Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Profiling is a hot topic today. The post-9/11 War on Terrorism has engendered political, ethical, and scientific controversy... [more]
Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling... [more]
This book deals with the rise of criminal organizations on the Internet, their methods, their evolution, and the measures... [more]
This book constitutes the refereed proceedings of the 10th Asian Symposium on Programming Languages and Systems, APLAS 2012,... [more]
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational... [more]
A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa... [more]
This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus on secret-key... [more]
Create apps that are safe from hacking, attacks, and security breaches --Cover. [more]
Exploring the rise and political significance of the free and open source software (F/OSS) movement in the US and Europe,... [more]
This book explores security risks and vulnerabilities of computer networks and networked devices, offering improved algorithms... [more]
Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones,... [more]
This book describes the landscape of cloud computing from first principles, progressing step-by-step through the process of... [more]
Covering internet security, malware, phishing, and how to combat these serious and growing issues on both desktop and smart... [more]
A fully updated guide to CISSP certification CISSP certification is the most prestigious and highly valued of the security... [more]
This is the first book dedicated to understanding and fighting advanced persistent threats, today's most pernicious, most... [more]
Surveillance is a divisive issue-one might say it is inherently controversial. Used by private industry, law enforcement,... [more]
Constitutes the refereed proceedings of the 5th International Conference on Convergence and Hybrid Information Technology,... [more]
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information... [more]
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no... [more]
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and... [more]
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system... [more]
Featuring full coverage of v.8 of the Certified Ethical Hacker (CEH) certification exam from the EC-Council, this complete... [more]
An important resource for learning how to use the powerful Flex Platform to create compelling mobile applications that can... [more]
Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today's... [more]
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and... [more]