Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
From Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies: past, present... [more]
The Digital Hit Man is the only book that teaches people how to create and use deception for the purpose of combating sites... [more]
In Hacker's Delight, Second Edition, Hank Warren once again compiles an irresistible collection of programming hacks: timesaving... [more]
All That Matters about cyber crime and warfare. All That Matters books are a fast way to get right to the heart of key issues.... [more]
Max Vision Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to... [more]
A work from Cengage Learning on hands-on ethical hacking and network defense. [more]
If you're a security or network professional, you already know the do's and don'ts : run AV software and firewalls, lock... [more]
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad... [more]
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the... [more]
Game Hacking shows programmers how to dissect computer games and create bots. [more]
A comprehensive doctrinal analysis of cybercrime laws in four major common law jurisdictions: Australia, Canada, the UK and... [more]
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the... [more]
Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits-from the bestselling... [more]
An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator exam from EC-Council, the certifying body... [more]
Featuring full coverage of v.8 of the Certified Ethical Hacker (CEH) certification exam from the EC-Council, this complete... [more]
Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based... [more]
Klein tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code, poring... [more]
Kevin Mitnick's long-awaited memoir of computer hacking and FBI skirting, revealed now after seven years of government-mandated... [more]
Prepare for the new version of CEH certification with this advanced guide Once you learn the thought processes of unethical... [more]
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits... [more]
A glimpse inside the mind of today's teenage hacker, including fascinating interviews with FBI agents, criminal psychologists,... [more]
A true-life account of computer espionage tells of a year-long single-handed hunt for a computer thief known as Hunter, a... [more]
Cyber conflict is real, but is not changing the dynamics of international politics. In this study, the authors provide a realistic... [more]
Fully updated throughout and featuring 13 entirely new chapters, the new edition of this bestseller offers in-depth, advanced... [more]
<p>Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide<p>Security professionals remain in high... [more]