Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A work from Cengage Learning on hands-on ethical hacking and network defense. [more]
Suitable for those interested in learning computer security and networking basics, this title explains basic security procedures... [more]
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals... [more]
Explains why digital dossiers pose a grave threat to our privacy. This book sets forth a different understanding of what privacy... [more]
IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business security,... [more]
Ira Winkler has been dubbed A Modern Day James Bond by CNN and other media outlets for his ability to simulate espionage... [more]
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]
A first-person account of the fight to preserve First Amendment rights in the digital age. [more]
This book covers database security from all aspects of protecting data accessibility and availability. Coverage ranges from... [more]
This book brings together comprehensive best practices for building software systems that exhibit superior operational security,... [more]
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks... [more]
Digital information and communication technologies are seen as a threat to privacy, a step forward for freedom of expression... [more]
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The... [more]
This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level... [more]
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures... [more]
Author Mark Wireman helps software architects, developers, and security engineers gain an in-depth understanding of how to... [more]
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and... [more]
The security of information systems requires skilled specialists to apply a set of engineering techniques, supported by mathematical... [more]
The development of the wireless communications environment, especially as related to security, has been relatively stable... [more]
Offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against... [more]
This highly original book is an ethnographic noir of how Big Data profits from patient private health information. The book... [more]
This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who... [more]
This book describes the primary uses for Trusted Platform Modules (TPMs) and practical considerations such as: when TPMs can... [more]
Provides a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class... [more]
With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.... [more]