Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
New Media Politics: Rethinking Activism and National Security in Cyberspace explores many of the questions surrounding the... [more]
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI... [more]
In order to perform effective analysis of today's information security systems, numerous components must be taken into consideration.... [more]
<p>This book provides an overview of vehicular networks, fromtraffic engineering to human factors. The book addresses theunique... [more]
This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST... [more]
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the... [more]
This book constitutes the refereed proceedings of the 16th International Conference on Passive and Active Measurement, PAM... [more]
This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating... [more]
This book outlines social and moral guidelines to combat violent, hateful, and illegal activity on the Internet. [more]
Explains how to evaluate the appropriateness of security countermeasures, from a cost-effectiveness perspective. This title... [more]
This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by... [more]
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography,... [more]
Offers an overview of management topics related to information security. This resource promotes an understanding of Enterprise... [more]
This book lays out the foundation of a privacy doctrine suitable to the cyber age. It limits the volume, sensitivity, and... [more]
Advances in computer technology have led to an increased need for online security and the protection of personal information.... [more]
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected... [more]
In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based... [more]
Supplying helpful guidelines for identity management, system procurement, and management, this book discusses how legal identity... [more]
<p>From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive... [more]
Renowned Oracle security expert David Knox provides trusted advice and best practices for comprehensive Oracle Database security.... [more]
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]
Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and... [more]
This book is a multi-disciplinary analysis of cyber warfare, featuring contributions by leading experts from a mixture of... [more]
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and... [more]