Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending... [more]
Emphasizes the business approach and shows how security is important to be left in the hands of just one department or employee.... [more]
An introduction to the science of codebreaking, explaining what algorithms do, how they are used, the risks associated with... [more]
The non-technical handbook for cyber security in the insurance industry Solving Cyber Risk distills a decade of research... [more]
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment... [more]
A powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security.... [more]
A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa... [more]
From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing:... [more]
Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks.... [more]
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of... [more]
Among the features that make Noiseless Steganography: The Key to Covert... [more]
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management... [more]
Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority... [more]
The authors present the results of more than 20 years of research and teaching experience to help students bridge the gap... [more]
Group theoretic problems appear to be the most promising source of hard computational problems for deploying cryptographic... [more]
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive... [more]
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make... [more]
Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image... [more]
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography... [more]
Clarifies the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework... [more]
Illustrating the power of algorithms, this book describes algorithmic methods with cryptographically relevant examples. Focusing... [more]
A how-to guide for implementing algorithms and protocols. Addressing real-world implementation issues, it emphasizes cryptographic... [more]
Offers an approach to developing and implementing relevant security metrics essential for effective security management. This... [more]
Shows you how to design a secure multimedia encryption scheme. This title begins with the history of multimedia encryption... [more]