Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Data encryption is a powerful tool, if used properly. This title provides with a step by step hands-on guide that includes:... [more]
This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus on secret-key... [more]
Covering information security metrics, this book provides practical advice on how to specify, develop, use, and maintain a... [more]
* Makes deep mathematical problems accessible to computer scientists and engineers * Based on classroom tested materials... [more]
Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book... [more]
Public key cryptography is a major interdisciplinary subject with many real-world applications. This book has been carefully... [more]
This book introduces a novel Noiseless Steganography Paradigm (Nostega) that neither hides data in a noise nor produces noise;... [more]
Suitable for cryptographers, this book is self-contained; it presents background material to understand an algorithm and all... [more]
A guide that provides readers with comprehensive coverage of the technology used in e-discovery in civil and criminal cases.... [more]
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive... [more]
As a society that relies on technology to thrive, we face a growing number of potentially catastrophic threats to network... [more]
Provides a comprehensive framework of practices for assuring information security, told through a real-world story and based... [more]
Visual Cryptography and Secret Image Sharing [more]
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional... [more]
Deals with the national debate on protecting critical infrastructure. This book covers cyber security policy development for... [more]
An introduction that provides a focused tour of the central concepts of cryptography. It delineates cryptographic concepts... [more]
Designed for technologists or medical practitioners seeking to gain entry into the field of healthcare information systems,... [more]
Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and... [more]
Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous... [more]
Understand the building blocks of covert communication in digital media with this self-contained guide. Written in a simple... [more]
Internet Telephony is one of the most important and fastest growing technologies for emerging mobile networks, as it provides... [more]
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. This... [more]
2009 CHOICE AWARD OUTSTANDING ACADEMIC TITLE Information and communications security is a hot topic in private industry as... [more]
Presents an overview of Distributed Systems security concerns, challenges, processes and solutions. Discusses threats and... [more]
Offering practical advice along with templates, checklists, and directions to public domain information, this book assists... [more]