Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This book covers database security from all aspects of protecting data accessibility and availability. Coverage ranges from... [more]
Teaches you exactly how program memory content and organization is vital for computer security, especially Unix-like operating... [more]
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications... [more]
Bundles and Virtual Lab Access are available on the Ordering Options tab. For questions about this title, please contact... [more]
Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl,... [more]
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer... [more]
This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on... [more]
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The... [more]
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different... [more]
This book covers the major categories of malware that infect your enterprise computer systems. The book defines the security... [more]
Due to their always-on wireless connections, physical sensors, and location services, mobile devices are subject to unique... [more]
This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who... [more]
This book describes the primary uses for Trusted Platform Modules (TPMs) and practical considerations such as when TPMs can... [more]
This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level... [more]
As a society that has revered learning and education for millennia, China has a long history of valuing information. As early... [more]
Author Mark Wireman helps software architects, developers, and security engineers gain an in-depth understanding of how to... [more]
There is a lot of buzz about Bitcoin and Blockchain lately, our expert authors will help to answer some imperative questions... [more]
This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential... [more]
Provides a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class... [more]
This book provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their... [more]
Offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against... [more]
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and... [more]
This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated... [more]
This book explores the difficulties and challenges of securing user data and information on mobile cloud platforms, investigating... [more]
This book describes the design, development, and testing of a novel digital watermarking technique for color images using... [more]