Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
From Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies: past, present... [more]
In Cybersecurity and Cyberwar: What Everyone Needs to Know(R), New York Times bestselling author P. W. Singer and noted cyber... [more]
The Digital Hit Man is the only book that teaches people how to create and use deception for the purpose of combating sites... [more]
Provides information about the many methods of trickery that hackers use in order to gather information with the intent of... [more]
This is a fun, gossipy read about Black Hats - aka hackers. Not an alarmist book, it takes a balanced look at the hacking... [more]
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials... [more]
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks with the tried-and-true Hacking Exposed way [more]
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad... [more]
A comprehensive doctrinal analysis of cybercrime laws in four major common law jurisdictions: Australia, Canada, the UK and... [more]
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the... [more]
Fully up-to-date coverage of every topic on the CEH v9 certification exam, plus one year of access* to the complete Ethical... [more]
Hundreds of accurate practice questions-thoroughly revised for the CEH v9 exam [more]
Fully up-to-date coverage of every topic on the CEH v9 certification exam [more]
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical... [more]
All That Matters about cyber crime and warfare. All That Matters books are a fast way to get right to the heart of key issues.... [more]
Exploring the rise and political significance of the free and open source software (F/OSS) movement in the US and Europe,... [more]
Klein tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code, poring... [more]
Max Vision Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to... [more]
The compelling true story of the computer underground and the bizarre lives and crimes of an elite group of young Australian... [more]
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource to help you pursue the most recognized,... [more]
CNN is reporting that a vicious new virus is wreaking havoc on the world's computer networks. Somebody's hacked one of your... [more]
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating... [more]
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the... [more]
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer... [more]
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different... [more]