Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is... [more]
Presenting the methodologies and concepts required for successful penetration testing, this book discusses the process from... [more]
Examines the phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some of the legendary... [more]
Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA) [more]
Identity theft (or identity fraud) has gained prominence as a pressing and prevalent social problem. This book provides a... [more]
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]
Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers... [more]
Constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience,... [more]
Provides a compilation of the fundamental knowledge, skills, techniques, and tools required of IT security professional. It... [more]
Visual Cryptography and Secret Image Sharing [more]
Increasingly, crimes and fraud are digital in nature, occurring at breakneck speed and encompassing large volumes of data.... [more]
Constitutes the refereed proceedings of the 5th IFIP WG 11.11 International Conference, IFIPTM 2011, held in Copenhagen, Denmark,... [more]
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant... [more]
Provides an inclusive analysis of the topics covered on the ISSEP Exam. This guide to the test promotes understanding of the... [more]
From Microsoft to the US Air Force, IBM to the FBI, Cisco to Wipro, thousands of security professionals are seeking the respected... [more]
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems... [more]
Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively... [more]
Suitable for Hackers, IT professional, and Infosec aficionados as well as everyday people interested in computer security,... [more]
Emphasizes the importance of balance in creating school environments that are safe and productive. This book provides educators,... [more]
Lists the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the... [more]
Offers the methods and tools for publishing useful information while preserving data privacy. This title presents a comprehensive... [more]
Arguing that privacy concerns should not be limited solely to concern about control over personal information, this book counters... [more]
Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT infrastructure.... [more]
Welcome to the Third International Conference on Information Security and Ass- ance (ISA 2009). ISA 2009 was the most comprehensive... [more]