Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate... [more]
The inside story of the largest digital piracy sting to date. [more]
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of... [more]
Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information... [more]
There is extensive government research on cyber security science, technology, and applications. Much of this research will... [more]
Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers,... [more]
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and... [more]
Specifically oriented to the needs of information systems students, this book delivers the technology and developments from... [more]
A collection of articles that delves into the world of content management systems. [more]
Master Wireshark to solve real-world security problems If you don t already use Wireshark for a wide range of information... [more]
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's... [more]
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience... [more]
Among the features that make Noiseless Steganography: The Key to Covert... [more]
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography - the science of sending... [more]
The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual... [more]
Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns... [more]
Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers... [more]
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications... [more]
Revised edition of: D is for digital. 2011. [more]
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software,... [more]
This book investigates the intersection of terrorism, digital technologies... [more]
This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security... [more]
From Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies: past, present... [more]
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks... [more]
Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your... [more]