Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This text covers... [more]
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography... [more]
Clarifies the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework... [more]
Illustrating the power of algorithms, this book describes algorithmic methods with cryptographically relevant examples. Focusing... [more]
A how-to guide for implementing algorithms and protocols. Addressing real-world implementation issues, it emphasizes cryptographic... [more]
Offers an approach to developing and implementing relevant security metrics essential for effective security management. This... [more]
Shows you how to design a secure multimedia encryption scheme. This title begins with the history of multimedia encryption... [more]
Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. This... [more]
Security engineering is different from any other kind of programming... if you're even thinking of doing any security engineering,... [more]
Offers students and researchers with mechanical information regarding digital watermarking and steganography. This work provides... [more]
Details the applications needed to investigate properties of PNs relevant to the improvement of modern wireless systems. This... [more]
Employees know a company's computer system better than anyone and have access to important information about the company and... [more]
Offers information needed to track, monitor, investigate, document, and preserve both authorized and unauthorized actions... [more]
Since 2004, built-in security measures on compilers and operating systems have become commonplace. The black hats have kept... [more]
User identification and authentication are essential to modern security. This book presents the general philosophy of user... [more]
Describes the essential software security concepts that are needed to conduct relevant and effective tests. This book considers... [more]
Provides a compilation of the fundamental knowledge, skills, techniques, and tools required of IT security professional. It... [more]
Examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured... [more]
Defines more than 900 metrics measuring compliance with legislation, resiliency of security controls, and return on investment.... [more]
The Certified Information Security Manager[registered] certification program has been designed specifically for experienced... [more]
Offers explanations of key issues in information protection, describing the basic structure of information protection and... [more]
Presents a perspective of the ISO/IEC 17799 Information Security Standard and provides an analysis of how to effectively measure... [more]
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data... [more]
Exploring the evolution of IS, this book incorporates the knowledge that has pushed the information security life cycle from... [more]