Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method... [more]
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics... [more]
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis,... [more]
Cisco Next-Generation Network Security products and solutions can help network security administrators achieve and maintain... [more]
31 Days Before Your CCNA Security Exam 31 Days Before Your CCNA Security Exam offers you an engaging and practical way to... [more]
With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.... [more]
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic... [more]
Where do data/privacy breaches commonly occur? How do you avoid them happening to you? Real-life cases (with hefty fines involved)... [more]
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by... [more]
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital... [more]
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills... [more]
Much as Che Guevara's book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution... [more]
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility... [more]
This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise... [more]
This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate... [more]
Offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against... [more]
Focuses on the latest technologies and applications of secure outsourcing computations. The book introduces state-of-the-art... [more]
This highly original book is an ethnographic noir of how Big Data profits from patient private health information. The book... [more]
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means,... [more]
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management... [more]
This book examines important security considerations for the Internet of Things (IoT). IoT is collecting a growing amount... [more]
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical... [more]
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting:... [more]
This book discusses data privacy in banking and financial services, anonymization principles and practice, test data management,... [more]
In this long-awaited update to IBM i Security Administration and Compliance, security expert Carol Woodbury tells you everything... [more]