Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending... [more]
Emphasizes the business approach and shows how security is important to be left in the hands of just one department or employee.... [more]
An introduction to the science of codebreaking, explaining what algorithms do, how they are used, the risks associated with... [more]
Since its publication,Security Analysis by Graham and Dodd has been the investment bible and has sold more than 750,000 copies.... [more]
Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security... [more]
The non-technical handbook for cyber security in the insurance industry Solving Cyber Risk distills a decade of research... [more]
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment... [more]
Beginning with the foundational and technical components of information security, this title focuses on access control models,... [more]
A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa... [more]
From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing:... [more]
Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks.... [more]
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of... [more]
Specifically oriented to the needs of information systems students, this book delivers the technology and developments from... [more]
Among the features that make Noiseless Steganography: The Key to Covert... [more]
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography - the science of sending... [more]
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management... [more]
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to... [more]
Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks,... [more]
Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority... [more]
The authors present the results of more than 20 years of research and teaching experience to help students bridge the gap... [more]
Group theoretic problems appear to be the most promising source of hard computational problems for deploying cryptographic... [more]
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive... [more]
Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book... [more]
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make... [more]
Provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This text covers... [more]