Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Internal auditors are expected to perform risk-based audits, but do so partially because they focus on financial and compliance... [more]
As Internet connectivity continues to spread, this book will offer readers greater awareness of the cyber threats of tomorrow-and... [more]
This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion... [more]
Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications... [more]
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies... [more]
This collection brings together strategies for advancing media reform, prepared by 33 scholars and activists from around the... [more]
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method... [more]
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis,... [more]
Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation... [more]
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures... [more]
Cisco Next-Generation Network Security products and solutions can help network security administrators achieve and maintain... [more]
This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate... [more]
31 Days Before Your CCNA Security Exam offers an engaging and practical way to understand the certification process, commit... [more]
With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.... [more]
This highly original book is an ethnographic noir of how Big Data profits from patient private health information. The book... [more]
The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is... [more]
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic... [more]
Where do data/privacy breaches commonly occur? How do you avoid them happening to you? Real-life cases (with hefty fines involved)... [more]
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by... [more]
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital... [more]
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills... [more]
Much as Che Guevara's book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution... [more]
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical... [more]
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility... [more]
This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise... [more]