Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an... [more]
For courses in computer/network security Balancing principle and practice-an updated survey of the fast-moving world of computer... [more]
Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened?... [more]
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself... [more]
With this practical book, you'll learn the principles behind zero trust architecture, along with details necessary to implement... [more]
The objective of this edited book is to solicit state-of-the-art contributions from both scientists and practitioners working... [more]
This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and... [more]
This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS... [more]
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible... [more]
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers... [more]
Big data analytics provide more accurate, timely, and actionable decisions for both cybersecurity and IT management. This... [more]
This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and... [more]
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information... [more]
America's mass surveillance programs, once secret, can no longer be ignored. While Edward Snowden began the process in 2013... [more]
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth... [more]
The authors systematically review methods of online digital advertising (ad) fraud and the techniques to prevent and defeat... [more]
Digital Culture & Society is a refereed, international journal, fostering discussion about the ways in which digital technologies,... [more]
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people... [more]
This book will appeal to scholars in the Sociology of Work and Digital Labour Studies and anyone interested in learning about... [more]
Describes the availability of personnel with cyber skills in the private sector and the number of Army reserve component soldiers... [more]
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches,... [more]
With our use of technology increasing every day, its not surprising that our need for cybersecurity experts is also growing.... [more]
Despite the emergence of story after story about politically charged email hacks, corporate-security breaches, and secret... [more]
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning,... [more]