Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending... [more]
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography - the science of sending... [more]
Provides a non-technical approach to practical computer security for various users, from business professionals to students... [more]
Beginning with the foundational and technical components of information security, this title focuses on access control models,... [more]
Emphasizes the business approach and shows how security is important to be left in the hands of just one department or employee.... [more]
The inaugural research programme of the Institute for Mathematical Sciences at the National University of Singapore was devoted... [more]
An introduction to the science of codebreaking, explaining what algorithms do, how they are used, the risks associated with... [more]
This is a comprehensive, up-to-date revision of the market-leading CISSP training resource from the #1 name in IT security... [more]
Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts.... [more]
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment... [more]
A powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security.... [more]
Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks.... [more]
A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa... [more]
From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing:... [more]
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of... [more]
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less-and why we... [more]
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management... [more]
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to... [more]
The authors present the results of more than 20 years of research and teaching experience to help students bridge the gap... [more]
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make... [more]
Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image... [more]
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]
Group theoretic problems appear to be the most promising source of hard computational problems for deploying cryptographic... [more]
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography... [more]
Clarifies the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework... [more]