Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Constitutes the refereed proceedings of the 5th International Conference on Convergence and Hybrid Information Technology,... [more]
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information... [more]
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no... [more]
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and... [more]
Featuring full coverage of v.8 of the Certified Ethical Hacker (CEH) certification exam from the EC-Council, this complete... [more]
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system... [more]
An important resource for learning how to use the powerful Flex Platform to create compelling mobile applications that can... [more]
Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today's... [more]
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and... [more]
With the multitude of existing attacks that are known to date and the number that will continue to emerge, software security... [more]
Securing information from insider threats needs to start early. Policies and procedures need to be in place to mitigate the... [more]
The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life.... [more]
Constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco,... [more]
This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems,... [more]
Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute... [more]
Constitutes the refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research... [more]
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and... [more]
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something... [more]
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC... [more]
An increased interest in stream ciphers has recently been reflected in a number of applications for securing environments... [more]
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security... [more]
Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia... [more]
Identity theft (or identity fraud) has gained prominence as a pressing and prevalent social problem. This book provides a... [more]
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents... [more]
Constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP... [more]