Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
From Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies: past, present... [more]
The Digital Hit Man is the only book that teaches people how to create and use deception for the purpose of combating sites... [more]
This is a fun, gossipy read about Black Hats - aka hackers. Not an alarmist book, it takes a balanced look at the hacking... [more]
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks with the tried-and-true Hacking Exposed way [more]
Fully up-to-date coverage of every topic on the CEH v9 certification exam [more]
All That Matters about cyber crime and warfare. All That Matters books are a fast way to get right to the heart of key issues.... [more]
<p>Updated for Windows 8 and the latest version of Linux <p>The best way to stay safe online is to stop hackers before they... [more]
Exploring the rise and political significance of the free and open source software (F/OSS) movement in the US and Europe,... [more]
Max Vision Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to... [more]
The compelling true story of the computer underground and the bizarre lives and crimes of an elite group of young Australian... [more]
Provides information about the many methods of trickery that hackers use in order to gather information with the intent of... [more]
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource to help you pursue the most recognized,... [more]
A work from Cengage Learning on hands-on ethical hacking and network defense. [more]
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means,... [more]
The Car Hacker's Handbook shows how to identify vulnerabilities in modern automotive vehicles. [more]
In the early 1990s, the First National Bank of Keystone in West Virginia began buying and securitizing subprime mortgages... [more]
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework... [more]
Steven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary... [more]
Deals with computers/software. [more]
A glimpse inside the mind of today's teenage hacker, including fascinating interviews with FBI agents, criminal psychologists,... [more]
Game Hacking shows programmers how to dissect computer games and create bots. [more]
Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation... [more]
The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your... [more]
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting:... [more]
Charlie Mitchell reveals the innovative and too-often hapless government and industry responses to growing cybersecurity threats.... [more]