Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Constitutes the refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research... [more]
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and... [more]
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access... [more]
Utilizing an incremental development method called knowledge scaffolding--a proven educational technique for learning subject... [more]
Enlarged and updated for its second edition, this highly readable book addresses four fundamental problems: the number of... [more]
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something... [more]
The fourth edition of Principles of Information Security explores the field of information security and assurance with updated... [more]
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use... [more]
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality... [more]
From cartwheels to flips, gymnastics can be a lot of fun. Readers will learn how to do basic gymnastics movements and find... [more]
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC... [more]
To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential.... [more]
Since 2001, the CERT(R) Insider Threat Center at Carnegie Mellon University,s Software Engineering Institute (SEI) has collected... [more]
Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia... [more]
Keeping one's computer fast, safe, and running reliably is the object of this helpful guide that explains the process of machine... [more]
Constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP... [more]
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework,... [more]
Applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses'... [more]
The modern world is fraught with risk, from natural disasters and terrorist attacks, to financial crises and pandemics. Assessing... [more]
Ace your preparation for CompTIA Security+ Exam SY0-301 with this 2-in-1 Training Kit from Microsoft Press(R). Work at your... [more]
Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA) [more]
The ability of law enforcement agencies to manage intelligence is key to fighting the war on terror, and a critical foundation... [more]
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations... [more]