Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Securing information from insider threats needs to start early. Policies and procedures need to be in place to mitigate the... [more]
More than 100 malicious computer attacks (malware) occur every second. The skills required to analyze and assess these attacks... [more]
Based on unique and previously undocumented research, this book by noted forensic expert Jonathan Zdziarski shows the numerous... [more]
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH... [more]
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details... [more]
This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems,... [more]
Constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco,... [more]
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. This... [more]
'Gripping - A highly intense and enjoyable read.' Rolling Stone [more]
Filled with practice questions, this book covers what you need to know - and shows you how to prepare - for Clo-001 exam.... [more]
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is an invaluable resource to help you pursue the most recognized,... [more]
Developed from the author's popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic... [more]
Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute... [more]
Constitutes the refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research... [more]
Learn, prepare, and practice for CEH v8 exam success with Certified Ethical Hacker (CEH) Cert Guide from Pearson IT Certification,... [more]
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and... [more]
Containing the complete contents of Volumes 1-7, the Information Security Management Handbook, 2013 CD-ROM Edition is an authoritative... [more]
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something... [more]
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC... [more]
An increased interest in stream ciphers has recently been reflected in a number of applications for securing environments... [more]
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security... [more]
In 1964, Bob Dylan wrote and released The Times They Are a-Changin,A a song that beautifully captured the turbulence of... [more]
Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia... [more]
Identity theft (or identity fraud) has gained prominence as a pressing and prevalent social problem. This book provides a... [more]
Constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP... [more]