Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during... [more]
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity... [more]
This book covers such cutting-edge applications in communications as advanced metering infrastructure, distribution automation,... [more]
This guide, updated to reflect ISO27001:2013, presents the compelling business case for implementing ISO27001 in order to... [more]
This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures... [more]
What will business software look like in the future? And how will it be developed? This book covers the proceedings of the... [more]
This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and... [more]
This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks... [more]
This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system,... [more]
This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held... [more]
* Covers all aspects of Sonar * Easy to follow examples * Makes achieving quality code easy For developers who want a much... [more]
This book explores the extraordinary difficulties a nation-state's law enforcement and military face in attempting to prevent... [more]
Examines the elements of computer security, employee roles and responsibilities, and common threats. This book presents a... [more]
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against... [more]
Over 80 recipes to master the most widely used penetration testing framework Overview * Special focus on the latest operating... [more]
This research presents the first countrywide view of victimisation in the Netherlands caused by 'offences with a digital component',... [more]
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers... [more]
Ensure you are prepared for your audit - find out what an ISO 27001 assessment is, why organisations bother with them, and... [more]
Bluetooth Security Attacks [more]
In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both... [more]
In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use... [more]
Beginning with the foundational and technical components of information security, this title focuses on access control models,... [more]
Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically,... [more]
A generation ago, cyberspace was just a term from science fiction, used to describe the nascent network of computers linking... [more]