Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A glimpse inside the mind of today's teenage hacker, including fascinating interviews with FBI agents, criminal psychologists,... [more]
A true-life account of computer espionage tells of a year-long single-handed hunt for a computer thief known as Hunter, a... [more]
This is the first complete guide to building, operating, managing, and operating Security Operations Centers in any business... [more]
Up the ante on your Sourcefire IPS exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285 provides... [more]
Cloak-and-dagger, high tech, and big business converge in this revelatory, page-turning account of a new kind of conflict,... [more]
Whether you want to break into information security, move from one job to another, or transition into management, Breaking... [more]
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation... [more]
Teaches Google searching basics. This book lets you explore Google's Web-based Interface, build Google queries, and work with... [more]
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where... [more]
Hacking ZWave and Home Automation Systems is a concise overview of the security threats posed to the ZWave wireless communications... [more]
Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in... [more]
If You Own a Multi-Function Printer, I Own You is a concise overview of the security threats posed to multi-function printers,... [more]
In Web Application Firewalls: A Practical Approach, John Stauffacher shares his expertise and the methods he has used for... [more]
Turning BYOD Risk into Mobile Security Strength is a concise overview of the security threats posed to enterprise networks... [more]
Hacking the Big Four Databases is a concise overview of the security threats posed to the four primary databases used for... [more]
Defending Air Traffic Corridor Attacks is a concise overview of the security threats posed to air traffic corridors and control... [more]
Bots: How to Detect and Prevent Them is a concise overview of the malicious behavior and threats posed by Bots to Internet... [more]
Network security has never been more challenging. Cisco Next-Generation Network Security products and solutions can help network... [more]
This report describes common commercial practices for cyber workforce management and organizational issues that are applicable... [more]
Fully updated Study Guide for the SSCP This guide prepares you for the SSCP, Systems Security Certified Practitioner certification... [more]
IT Governance offers a full understanding of how best to deal with information security risks, including an overview of the... [more]
Like the Industrial Revolution and the Information Technology Age, this year we started a new Wave headlined as the Golden... [more]
A sobering and insightful book on the dangers of cybercrime and its potentially catastrophic consequences. [more]