Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Intends to assist the security professional in identifying what systems are required to meet security needs as defined by... [more]
Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components... [more]
Includes a coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security. This title... [more]
A guide to effective security for both voice and data wireless networks. It offers the conceptual and practical tools every... [more]
Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress... [more]
Deals with the topic of database security and auditing. This book covers diverse topics that include different aspects of... [more]
The Cisco Pix firewall is a market leading firewall. This title covers the objectives on the Cisco Pix certification exam.... [more]
Contains sections that include Coding, which covers the basics in coding complemented with programming tips and tricks in... [more]
Talks about software piracy - what it is and how it's done. This book describes how software piracy is actually being carried... [more]
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved... [more]
The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millenium Bug'. Strategies... [more]
This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods... [more]
Reviews various developments in security, with an emphasis on the protection of databases. This book covers such topics as... [more]
Robotics for safety and security, safety recovery systems, visual surveillance and monitoring, and transportation systems... [more]
Addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume... [more]
Discusses the advancements in computer security policy, firewalls, and security issues related to passwords. This work addresses... [more]
Offers advice to help organizations improve their security and reduce possible risks of malicious code attacks. This book... [more]
Enhance the digital security knowledge--base within any organization In todaya s competitive business environment, information... [more]
The growing connectivity among secure and insecure networks has created opportunities for unauthorized intrusions into sensitive... [more]
Shows readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed... [more]
Offers coverage of established theories and developments on information and computer security. This text contains 207 articles... [more]
Focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. This book... [more]
Discusses cryptography at the level that developers need to know to work with the JCE and with their own applications. This... [more]
Addresses the operational and day-to-day security management requirements of 21st century companies. This comprehensive wireless... [more]
Describes recent discoveries on how to design advanced malicious computer viruses, worms, and Trojan horses. The area in question... [more]