Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Provides a compilation of the fundamental knowledge, skills, techniques, and tools required of IT security professional. It... [more]
This title covers how to conduct forensic investigations using self-organising clustering map (SOM) neural networks, text... [more]
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant... [more]
Provides an inclusive analysis of the topics covered on the ISSEP Exam. This guide to the test promotes understanding of the... [more]
This timely volume presents current developments in ICT and privacy/data protection. Readers will find an alternative view... [more]
These self-study resources are built with the objective of providing assessment, review, and practice to help ensure you are... [more]
This book provides information security and risk management teams with detailed, practical guidance on how to develop and... [more]
Prepare for the new version of CEH certification with this advanced guide Once you learn the thought processes of unethical... [more]
Cybercrime is on the move. Cybercrime and related forms of malicious activity will seek out your weak points in order to exploit... [more]
Information Security in Healthcare is the essential guide for implementing a comprehensive information security management... [more]
Hospitals, doctors' offices, and pharmacies are sitting on some very valuable information - your medical information. This... [more]
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals,... [more]
Arguing that privacy concerns should not be limited solely to concern about control over personal information, this book counters... [more]
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer... [more]
Because requirements engineers, safety engineers, and security engineers do not know how to collaborate to produce proper... [more]
Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry... [more]
Best-selling author Vicki Courtney clearly explains to uninformed parents the basics and potential hazards of cell phone and... [more]
This book takes a pragmatic view of the field, with emphasis on enterprise security. It begins with an overview of what... [more]
Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness... [more]
Focuses on security aspects of public key infrastructures, addressing such issues as inadequacy of security checks when certificates... [more]
This book is designed for any person, company, school or entity that wants to prevent the loss of their computer(s) and specifically... [more]
For governments and businesses, social movements and terrorists alike, IT is central to the way groups organize themselves... [more]
This hands-on guide to hacking Microsoft's powerful video games console starts with step-by-step tutorials on hardware modification... [more]
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits... [more]
A glimpse inside the mind of today's teenage hacker, including fascinating interviews with FBI agents, criminal psychologists,... [more]