Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH... [more]
Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based... [more]
This study describes deployed applications of game theory for security for the LAX police and US Federal Air Marshals Service.... [more]
The Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network... [more]
In Worm, one of the world's biggest selling authors of narrative non-fiction returns to bestselling form. [more]
Sponsored by the National Institute of Standards and Technology. [more]
Takes an approach to making Industrial control systems safe from such cyber attacks: design the controls systems themselves... [more]
The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. This book deals with... [more]
Kevin Mitnick's long-awaited memoir of computer hacking and FBI skirting, revealed now after seven years of government-mandated... [more]
Provides a compilation of the fundamental knowledge, skills, techniques, and tools required of IT security professional. It... [more]
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant... [more]
Provides an inclusive analysis of the topics covered on the ISSEP Exam. This guide to the test promotes understanding of the... [more]
Provides information about the many methods of trickery that hackers use in order to gather information with the intent of... [more]
These self-study resources are built with the objective of providing assessment, review, and practice to help ensure you are... [more]
Prepare for the new version of CEH certification with this advanced guide Once you learn the thought processes of unethical... [more]
This book provides information security and risk management teams with detailed, practical guidance on how to develop and... [more]
Cybercrime is on the move. Cybercrime and related forms of malicious activity will seek out your weak points in order to exploit... [more]
Information Security in Healthcare is an essential guide for implementing a comprehensive information security management... [more]
Suitable for both the novice and expert in IT security and industrial control systems (ICS), this book helps readers gain... [more]
Get ready for the latest Certified Ethical Hacker exam with the only book authorized by the creators of the certification,... [more]
Hospitals, doctors' offices, and pharmacies are sitting on some very valuable information - your medical information. This... [more]
A rigorous treatment of Encryption, Signatures, and General Cryptographic Protocols, emphasizing fundamental concepts. [more]
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals,... [more]
Arguing that privacy concerns should not be limited solely to concern about control over personal information, this book counters... [more]
An international group of leading academics, information security professionals, and other area experts analyze the complicated... [more]