Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Provides an introduction to network and computer security. This title maps to the new CompTIA Security+ SY0-401 Certification... [more]
The field of computer forensics has experienced significant growth recently and those looking to get into the industry have... [more]
Focusing on both the private security professional and the consumer of corporate investigative services, this text provides... [more]
Provides you with fundamental knowledge of information security in both theoretical and practical aspects. This title covers... [more]
Max Vision Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to... [more]
A work from Cengage Learning on hands-on ethical hacking and network defense. [more]
If you're a security or network professional, you already know the do's and don'ts : run AV software and firewalls, lock... [more]
Author Mark Wireman helps software architects, developers, and security engineers gain an in-depth understanding of how to... [more]
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad... [more]
This book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C... [more]
Written by a globally-recognized expert on the topic, this in-depth guide reveals the art of mobile forensics investigation... [more]
This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that... [more]
Bitcoin is the first application to emerge from the underlying blockchain technology, and others that follow might have more... [more]
Examines how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle... [more]
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner... [more]
Due to their always-on wireless connections, physical sensors, and location services, mobile devices are subject to unique... [more]
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the... [more]
Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard... [more]
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES The Second Edition of Security... [more]
Gotcha! Cyber security in a language anyone can understand, and not a moment too soon. This essential, easy-to-read, yet deeply... [more]
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of... [more]
You wake up and find out that you re being targeted for blackmail by a one night stand you met online, that your child has... [more]
Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures... [more]
Computer Security is useful for computer security professionals and students. [more]