Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Revised edition of the author's Implementing digital forensic readiness,  [more]
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages,... [more]
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill... [more]
Based on author's thesis (doctoral - Tilburg University, 2016) issued under title: Breaking and remaking law and technology:... [more]
Focusing on the phenomenon of terrorism in the age of ISIS/ISIL, Terrorism and Counterterrorism investigates this form of... [more]
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different... [more]
The last twenty years have seen an explosion in the development of information technology, to the point that people spend... [more]
In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities... [more]
Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different... [more]
Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages... [more]
Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing... [more]
Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially,... [more]
This volume explores the contemporary challenges to US national cybersecurity.<br... [more]
The Microsoft Official Academic Course (MOAC) textbook for Securing Windows Server 2016 Exam 70-744 is focused primarily on... [more]
Discover simple strategies for protecting your personal and confidential information on and offline with this essential and... [more]
An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives,... [more]
This textbook offers an accessible introduction to the historical, technical, and strategic context of cyber conflict.<br... [more]
A foundational analysis of the co-evolution of the internet and international relations, examining resultant challenges for... [more]
How disputes over privacy and security have shaped the relationship between the European Union and the United States and what... [more]
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient... [more]
This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud... [more]
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the... [more]
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in... [more]
This book presents a framework to model the main activities of information security management and governance. The same model... [more]
The growing complexity of today's interconnected systems has not only increased the need for improved information security,... [more]