Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework,... [more]
The Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network... [more]
In Worm, one of the world's biggest selling authors of narrative non-fiction returns to bestselling form. [more]
Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA) [more]
Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand... [more]
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]
Identity theft (or identity fraud) has gained prominence as a pressing and prevalent social problem. This book provides a... [more]
Designed as a comprehensive program for self-study, this money-saving boxed set includes CEH Certified Ethical Hacker All-in-One... [more]
Takes an approach to making Industrial control systems safe from such cyber attacks: design the controls systems themselves... [more]
Kevin Mitnick's long-awaited memoir of computer hacking and FBI skirting, revealed now after seven years of government-mandated... [more]
Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers... [more]
Constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience,... [more]
Includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals... [more]
Increasingly, crimes and fraud are digital in nature, occurring at breakneck speed and encompassing large volumes of data.... [more]
Chaos-based cryptography has attracted great interest in the past decade. This book gives a thorough description of chaos-based... [more]
Constitutes the refereed proceedings of the 5th IFIP WG 11.11 International Conference, IFIPTM 2011, held in Copenhagen, Denmark,... [more]
To help readers avoid and recognize risky behaviors, The Truth About the Internet and Online Predators explains many of the... [more]
Provides knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective... [more]
This handy pocket guide will provide you with all the information you will need when considering how to approach the PCI DSS,... [more]
Provides insight into precisely how to conduct an information security risk assessment. Designed for security professionals... [more]
Fight back. Regain your privacy and prevent future invasions with tips from a professional counterespionage consultant. <p>... [more]
Written for IT professionals new to healthcare information technology (HIT), this book is an essential guide to the burgeoning... [more]
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant... [more]
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who... [more]
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers.... [more]