Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Most computer users are ignorant of the tracks, trails, and traces they leave behind when they use their computer. This book... [more]
Essential advice for every ISO27001 project - including ISO27001:2013 [more]
In Resilient Thinking, Phillip Wood discusses the importance of thinking laterally about potential impacts on your organisation... [more]
Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing... [more]
The Definitive Guide to the C&A Transformation provides an authoritative guide to authorization for persons with knowledge... [more]
Provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight... [more]
Provides a technology-based survey of methods and techniques that leaves the reader without an understanding of the interrelationships... [more]
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures... [more]
Examines the elements of computer security, employee roles and responsibilities, and common threats. This book presents a... [more]
In-depth explanations of over a dozen ways that unified communications systems can be hacked and exactly how to protect them... [more]
This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from... [more]
This book, written by two leading experts in de-identification, explains how to adhere to regulations in a defensible way... [more]
This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security... [more]
Introduces you the distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD... [more]
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against... [more]
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the... [more]
This book is a must have resource guide for anyone who wants to ...implement TXT within their environments. I wish we had... [more]
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing... [more]
Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically,... [more]
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching... [more]
This book presents the most interesting talks given at ISSE 2013 - the forum for the inter-disciplinary discussion of how... [more]
Human Target provides a comprehensive coverage of computer security and security management. Dr. Leon Hempel explores the... [more]
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and... [more]
The perfect introduction to the principles of information security management and ISO27001:2013 [more]
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE... [more]