Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Combines all-encompassing topic coverage, authoritative information from seasoned experts, powerful instructor resources,... [more]
Masterful journalism, one of the best books about the dark side of the web... turns complex ideas into an action thriller... [more]
In Resilient Thinking, Phillip Wood discusses the importance of thinking laterally about potential impacts on your organisation... [more]
Provides an introduction to network and computer security. This title maps to the new CompTIA Security+ SY0-401 Certification... [more]
How does anonymity enable free speech - and how is it a threat? This title examines the ways that online anonymity influences... [more]
Cyberlibel: Information Warfare in the 21st Century? by David A. Potts brings years of research and experience in libel and... [more]
Provides an overview of information security and its relationship to the information needs of an organization. This book guides... [more]
Max Vision Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to... [more]
The compelling true story of the computer underground and the bizarre lives and crimes of an elite group of young Australian... [more]
Security: The Human Factor looks at the challenges associated with information security, the consequences of failing to meet... [more]
Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing... [more]
Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program.... [more]
The Definitive Guide to the C&A Transformation provides an authoritative guide to authorization for persons with knowledge... [more]
This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step... [more]
To ensure a successful experience for instructors and students alike, this book includes the following sections for each lab:... [more]
<p>Big data requires big security; here's what you need to know<p>More data is collected, at a higher speed, in more formats... [more]
This book is a complete treatise on Quick Response (QR) Code symbols the square barcodes that can be read by smart phones.... [more]
A cogent overview of the threat spectrum of cyberspace attacks and cyber weapons, this book introduces the arsenal of cyber... [more]
Renowned Oracle security expert David Knox provides trusted advice and best practices for comprehensive Oracle Database security.... [more]
All you need to know to succeed in digital forensics: technical and investigative skills, in one book Complete, practical,... [more]
Supplying helpful guidelines for identity management, system procurement, and management, this book discusses how legal identity... [more]
Leaders of many public and private organizations face increased pressure to allow the use of personal mobile devices in their... [more]
Preventive strategies for deterring today's most malicious and least understood risks to enterprise security [more]
It is very important to safeguard your computer and protect your privacy while surfing the Internet. What can you do to prevent... [more]
Specifically oriented to the needs of information systems students, this book delivers the technology and developments from... [more]