Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in... [more]
Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded,... [more]
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service... [more]
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress... [more]
This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory... [more]
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop... [more]
Although there are already some books published on Big Data, most of them only cover basic concepts and society impacts and... [more]
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to... [more]
Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks,... [more]
First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company. [more]
Digital rights management (DRM) is a type of server software developed to enable secure distribution to disable illegal distribution... [more]
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on... [more]
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication... [more]
Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization's business processes... [more]
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted... [more]
A leading expert in cyberspace policy shows how governments are waging war online-and the chilling implications for geopolitics,... [more]
Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority... [more]
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive... [more]
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire... [more]
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been... [more]
Here's an interesting revelation ... during the plague of Athens in 430 BC, the Greeks realized that people who had previously... [more]
This incisive investigation into the Kremlin's massive online surveillance state and the activists and rebels trying to take... [more]
Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere... [more]
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking... [more]
The authors present the results of more than 20 years of research and teaching experience to help students bridge the gap... [more]