Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and... [more]
Security and Management is a compendium of articles and papers that were presented at SAM '15, an international conference... [more]
Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states,... [more]
Safeguarding Our Privacy and Our Values in an Age of Mass Surveillance America's mass surveillance programs, once secret,... [more]
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive... [more]
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework... [more]
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you... [more]
A sobering and insightful book on the dangers of cybercrime and its potentially catastrophic consequences. [more]
This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various... [more]
This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system,... [more]
Countries are increasingly introducing data localization laws and data export restrictions, threatening digital globalization... [more]
Develop, deploy, and administer an effective security framework for IoT-oriented products and services [more]
Provides a systematic technical overview of digital forensic techniques, primarily from the point of view of computer science.... [more]
How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify... [more]
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set... [more]
This book provides a high-level discussion on the roles and responsibilities of a CISO or an equivalent authority in charge... [more]
This book is an essential reference source for the latest scholarly research on the various types of unauthorized access or... [more]
Blockchain technology, one of the most buzzed-about yet least understood technological innovations of recent years, is at... [more]
This book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood... [more]
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing... [more]
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating... [more]
Advanced Persistent Threat Modeling is an in-depth guide to targeting and compromising high-security environments. With it,... [more]
How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations... [more]
This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International... [more]
Building a Practical Information Security Program provides users with a strategic view on how to build an information security... [more]