Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
IKEv2 IPsec Virtual Private Networks is the first plain English introduction to IKEv2: both a complete primer on this important... [more]
Computers and computer networking provide major benefits to modern society, yet the growing costs of malicious cyber activities... [more]
This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security... [more]
Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information... [more]
Full-length practice tests covering all CISSP domains for the ultimate in exam prep The CISSP Official (ISC)2 Practice Tests... [more]
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and... [more]
This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate... [more]
This collection brings together strategies for advancing media reform, prepared by 33 scholars and activists from around the... [more]
Big data requires big security; here's what you need to know More data is collected, at a higher speed, in more formats... [more]
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means,... [more]
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical... [more]
This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise... [more]
Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation... [more]
This book discusses data privacy in banking and financial services, anonymization principles and practice, test data management,... [more]
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given... [more]
Internal auditors are expected to perform risk-based audits, but do so partially because they focus on financial and compliance... [more]
Cisco Next-Generation Network Security products and solutions can help network security administrators achieve and maintain... [more]
31 Days Before Your CCNA Security Exam 31 Days Before Your CCNA Security Exam offers you an engaging and practical way to... [more]
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis,... [more]
Provides a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class... [more]
The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your... [more]
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills... [more]
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic... [more]
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by... [more]