Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Here's an interesting revelation ...during the plague of Athens in 430 BC, the Greeks realized that people who had previously... [more]
Written by two renowned researchers, this graduate level textbook provides a thorough grounding in the field of cryptography.... [more]
Gotcha! Cyber security in a language anyone can understand, and not a moment too soon. This essential, easy-to-read, yet deeply... [more]
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of... [more]
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner... [more]
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the... [more]
You wake up and find out that you re being targeted for blackmail by a one night stand you met online, that your child has... [more]
Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures... [more]
Computer Security is useful for computer security professionals and students. [more]
An insider account of the security holes that left Google Mapsexposed <p>Hacking and Exposing Google Mapsis the story of... [more]
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for... [more]
Discusses the evolution of WHOIS and how policy changes will affect WHOIS place in IT today and in the future This book... [more]
A future with billions of connected things includes monumental security concerns. This practical book explores how malicious... [more]
This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that... [more]
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework... [more]
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital... [more]
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in... [more]
Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing.... [more]
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]
This comprehensive new resource presents a highly informative overview of cloud computing security issues. This book focuses... [more]
Examines the portfolio of tools funded by the State Department s Bureau of Democracy, Human Rights, and Labor that help support... [more]
Why did this former US Marine & ethical hacker intercept calls to the Secret Service and FBI, risking a life sentence? To... [more]
Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard... [more]
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology... [more]
This book provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication,... [more]