Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing... [more]
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management... [more]
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use,... [more]
This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures... [more]
The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security,... [more]
This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS... [more]
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview *... [more]
What Is Computer Science? [more]
Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry... [more]
This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and... [more]
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer... [more]
This book addresses the integration of new devices (such as the iPhone), new technologies (such as cloud computing and green... [more]
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned... [more]
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures... [more]
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists... [more]
This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie,... [more]
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during... [more]
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity... [more]
This guide, updated to reflect ISO27001:2013, presents the compelling business case for implementing ISO27001 in order to... [more]
This book explores the extraordinary difficulties a nation-state's law enforcement and military face in attempting to prevent... [more]
What will business software look like in the future? And how will it be developed? This book covers the proceedings of the... [more]
This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held... [more]
* Covers all aspects of Sonar * Easy to follow examples * Makes achieving quality code easy For developers who want a much... [more]
Examines the elements of computer security, employee roles and responsibilities, and common threats. This book presents a... [more]
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against... [more]