Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Indigenous communities are typically those that challenge the laws of the nation states of which they have become-often very... [more]
Aims to map to the exam objectives for the Security Certified Network Professional exam. [more]
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach... [more]
The field of computer forensics has experienced significant growth recently and those looking to get into the industry have... [more]
Provides an introduction to network and computer security. This title maps to the new CompTIA Security+ SY0-401 Certification... [more]
Suitable for readers who want to help organizations protect critical information assets and secure their systems and networks,... [more]
The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life.... [more]
Focusing on both the private security professional and the consumer of corporate investigative services, this text provides... [more]
As a society that relies on technology to thrive, we face a growing number of potentially catastrophic threats to network... [more]
Looks at the phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget.... [more]
Provides you with fundamental knowledge of information security in both theoretical and practical aspects. This title covers... [more]
Provides a comprehensive framework of practices for assuring information security, told through a real-world story and based... [more]
Provides an overview of information security and its relationship to the information needs of an organization. This book guides... [more]
Max Vision Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to... [more]
The compelling true story of the computer underground and the bizarre lives and crimes of an elite group of young Australian... [more]
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource to help you pursue the most recognized,... [more]
A work from Cengage Learning on hands-on ethical hacking and network defense. [more]
Explains why digital dossiers pose a grave threat to our privacy. This book sets forth a different understanding of what privacy... [more]
A first-person account of the fight to preserve First Amendment rights in the digital age. [more]
With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.... [more]
This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security... [more]
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies... [more]
31 Days Before Your CCNA Security Exam 31 Days Before Your CCNA Security Exam offers you an engaging and practical way to... [more]
This collection brings together strategies for advancing media reform, prepared by 33 scholars and activists from around the... [more]
The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth... [more]