Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The transformation from traditional war between nation-states to conflict between nation-states and nonstate actors requires... [more]
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security,... [more]
This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on... [more]
Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual... [more]
This book covers the management of information security, the economics of information security, the economics of privacy,... [more]
This book explains the most important concepts, standards, implementations, and applications of public key infrastructures... [more]
Each year, the International Police Executive Symposium (IPES) holds a global conference for police scholars and practitioners... [more]
<p>This book is a complete treatise on Quick Response (QR) Code symbols the square barcodes that can be read by smart phones.... [more]
The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative... [more]
Cyberspace and International Relations [more]
This book covers applied cryptography in computerized telecommunication networks. The authors present key technologies, algorithms,... [more]
This book systematically examines problems posed by the need for security and privacy in implantable medical devices. Coverage... [more]
This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures... [more]
This book recognizes the importance of information technology by addressing the most crucial issues, challenges, opportunities,... [more]
Technological advancements have extracted a vast amount of useful knowledge and information for applications and services.... [more]
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents'... [more]
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications,... [more]
Helps readers in information security and in other professions become world-class social hacking chameleons. This book demonstrates... [more]
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware... [more]
The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive... [more]
First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software... [more]
Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional... [more]
Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns... [more]
The topic of the election of Israel is one of the most controversial and difficult subjects in the entire Bible. Modern readers... [more]
An in-depth guide to management and strategy essentials for information security professionals, complete with proven management... [more]