Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? This book helps... [more]
With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for... [more]
New in the Secure Beginner's Guide series, this complete, practical resource for security and IT professionals explains the... [more]
Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and... [more]
This book provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors... [more]
Assessing the strength of block ciphers is critical to public trust, as they ensure the security of internet traffic. This... [more]
This book explores security risks and vulnerabilities of computer networks and networked devices, offering improved algorithms... [more]
Constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety,... [more]
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused... [more]
Im Wirtschaftskreislauf entstehend Datensammlungen. Darin werden Informationen ber die wirtschaftliche T tigkeit von Unternehmen... [more]
GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including... [more]
The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance... [more]
We cannot make progress with human-to-machine authentication without understanding both humans and machines. Mobile security... [more]
The first full-scale overview of cybercrime, law, and policy [more]
Written for students and professionals in the fields of Criminal Justice, Homeland Security, National Security, and Intelligence,... [more]
Constitutes the refereed proceedings of the 6th International Conference on Information Processing, ICIP 2012, held in Bangalore,... [more]
This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems,... [more]
The next generation of Business Process Management (BPM) methods and tools will support the development of a new generation... [more]
Constitutes the refereed proceedings of the 5th International Conference on Convergence and Hybrid Information Technology,... [more]
This book features an in-depth overview of different topics concerning physical unclonable functions (PUFs), providing extensive... [more]
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information... [more]
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines... [more]
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no... [more]
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the... [more]
Opening with a detailed review of techniques for selective encryption, this book examines algorithms that combine encryption... [more]