Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This study describes deployed applications of game theory for security for the LAX police and US Federal Air Marshals Service.... [more]
The Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network... [more]
Sponsored by the National Institute of Standards and Technology. [more]
Kevin Mitnick's long-awaited memoir of computer hacking and FBI skirting, revealed now after seven years of government-mandated... [more]
Provides a compilation of the fundamental knowledge, skills, techniques, and tools required of IT security professional. It... [more]
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant... [more]
Provides an inclusive analysis of the topics covered on the ISSEP Exam. This guide to the test promotes understanding of the... [more]
This timely volume presents current developments in ICT and privacy/data protection. Readers will find an alternative view... [more]
These self-study resources are built with the objective of providing assessment, review, and practice to help ensure you are... [more]
This book provides information security and risk management teams with detailed, practical guidance on how to develop and... [more]
Prepare for the new version of CEH certification with this advanced guide Once you learn the thought processes of unethical... [more]
Cybercrime is on the move. Cybercrime and related forms of malicious activity will seek out your weak points in order to exploit... [more]
Information Security in Healthcare is the essential guide for implementing a comprehensive information security management... [more]
Hospitals, doctors' offices, and pharmacies are sitting on some very valuable information - your medical information. This... [more]
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals,... [more]
Arguing that privacy concerns should not be limited solely to concern about control over personal information, this book counters... [more]
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer... [more]
Because requirements engineers, safety engineers, and security engineers do not know how to collaborate to produce proper... [more]
Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry... [more]
Best-selling author Vicki Courtney clearly explains to uninformed parents the basics and potential hazards of cell phone and... [more]
This book takes a pragmatic view of the field, with emphasis on enterprise security. It begins with an overview of what... [more]
Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness... [more]
Focuses on security aspects of public key infrastructures, addressing such issues as inadequacy of security checks when certificates... [more]
This book is designed for any person, company, school or entity that wants to prevent the loss of their computer(s) and specifically... [more]
For governments and businesses, social movements and terrorists alike, IT is central to the way groups organize themselves... [more]