Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Written by a globally-recognized expert on the topic, this in-depth guide reveals the art of mobile forensics investigation... [more]
Gotcha! Cyber security in a language anyone can understand, and not a moment too soon. This essential, easy-to-read, yet deeply... [more]
CISSP Study Guide - fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security... [more]
A sobering and insightful book on the dangers of cybercrime and its potentially catastrophic consequences. [more]
Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and... [more]
<p>Half of Russiaâ€™s email traffic passes through an ordinary looking building in an otherwise residential... [more]
This title introduces nearly all aspects of web security. It reveals how hackers work and explains why companies of different... [more]
Businesses are frequently under attack by rivals and antagonists, and their reputations can be ruined by false websites, hacking... [more]
The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account... [more]
Specifically oriented to the needs of information systems students, this book delivers the technology and developments from... [more]
Provides complete, focused coverage to prepare students and professionals alike for success on the Certified Information Systems... [more]
As a result of a rigorous, methodical process that (ISC)^2 follows to routinely update its credential exams, it has announced... [more]
Fully up-to-date coverage of every topic on the CEH v9 certification exam [more]
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed... [more]
<p>Thereâ€™s an online epidemic that costs governments billions and threatens the personal security of consumers... [more]
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems... [more]
<strong>SAVE when you buy the CISSP(r) Boxed Set, plus bonus DVD!</strong></p> <strong>Bonus DVD contains audio and video... [more]
Revised and updated for the 2015 CISSP body of knowledge, this new edition by Fernando Maymi continues Shon Harris's bestselling... [more]
This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures... [more]
Helps users hone essential information security skills by applying their knowledge to detailed, realistic exercises using... [more]
Written by leading information security educators, this fully revised, full-color textbook teaches key computer security concepts... [more]
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers... [more]
Examines the elements of computer security, employee roles and responsibilities, and common threats. This book presents a... [more]
All That Matters about cyber crime and warfare. All That Matters books are a fast way to get right to the heart of key issues.... [more]
Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security... [more]