Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
... the best introduction to cryptography I've ever seen... The book the National Security Agency wanted never to be published...... [more]
Essential advice for every ISO27001 project - including ISO27001:2013 [more]
In Resilient Thinking, Phillip Wood discusses the importance of thinking laterally about potential impacts on your organisation... [more]
GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including... [more]
<p> Cyberlibel: Information Warfare in the 21st Century? by David A. Potts brings years of research and experience in libel... [more]
Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing... [more]
The Definitive Guide to the C&A Transformation provides an authoritative guide to authorization for persons with knowledge... [more]
Preventive strategies for deterring today's most malicious and least understood risks to enterprise security [more]
This book explains current data protection and storage technologies in everyday terms. It describes effective procedures for... [more]
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing... [more]
This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures... [more]
DESCRIPTION Active Directory is the heart of a Windows network, providing a centralized location for administration, security,... [more]
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal... [more]
Must-have book from one of the world's experts on threat modeling Adam Shostak is responsible for security development lifecycle... [more]
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target... [more]
The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security,... [more]
In the world of technology, cybersecurity is, without a doubt, one of the most dynamic topics of our times. Protecting Our... [more]
This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS... [more]
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview *... [more]
This engaging and accessible book presents a set of representative concepts connected by the theme of information security,... [more]
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures... [more]
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists... [more]
This exploration of the issues surrounding the use of biometrics in an increasingly interconnected world moves the debate... [more]
This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie,... [more]
This book offers insights into understanding why infrastructures can and do fail in crisis situations, and how to mitigate... [more]