Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level... [more]
Author Mark Wireman helps software architects, developers, and security engineers gain an in-depth understanding of how to... [more]
<b>From the three-time Pulitzer Prize-winning author of the <i>New York Times</i> bestseller <i>Angler</i>, who unearthed... [more]
Provides a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class... [more]
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different... [more]
This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential... [more]
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and... [more]
This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated... [more]
This book provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their... [more]
This book explores the difficulties and challenges of securing user data and information on mobile cloud platforms, investigating... [more]
This book describes the design, development, and testing of a novel digital watermarking technique for color images using... [more]
This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph,... [more]
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It... [more]
A ground shaking expose on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity... [more]
The Car Hacker's Handbook shows how to identify vulnerabilities in modern automotive vehicles. [more]
This collection brings together strategies for advancing media reform, prepared by 33 scholars and activists from around the... [more]
Provides the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques... [more]
Features a comprehensive discussion on the trending topics and emergent research in IT security and governance. This publication... [more]
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop... [more]
Techniques for Cryptanalysis of Block Ciphers [more]
The EC-Council-Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics... [more]
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational... [more]
Expose trends that cybersecurity professionals in the nation are dealing with so that you, the individual security expert,... [more]
As an under-studied area of academic research, the analysis of computer network traffic data is still in its infancy. However,... [more]