Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Secure Smart Embedded Devices, Platforms and Applications [more]
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities,... [more]
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the... [more]
As a society that has revered learning and education for millennia, China has a long history of valuing information. As early... [more]
Author Mark Wireman helps software architects, developers, and security engineers gain an in-depth understanding of how to... [more]
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions.... [more]
This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who... [more]
There is a lot of buzz about Bitcoin and Blockchain lately, our expert authors will help to answer some imperative questions... [more]
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information... [more]
This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential... [more]
This book provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their... [more]
Offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against... [more]
Provides a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class... [more]
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception,... [more]
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and... [more]
This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated... [more]
The current social and economic context increasingly demands open data to improve scientific research and decision making.... [more]
This book describes the design, development, and testing of a novel digital watermarking technique for color images using... [more]
The previously untold and previously highly classified story of the conflux of espionage and technology, with a compelling... [more]
Provides the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques... [more]
Features a comprehensive discussion on the trending topics and emergent research in IT security and governance. This publication... [more]
Techniques for Cryptanalysis of Block Ciphers [more]
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational... [more]
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history,... [more]
As an under-studied area of academic research, the analysis of computer network traffic data is still in its infancy. However,... [more]