Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Providing readers with fundamental knowledge of cyber war in both theoretical and practical aspects, this book explores the... [more]
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating... [more]
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches,... [more]
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations... [more]
Advanced Persistent Threat Modeling is an in-depth guide to targeting and compromising high-security environments. With it,... [more]
<p>Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight... [more]
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data... [more]
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience... [more]
The Hardware Hacker is an illuminating career retrospective from Andrew bunnie Huang, one of the world's most esteemed hackers.... [more]
This book describes techniques and results in cyber threat intelligence from the center of the malicious hacking underworld... [more]
This book is an essential reference source for the latest scholarly research on the various types of unauthorized access or... [more]
Blockchain technology, one of the most buzzed-about yet least understood technological innovations of recent years, is at... [more]
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the... [more]
This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system,... [more]
Preventing Credit Card Fraud looks at all angles of this crime and is an easily-accessible guide that everyone engaged in... [more]
This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed... [more]
This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property... [more]
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights... [more]
This book covers database security from all aspects of protecting data accessibility and availability. Coverage ranges from... [more]
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer... [more]
This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on... [more]
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The... [more]
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different... [more]
Due to their always-on wireless connections, physical sensors, and location services, mobile devices are subject to unique... [more]
This book covers the major categories of malware that infect your enterprise computer systems. The book defines the security... [more]