Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This report, the second in a series, reveals insights from chief information security officers; examines network defense measures... [more]
The practical guide to implementing Bitcoin and other alt currencies in your business<p>Bitcoin Payments, Implementing Secure... [more]
<p>Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted... [more]
This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by... [more]
If a major event such as a terrorist attack, 7.2 earthquake, tsunami, or hacker attack were to disrupt business operations,... [more]
This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security... [more]
The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking... [more]
The ever increasing use of computers, networks and the Internet has led to the need for regulation in the fields of cybercrime,... [more]
This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces... [more]
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national... [more]
Earlier edition authored by James P. Muuss and David Rabern. [more]
The Internet in Russia is either the most efficient totalitarian tool or the device by which totalitarianism will be overthrown.... [more]
This book examines the most recent and contentious issues in relation to cybercrime facing the world today, and how best to... [more]
Learn about the history of internet security and find out what it takes to make it in this exciting career field -- [more]
OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for... [more]
This title introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different... [more]
This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST... [more]
This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating... [more]
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the... [more]
This book constitutes the refereed proceedings of the 16th International Conference on Passive and Active Measurement, PAM... [more]
New Media Politics: Rethinking Activism and National Security in Cyberspace explores many of the questions surrounding the... [more]
This book outlines social and moral guidelines to combat violent, hateful, and illegal activity on the Internet. [more]
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography,... [more]
Cyber conflict is real, but is not changing the dynamics of international politics. In this study, the authors provide a realistic... [more]