Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Data encryption

263 results

Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat

978/159/749/9781597490641.jpg

Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the...

Paul Piccard (Director of Threat Research for Webroot, USA)

Computer security; Computer viruses, Trojans & worms; Data encryption

Paperback

Focuses on defending enterprise networks from sophisticated and malicious spyware. This book examines the various types of... [more]

$64.95

We can order this in for you
How long will it take?
Add this item to my basket
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

978/159/749/9781597491143.jpg

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless...

T. Bradley

Computing & IT; Data encryption

Hardback

In his role managing the content for a site and a weekly newsletter, the author has learned how to talk to people about computer... [more]

$39.95

We can order this in for you
How long will it take?
Add this item to my basket
Professional Pen Testing for Web Applications

978/047/178/9780471789666.jpg

Professional Pen Testing for Web Applications

Andres Andreu

Data encryption

Paperback

There is no such thing as perfect security when it comes to keeping all systems intact and functioning properly. Good penetration... [more]

$86.95

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Cost Management

978/084/939/9780849392757.jpg

Information Security Cost Management

Ioana V. Bazavan (Pleasanton, California, USA), Ian Lim (Ingram Micro, Santa Ana, California, USA)

Computer security; Data encryption; Network management

Hardback

Shows how to strategically maximize a limited security budget without compromising the quality of risk management initiatives.... [more]

$198.00

We can order this in for you
How long will it take?
Add this item to my basket
Digital Rights Management: Protecting and Monetizing Content

978/024/080/9780240807225.jpg

Digital Rights Management: Protecting and Monetizing Content

Joan Van Tassel (PhD Associate Professor, National University)

Communications engineering & telecommunications; Data encryption

Paperback

Digital rights management (DRM) is a type of server software developed to enable secure distribution to disable illegal distribution... [more]

$81.99

We can order this in for you
How long will it take?
Add this item to my basket
Professional Windows Desktop and Server Hardening

978/076/459/9780764599903.jpg

Professional Windows Desktop and Server Hardening

Roger A. Grimes

Microsoft Windows; Data encryption; Network security

Paperback

Today's uber viruses, worms, and trojans may seem more damaging than ever, but the attacking malware and malicious hackers... [more]

$78.95

We can order this in for you
How long will it take?
Add this item to my basket
The Art of Error Correcting Coding

978/047/001/9780470015582.jpg

The Art of Error Correcting Coding

Robert H. Morelos-Zaragoza

Coding theory & cryptology; Automatic control engineering; Communications engineering & telecommunications; Algorithms & data structures; Data encryption

Hardback

This book includes additional features to the first edition which offered a practical introductory approach to the techniques... [more]

$155.95

We can order this in for you
How long will it take?
Add this item to my basket
Multimedia Security Technologies for Digital Rights Management

978/012/369/9780123694768.jpg

Multimedia Security Technologies for Digital Rights Management

Wenjun Zeng (Professor, University of Missouri, Columbia, MO, USA), Heather Yu (Huawei Technologies), Ching-Yung Lin (IBM T.J. Watson Research Center, Hawthorne, NY, USA)

Data encryption

Hardback

Presents the technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes... [more]

$125.00

We can order this in for you
How long will it take?
Add this item to my basket
Quantum Cryptography and Secret-Key Distillation

978/052/186/9780521864855.jpg

Quantum Cryptography and Secret-Key Distillation

Gilles van Assche

Coding theory & cryptology; Applied physics; Electrical engineering; Data encryption

Hardback

This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus on secret-key... [more]

$140.95

We can order this in for you
How long will it take?
Add this item to my basket
Symbian OS Platform Security: Software Development Using the Symbian OS Security Architecture

no-image-available.jpg

Symbian OS Platform Security: Software Development Using the Symbian OS...

C. Heath

Operating systems; Data encryption

Paperback

Symbian OS is an advanced, customizable operating system, which is licensed by the world's leading mobile phone manufacturers.... [more]

$79.95

We can order this in for you
How long will it take?
Add this item to my basket
Security Log Management: Identifying Patterns in the Chaos

978/159/749/9781597490429.jpg

Security Log Management: Identifying Patterns in the Chaos

Jacob Babbin (Contractor with a government agency filling the role of Intrusion Detection Team Lead)

Data encryption; Network security

Paperback

Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information... [more]

$64.95

We can order this in for you
How long will it take?
Add this item to my basket
Multimedia Encryption and Authentication Techniques and Applications

978/084/937/9780849372124.jpg

Multimedia Encryption and Authentication Techniques and Applications

Borko Furht (Florida Atlantic University, Boca Raton, USA), Darko Kirovski (Microsoft Corporation, Redmond, Washington, USA)

Mathematical logic; WAP (wireless) technology; Internet guides & online services; Graphical & digital media applications; Software Engineering; Data encryption

Hardback

Addresses a variety of issues related to the protection of digital media content, including audio, image, and video protection.... [more]

$210.00

We can order this in for you
How long will it take?
Add this item to my basket
Multimedia Watermarking Techniques and Applications

978/084/937/9780849372131.jpg

Multimedia Watermarking Techniques and Applications

Darko Kirovski (Microsoft Corporation, Redmond, Washington, USA), Borko Furht

Graphical & digital media applications; Software Engineering; Data encryption

Hardback

With advances in digital communications leading to an increased threat of piracy, intellectual property owners must exploit... [more]

$210.00

We can order this in for you
How long will it take?
Add this item to my basket
Writing Security Tools and Exploits

978/159/749/9781597499972.jpg

Writing Security Tools and Exploits

James Foster

Software Engineering; Data encryption; Network security

Paperback

Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents... [more]

$64.95

We can order this in for you
How long will it take?
Add this item to my basket
Audit and Trace Log Management: Consolidation and Analysis

978/084/932/9780849327254.jpg

Audit and Trace Log Management: Consolidation and Analysis

Phillip Q. Maier (Visa USA, San Francisco, California, USA)

Computer security; Data encryption

Hardback

As regulation and legislation evolve, the need for cost-effective audit and monitoring solutions will grow. This book offers... [more]

$198.00

We can order this in for you
How long will it take?
Add this item to my basket
Perfect Password: Selection, Protection, Authentication

978/159/749/9781597490412.jpg

Perfect Password: Selection, Protection, Authentication

Mark Burnett (Independent researcher, consultant, and writer specializing in Windows security)

Data encryption

Paperback

Teaches users how to select passwords that always meet complexity requirements. This book examines the password problem from... [more]

$32.95

We can order this in for you
How long will it take?
Add this item to my basket
Sarbanes-Oxley Guide for Finance and Information Technology Professionals

978/047/178/9780471785538.jpg

Sarbanes-Oxley Guide for Finance and Information Technology Professionals...

Sanjay Anand

Finance & accounting; Management & management techniques; Data encryption; Network security

Hardback

Praise for Sarbanes-Oxley Guide for Finance and Information Technology Professionals Effective SOX programs enlist the... [more]

$109.95

We can order this in for you
How long will it take?
Add this item to my basket
The Law and Economics of Cybersecurity

978/052/185/9780521855273.jpg

The Law and Economics of Cybersecurity

Mark F. Grady (University of California, Los Angeles), Francesco Parisi (George Mason University, Virginia)

E-commerce law; IT & Communications law; Legal aspects of computing; Computer security; Data encryption

Hardback

Originally published in 2006, this book brings together the views of leading law and economics scholars on the nature of the... [more]

$147.95

We can order this in for you
How long will it take?
Add this item to my basket
Configuring Check Point NGX VPN-1/Firewall-1

978/159/749/9781597490313.jpg

Configuring Check Point NGX VPN-1/Firewall-1

Barry Stiefel, Simon Desmeules

Computer security; Data encryption

Paperback

Protect your network from both internal and external threats. Check Point NGX VPN-1/Firewall-1 is a Check Point's flagship... [more]

$64.95

We can order this in for you
How long will it take?
Add this item to my basket
Authentication Codes and Combinatorial Designs

978/158/488/9781584884736.jpg

Authentication Codes and Combinatorial Designs

Dingyi Pei (Guangzhou University, China), Dingyi Pei

Mathematics; Data encryption

Hardback

Covers optimal authentication codes, unconditionally secure authentication schemes, and both symmetric and asymmetric authentication... [more]

$210.00

We can order this in for you
How long will it take?
Add this item to my basket
Handbook of Information Security: Key Concepts, Infrastructure, Standards, and Protocols

978/047/164/9780471648307.jpg

Handbook of Information Security: Key Concepts, Infrastructure, Standards,...

Hossein Bidgoli

Data encryption

Hardback

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge... [more]

$636.95

We can order this in for you
How long will it take?
Add this item to my basket
Hacking Wireless Networks For Dummies

978/076/459/9780764597305.jpg

Hacking Wireless Networks For Dummies

Kevin Beaver, Peter T. Davis

Data encryption; Network security

Paperback

Shows readers how to strengthen the weak spots they find in their network's armor. This book enables readers discover how... [more]

$54.95

We can order this in for you
How long will it take?
Add this item to my basket
Security Education, Awareness and Training: SEAT from Theory to Practice

978/075/067/9780750678032.jpg

Security Education, Awareness and Training: SEAT from Theory to Practice...

Roper, Dr. Lynn Fischer, Joseph A. Grau

Data encryption

Paperback

Addresses the theories of sound security training and awareness, then shows the reader how to put the theories into practice... [more]

$79.00

We can order this in for you
How long will it take?
Add this item to my basket
Enhancing Computer Security with Smart Technology

978/084/933/9780849330452.jpg

Enhancing Computer Security with Smart Technology

V. Rao Vemuri (University of California, Livermore, USA), V. Rao Vemuri

Data encryption

Hardback

Introduces the problems of computer security to researchers with a machine learning background. This book introduces machine... [more]

$273.00

We can order this in for you
How long will it take?
Add this item to my basket
Quantum Communications and Cryptography

978/084/933/9780849336843.jpg

Quantum Communications and Cryptography

Alexander V. Sergienko

Data encryption

Hardback

The idea of actively using the power of quantum mechanical principles and special entangled states has fueled a revolution... [more]

$273.00

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.