Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are... [more]
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the... [more]
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and... [more]
Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud.... [more]
Regulation, risk awareness and technological advances are more and more drawing identity search requirements into business,... [more]
Using a holistic approach, this book delivers complex information in an accessible way. The author addresses the importance... [more]
The text allows readers to learn about software security from a renowned security practitioner who is the appointed software... [more]
Cyber-physical systems (CPSs) have quickly become one of the hottest computer applications today. With their tight integration... [more]
Secure Smart Embedded Devices, Platforms and Applications [more]
Security, Privacy and Trust in Cloud Systems [more]
Advancements in the area of networked information systems create endless possibilities and growth for the economic landscape,... [more]
In Cyber Crime, Security and Digital Intelligence, his second book on high technology risks, Mark Johnson goes far beyond... [more]
An examination of computer-related crime and its investigation on the market, this text includes an exhaustive discussion... [more]
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date... [more]
This book offers comprehensive discussion of current wireless network security technologies, vulnerabilities and potential... [more]
A thrilling, exclusive exposae of the hacker collectives Anonymous and LulzSec. [more]
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an... [more]
Looks at traditional concepts of critical infrastructure and the extent countries depend upon infrastructure over which they... [more]
The Routledge Handbook of International Crime and Justice Studies presents the enduring debates and emerging challenges in... [more]
In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an... [more]
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses... [more]
While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent... [more]
As organizations deploy business intelligence and analytic systems to harness business value from their data assets, data... [more]
Network Science and Cybersecurity [more]
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the... [more]