Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer... [more]
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The... [more]
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different... [more]
Due to their always-on wireless connections, physical sensors, and location services, mobile devices are subject to unique... [more]
This book covers the major categories of malware that infect your enterprise computer systems. The book defines the security... [more]
Secure Smart Embedded Devices, Platforms and Applications [more]
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities,... [more]
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the... [more]
Author Mark Wireman helps software architects, developers, and security engineers gain an in-depth understanding of how to... [more]
Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications... [more]
Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how... [more]
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions.... [more]
This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who... [more]
This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering,... [more]
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving... [more]
This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the... [more]
Provides a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class... [more]
Offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against... [more]
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception,... [more]
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security,... [more]
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and... [more]
The current social and economic context increasingly demands open data to improve scientific research and decision making.... [more]
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means,... [more]
This book describes the design, development, and testing of a novel digital watermarking technique for color images using... [more]
The fast and easy way to secure your CISSP certification Are you a security professional seeking the valuable CISSP certification?... [more]