Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Security and Privacy in Biometrics [more]
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of... [more]
This is an introductory text to privacy and traffic analysis, a very important aspect of network security. [more]
Network Science and Cybersecurity [more]
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art... [more]
This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality... [more]
With the ever increasing demand for data/Internet services, engineers and scientists need to keep up with the technology and... [more]
Keeping pace with changes in laws and policies made by the Department of Homeland Security, this third edition continues to... [more]
Enables citizens and cyber professionals alike to conceive novel ideas and construct practical solutions for defending against... [more]
The rise of various demands in healthcare is driving innovation in healthcare information management. This book is the first... [more]
In this new book, Stiennon presents a comprehensive view of the technology, methodology, and tools needed to defend digital... [more]
In its revised fifth edition, this book covers ethical, social and policy challenges arising from the convergence of computing... [more]
Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks,... [more]
Exploring the rise and political significance of the free and open source software (F/OSS) movement in the US and Europe,... [more]
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach... [more]
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows... [more]
Cloud computing is a dramatically expanding area, becoming more and more commonly used by companies and businesses. However,... [more]
This book examines the history of profiling, the the basis for and theory behind profiling as well as profiling as it is currently... [more]
Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling... [more]
This book deals with the rise of criminal organizations on the Internet, their methods, their evolution, and the measures... [more]
This book constitutes the refereed proceedings of the 10th Asian Symposium on Programming Languages and Systems, APLAS 2012,... [more]
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational... [more]
A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa... [more]
This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus on secret-key... [more]
Create apps that are safe from hacking, attacks, and security breaches --Cover. [more]