Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features... [more]
Make sure you get the Information Security system that you need. [more]
The FBI estimates that billions of U.S. dollars are lost each year to foreign and domestic competitors who deliberately target... [more]
Security, Privacy and Trust in Cloud Systems [more]
Advancements in the area of networked information systems create endless possibilities and growth for the economic landscape,... [more]
In Cyber Crime, Security and Digital Intelligence, his second book on high technology risks, Mark Johnson goes far beyond... [more]
The 'Information Security Management Handbook' serves not only as an everyday reference for information security practitioners,... [more]
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an... [more]
This book details linguistic threshold schemes for information sharing. It examines the opportunities of using these techniques... [more]
Data encryption is a powerful tool, if used properly. This title provides with a step by step hands-on guide that includes:... [more]
Explores traditional concepts of critical infrastructure and the extent countries depend upon infrastructure over which they... [more]
Much debate has been given as to whether computer security is improved through the full disclosure of security vulnerabilities... [more]
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses... [more]
Security and Privacy in Biometrics [more]
Network Science and Cybersecurity [more]
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art... [more]
This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality... [more]
With the ever increasing demand for data/Internet services, engineers and scientists need to keep up with the technology and... [more]
Enables citizens and cyber professionals alike to conceive novel ideas and construct practical solutions for defending against... [more]
The rise of various demands in healthcare is driving innovation in healthcare information management. This book is the first... [more]
In this new book, Stiennon presents a comprehensive view of the technology, methodology, and tools needed to defend digital... [more]
Japanese edition of No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. The most detailed account... [more]
There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life.In... [more]
Exploring the rise and political significance of the free and open source software (F/OSS) movement in the US and Europe,... [more]
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows... [more]