Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Ensure you are prepared for your audit - find out what an ISO 27001 assessment is, why organisations bother with them, and... [more]
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack,... [more]
In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both... [more]
This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks... [more]
Beginning with the foundational and technical components of information security, this title focuses on access control models,... [more]
This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system,... [more]
Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically,... [more]
A generation ago, cyberspace was just a term from science fiction, used to describe the nascent network of computers linking... [more]
This book presents the most interesting talks given at ISSE 2013 - the forum for the inter-disciplinary discussion of how... [more]
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection... [more]
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and... [more]
Large-Scale Data Analytics [more]
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE... [more]
Discusses the foundations and theoretical aspects of ICT security. This title covers trends, analytics, assessments and frameworks... [more]
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security,... [more]
The transformation from traditional war between nation-states to conflict between nation-states and nonstate actors requires... [more]
Most books in cryptography deal with theory, generally introducing mathematically expressed algorithms without taking into... [more]
Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network... [more]
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications,... [more]
Helps readers in information security and in other professions become world-class social hacking chameleons. This book demonstrates... [more]
Modern Cryptography Primer [more]
Exploring the concepts of ethics, morality, and decision-making for the law enforcement community, Decision Point: Real-Life... [more]
Introduction to Public Key Infrastructures [more]
The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative... [more]