Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Some people are paranoid about aliens invading America. Some are paranoid about Barack Obama being a Kenyan Muslim terrorist.... [more]
Looks at the phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget.... [more]
We live our lives online - banking, shopping, working, dating - but have we become complacent? This book exposes the shocking... [more]
Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these... [more]
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]
Most computer users are ignorant of the tracks, trails, and traces they leave behind when they use their computer. This book... [more]
This book, written by two leading experts in de-identification, explains how to adhere to regulations in a defensible way... [more]
This book covers applied cryptography in computerized telecommunication networks. The authors present key technologies, algorithms,... [more]
Provides the information that readers need to understand the advanced PCI Data Security standards, which have been updated... [more]
A practical guide to evaluating and managing identity theft and fraud risks for Canadian businesses, organizations and individuals.... [more]
In 1964, Bob Dylan wrote and released The Times They Are a-Changin,A a song that beautifully captured the turbulence of... [more]
This handy pocket guide will provide you with all the information you will need when considering how to approach the PCI DSS,... [more]
Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the... [more]
Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively... [more]
Many contend that our proliferating interactive media empower individuals and democratize society. But, Andrejevic asks, at... [more]
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because... [more]
Studies modern concepts of Computer Security. This book introduces the basic mathematical background necessary to enable the... [more]
The internet has become an integral part of modern life, in the classroom, the office, and the home. But as cyberspace grows... [more]
How to develop cryptosystems that utilize minimal resources to get maximum security. [more]
Keep track of your passwords and learn how to make them better You have dozens of passwords for dozens of uses, and it seems... [more]
A guide that skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.... [more]
Provides a complete overview of computer security and privacy. This book offers coverage of security theory, technology, and... [more]
Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients'... [more]
Surveillance is a divisive issue-one might say it is inherently controversial. Used by private industry, law enforcement,... [more]
Determann's field guide focusses on the compliance issues that are likely to be encountered by the majorities of companies.... [more]