

Roger R. Dube

Data encryption

Hardback

Presents the primary hardware-based computer security approaches in an easy to read format. Provides comprehensive coverage... [more]

$208.95

We can order this in for you
How long will it take?
Add this item to my basket
OS X Exploits and Defense: Own it... Just Like Windows or Linux!

978/159/749/9781597492546.jpg

OS X Exploits and Defense: Own it... Just Like Windows or Linux!

Paul Baccas, Kevin Finisterre, Larry H., David Harley, Gary Porteus

Macintosh OS; Data encryption

Paperback

Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals

978/159/749/9781597492393.jpg

Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security...

Constantine Photopoulos

Computer fraud & hacking; Data encryption; Network security

Paperback

Offers an approach to handle and recover from a catastrophic data loss. This book helps both technical and non-technical professionals... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
The Best Damn IT Security Management Book Period

978/159/749/9781597492270.jpg

The Best Damn IT Security Management Book Period

Susan Snedaker (MCSE, MCT Founder, Virtual Team Consulting, Tucson, AZ, USA), Robert McCrie (Professor, John Jay University, New York, NY, USA), Karim Vellani

Management & management techniques; Data encryption; Network security

Paperback

Covers management issues facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Open Source Fuzzing Tools

978/159/749/9781597491952.jpg

Open Source Fuzzing Tools

Noam Rathaus (Co-founder and CTO, Beyond Security, Israel, Microsoft Events Insider), Gadi Evron (Former Internet Security Operations Manager for the Israeli government, Founder of the Israeli government's Computer Emergency Response Team)

Computer security; Data encryption

Paperback

Fuzzing is often described as a 'black box' software testing technique. It works by automatically feeding a program multiple... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
The Best Damn Cybercrime and Digital Forensics Book Period

978/159/749/9781597492287.jpg

The Best Damn Cybercrime and Digital Forensics Book Period

Jack Wiles, Anthony Reyes (Retired Detective with the New York City Police Department's Computer Crimes Squad, USA)

Criminal investigation & detection; Data encryption; Network security

Paperback

Combines cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information... [more]

$74.95

We can order this in for you
How long will it take?
Add this item to my basket
InfoSecurity 2008 Threat Analysis

978/159/749/9781597492249.jpg

InfoSecurity 2008 Threat Analysis

Craig Schiller, Seth Fogie, Colby DeRodeff, Michael C. Gregg

Data encryption; Network security

Paperback

Suitable for IT professionals managing enterprise security, this book allows readers to assess vulnerabilities, design protection... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Secure Computer and Network Systems: Modeling, Analysis and Design

978/047/002/9780470023242.jpg

Secure Computer and Network Systems: Modeling, Analysis and Design

Nong Ye

Data encryption

Hardback

Cyber Security and Quality of Service: Modelling and Analysis for Systems Dependability presents a wide range of modeling,... [more]

$217.95

We can order this in for you
How long will it take?
Add this item to my basket
TechnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

978/159/749/9781597492232.jpg

TechnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive...

Jack Wiles

Criminal investigation & detection; Data encryption; Network security

Paperback

Provides IT security professionals with the information needed to create, manage and sustain a digital forensics lab and investigative... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace

978/075/467/9780754670889.jpg

Power and Security in the Information Age: Investigating the Role of the...

Myriam Dunn Cavelty, Victor Mauer

Politics & government; Data encryption

Hardback

Focuses on the role of the state in defending against cyber-threats and in securing the information age. This volume argues... [more]

$242.00

We can order this in for you
How long will it take?
Add this item to my basket
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

978/159/749/9781597490740.jpg

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability...

David Maynor (Senior Researcher, SecureWorks, U.S.A.), David Maynor

Data encryption

Paperback

Deals with the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Digital Watermarking and Steganography

978/012/372/9780123725851.jpg

Digital Watermarking and Steganography

Ingemar Cox (Professor, University College, London, U.K.), Matthew Miller (NEC, Princeton, NJ, U.S.A.), Jeffrey Bloom (Thomson, Princeton, NJ, U.S.A.), Jessica Fridrich (SUNY Binghamton, Binghamton, NY, U.S.A.), Ton Kalker (Hewlett-Packard Labs, Palo Alto, CA, U.S.A.)

Data encryption; Network security

Hardback

Containing information on steganalysis and steganography, this book includes watermarking with side information, QIM, and... [more]

$113.00

We can order this in for you
How long will it take?
Add this item to my basket
Conquest in Cyberspace: National Security and Information Warfare

978/052/169/9780521692144.jpg

Conquest in Cyberspace: National Security and Information Warfare

Martin C. Libicki (RAND Corporation, California)

Society & Social Sciences; Politics & government; Defence strategy, planning & research; Data encryption; Network security

Paperback

Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, steal their information,... [more]

$39.95

We can order this in for you
How long will it take?
Add this item to my basket
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

978/047/177/9780471779872.jpg

IT Security Interviews Exposed: Secrets to Landing Your Next Information...

Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller

Data encryption; Computer networking & communications; Advice on careers & achieving success

Paperback

IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job . [more]

$46.95

We can order this in for you
How long will it take?
Add this item to my basket
Strategies for Protecting National Critical Infrastructure Assets: A Focus on Problem-Solving

978/047/179/9780471799269.jpg

Strategies for Protecting National Critical Infrastructure Assets: A Focus...

John Sullivant

Defence strategy, planning & research; Data encryption; Network security

Hardback

This title eases the research burden, develops investigative protocols, and pulls together data into a comprehensive and practical... [more]

$253.95

We can order this in for you
How long will it take?
Add this item to my basket
The History of Information Security: A Comprehensive Handbook

978/044/451/9780444516084.jpg

The History of Information Security: A Comprehensive Handbook

Karl de Leeuw, Jan Bergstra

Data encryption

Hardback

Information Security is achieved through a mix of technical, organizational and legal measures. This book includes: the emergence... [more]

$325.00

We can order this in for you
How long will it take?
Add this item to my basket
XSS Attacks: Cross Site Scripting Exploits and Defense

978/159/749/9781597491549.jpg

XSS Attacks: Cross Site Scripting Exploits and Defense

Anton Rager, Robert Hansen, Jeremiah Grossman, Seth Fogie, Petko Petkov (Technical University of Sofia, Bulgaria)

Web graphics & design; Computer security; Data encryption; Network security

Paperback

Discusses the concepts, methodology, and technology that makes XSS a valid concern. This book explains various types of XSS... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Physical and Logical Security Convergence: Powered By Enterprise Security Management

978/159/749/9781597491228.jpg

Physical and Logical Security Convergence: Powered By Enterprise Security...

William P Crowell (Former Deputy Director, National Security Agency), Brian T Contos (CISSP, Chief Security Officer, ArcSight Inc.), Colby DeRodeff (<b>GCIA, GCNA</b> Manager, Technical Marketing, ArcSight, Inc., CA), Dan Dunkel (President, New Era Associates, LLC., Dallas/Ft. Worth, TX, USA)

Causes & prevention of crime; Computer security; Data encryption; Network security

Paperback

Offers an explanation of information security, physical security, and why approaching these two different types of security... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Snort Intrusion Detection and Prevention Toolkit

$62.95

We can order this in for you
How long will it take?
Add this item to my basket
Multi-application Smart Cards: Technology and Applications

978/052/187/9780521873840.jpg

Multi-application Smart Cards: Technology and Applications

Mike Hendry

Communications engineering & telecommunications; Storage media & peripherals; Data encryption

Hardback

A comprehensive guide to the technology, market and behavioural aspects involved in implementing multi-application smart cards.... [more]

$169.95

We can order this in for you
How long will it take?
Add this item to my basket
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators

978/159/749/9781597491389.jpg

Techno Security's Guide to Managing Risks for IT Managers, Auditors, and...

Russ Rogers, Jack Wiles, Johnny Long, Phil Drake, Ron J. Green

Business mathematics & systems; Computer security; Data encryption

Paperback

Contains information on a wide variety of topics related to Techno Security. This book takes the approach of identifying some... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
Microsoft Vista for IT Security Professionals

978/159/749/9781597491396.jpg

Microsoft Vista for IT Security Professionals

Anthony Piltzecker

Windows Vista; Data encryption

Paperback

Suitable for the professional system administrators who need to securely deploy Microsoft Vista in their networks, this work... [more]

$93.95

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.