Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This book explores security risks and vulnerabilities of computer networks and networked devices, offering improved algorithms... [more]
Provides the information that readers need to understand the advanced PCI Data Security standards, which have been updated... [more]
Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones,... [more]
This book describes the landscape of cloud computing from first principles, progressing step-by-step through the process of... [more]
A fully updated guide to CISSP certification CISSP certification is the most prestigious and highly valued of the security... [more]
Written for students and professionals in the fields of Criminal Justice, Homeland Security, National Security, and Intelligence,... [more]
Constitutes the refereed proceedings of the 5th International Conference on Convergence and Hybrid Information Technology,... [more]
Fully updated Sybex Study Guide for the industry-leading security certification: CISSP Security professionals consider... [more]
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information... [more]
In Hacker's Delight, Second Edition, Hank Warren once again compiles an irresistible collection of programming hacks: timesaving... [more]
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines... [more]
A practical guide to evaluating and managing identity theft and fraud risks for Canadian businesses, organizations and individuals.... [more]
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no... [more]
Opening with a detailed review of techniques for selective encryption, this book examines algorithms that combine encryption... [more]
Constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and... [more]
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic... [more]
An important resource for learning how to use the powerful Flex Platform to create compelling mobile applications that can... [more]
Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today,s... [more]
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and... [more]
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI),... [more]
Securing information from insider threats needs to start early. Policies and procedures need to be in place to mitigate the... [more]
More than 100 malicious computer attacks (malware) occur every second. The skills required to analyze and assess these attacks... [more]
Based on unique and previously undocumented research, this book by noted forensic expert Jonathan Zdziarski shows the numerous... [more]
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details... [more]
This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems,... [more]