Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while... [more]
This combination book and audio instructional program is designed to help non-native Americans speak standard American English... [more]
RAND conducted two discovery games to explore possible solutions for improving cybersecurity, assess their implications, and... [more]
Providing a comprehensive overview of both the theory and reality of privacy and the media in the 21st Century, Privacy and... [more]
<p>Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight... [more]
This book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood... [more]
A definitive guide to cybersecurity law Expanding on the author s experience as a cybersecurity lawyer and law professor,... [more]
Protecting Your Internet Identity illustrates the depth and importance of a person's online persona and reputation. This updated... [more]
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer... [more]
Serving as a reference for the security professional, this book covers aspects of security operations, from lighting and fencing... [more]
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with... [more]
The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual... [more]
A longtime chief scientist at Amazon shows how open data can make everyone, not just corporations, richer [more]
Building a Practical Information Security Program provides users with a strategic view on how to build an information security... [more]
This book gathers the proceedings of the 20th International Conference on Advanced Computer Systems 2016, held in Miedzyzdroje... [more]
Great commercial penetration testing tools can be expensive and sometimes hard to use or of questionable accuracy. This book... [more]
Facing Cyber Threats Head On explains battle against hackers as a fight between people, not technologies. Brian Minick offers... [more]
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks... [more]
Forensic image acquisition is an important part of post-mortem incident response and evidence collection. Digital forensic... [more]
Teaches you exactly how program memory content and organization is vital for computer security, especially Unix-like operating... [more]
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications... [more]
Bundles and Virtual Lab Access are available on the Ordering Options tab. For questions about this title, please contact... [more]
Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl,... [more]
This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition... [more]
Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression... [more]