Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Comprehensive coverage of the new CASP exam, with hands-on practice and interactive study tools The CASP CompTIA Advanced... [more]
This volume explores the contemporary challenges to US national cybersecurity.<br... [more]
The Microsoft Official Academic Course (MOAC) textbook for Securing Windows Server 2016 Exam 70-744 is focused primarily on... [more]
Discover simple strategies for protecting your personal and confidential information on and offline with this essential and... [more]
This textbook offers an accessible introduction to the historical, technical, and strategic context of cyber conflict.<br... [more]
A foundational analysis of the co-evolution of the internet and international relations, examining resultant challenges for... [more]
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient... [more]
This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud... [more]
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the... [more]
This book presents a framework to model the main activities of information security management and governance. The same model... [more]
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in... [more]
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction... [more]
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students.... [more]
The successes and failures of an industry that claims to protect and promote our online identities What does... [more]
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required... [more]
The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers... [more]
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach... [more]
Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security... [more]
A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa... [more]
This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication... [more]
The non-technical handbook for cyber security in the insurance industry Solving Cyber Risk distills a decade of research... [more]
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers... [more]
This book will help IT and business operations managers who have been tasked with addressing security issues. It provides... [more]
The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition,... [more]
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. [more]