Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Examines how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle... [more]
This book provides international perspective for those studying or working in the security domain, from enforcement to policy.... [more]
Despite the pervasiveness of the Internet and its importance to a wide range of state functions, we still have little understanding... [more]
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence... [more]
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent... [more]
This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September... [more]
Here's an interesting revelation ...during the plague of Athens in 430 BC, the Greeks realized that people who had previously... [more]
Written by two renowned researchers, this graduate level textbook provides a thorough grounding in the field of cryptography.... [more]
Gotcha! Cyber security in a language anyone can understand, and not a moment too soon. This essential, easy-to-read, yet deeply... [more]
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of... [more]
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner... [more]
A successor to the popular Artech House title Information Hiding Techniques for Steganography and Digital Watermarking, this... [more]
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day... [more]
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the... [more]
You wake up and find out that you re being targeted for blackmail by a one night stand you met online, that your child has... [more]
Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures... [more]
Computer Security is useful for computer security professionals and students. [more]
An insider account of the security holes that left Google Mapsexposed <p>Hacking and Exposing Google Mapsis the story of... [more]
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for... [more]
Discusses the evolution of WHOIS and how policy changes will affect WHOIS place in IT today and in the future This book... [more]
A future with billions of connected things includes monumental security concerns. This practical book explores how malicious... [more]
This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and... [more]
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework... [more]
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital... [more]
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology... [more]