Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Since being introduced in the late nineties, Cascading Style Sheets or CSS has become an indispensable tool for every web... [more]
Provides easy access to information on various aspects of cryptography and security. This work covers subject areas such as:... [more]
How did the European Union come to be the global leader in setting data privacy standards? And what is the significance of... [more]
In this revelation of how digital dossiers are created (usually without our knowledge), Daniel J. Solove argues that we must... [more]
This book is designed for any person, company, school or entity that wants to prevent the loss of their computer(s) and specifically... [more]
For governments and businesses, social movements and terrorists alike, IT is central to the way groups organize themselves... [more]
This hands-on guide to hacking Microsoft's powerful video games console starts with step-by-step tutorials on hardware modification... [more]
Offering a methodology for diagnosing and debugging computer programs, this text presents the act of debugging as an ideal... [more]
Computer Security is useful for computer security professionals and students. [more]
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits... [more]
A glimpse inside the mind of today's teenage hacker, including fascinating interviews with FBI agents, criminal psychologists,... [more]
A true-life account of computer espionage tells of a year-long single-handed hunt for a computer thief known as Hunter, a... [more]
Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without... [more]
Beginning with the foundational and technical components of information security, this title focuses on access control models,... [more]
The internet has become an integral part of modern life, in the classroom, the office, and the home. But as cyberspace grows... [more]
Preparing for the latest CCNA Security exam? Here are all the CCNA Security (210-260) commands you need in one condensed,... [more]
<p>By tracking the highly successful marketing tactics of Las Vegas casinos, and Caesars in particular, <span style="line-height:... [more]
Welcome to today's most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute... [more]
In this book we are going discuss the TTL of a Penetration, and in that we are going to talk a little bit about the differences... [more]
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert... [more]
Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate... [more]
Recent disclosures about the bulk collection of domestic phone call records and other signals intelligence programs have stimulated... [more]
The EC-Council-Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics... [more]