Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Security Engineering Techniques and Solutions for Information Systems: Management and Implementation demonstrates security... [more]
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of... [more]
Using a holistic approach, this book delivers complex information in an accessible way. The author addresses the importance... [more]
Here is a thorough survey of new physical leakages of embedded systems, namely power and electromagnetic emanations. Discusses... [more]
Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the... [more]
In its revised fifth edition, this book covers ethical, social and policy challenges arising from the convergence of computing... [more]
<p>This work develops perspectives and approaches to crucial cyber-security issues that are non-political, non-partisan, and... [more]
In this new book, Stiennon presents a comprehensive view of the technology, methodology, and tools needed to defend digital... [more]
Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic... [more]
Provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This text covers... [more]
Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed... [more]
Discusses the critical information that readers need to know about APT and how to avoid being a victim. This book covers what... [more]
The book describes data-driven approach to optimal monitoring and alerting in distributed computer systems. It interprets... [more]
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital... [more]
A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's machine and therefore... [more]
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows... [more]
The first full-scale overview of cybercrime, law, and policy [more]
Profiling is a hot topic today. The post-9/11 War on Terrorism has engendered political, ethical, and scientific controversy... [more]
Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within... [more]
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes... [more]
In Worm, one of the world's biggest selling authors of narrative non-fiction returns to bestselling form. [more]
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational... [more]
Exploring the rise and political significance of the free and open source software (F/OSS) movement in the US and Europe,... [more]
Includes lessons that allow even beginners to acquire the knowledge they need quickly. This title features: full-color photos... [more]
Helps to understand the typical failings of common security hardware in order to avoid these weaknesses. This title also helps... [more]