Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This hands-on guide to hacking Microsoft's powerful video games console starts with step-by-step tutorials on hardware modification... [more]
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits... [more]
A glimpse inside the mind of today's teenage hacker, including fascinating interviews with FBI agents, criminal psychologists,... [more]
A true-life account of computer espionage tells of a year-long single-handed hunt for a computer thief known as Hunter, a... [more]
Provides a non-technical approach to practical computer security for various users, from business professionals to students... [more]
Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate... [more]
Up the ante on your Sourcefire IPS exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285 provides... [more]
Cloak-and-dagger, high tech, and big business converge in this revelatory, page-turning account of a new kind of conflict,... [more]
If You Own a Multi-Function Printer, I Own You is a concise overview of the security threats posed to multi-function printers,... [more]
This is the first complete guide to building, operating, managing, and operating Security Operations Centers in any business... [more]
In Web Application Firewalls: A Practical Approach, John Stauffacher shares his expertise and the methods he has used for... [more]
Network security has never been more challenging. Cisco Next-Generation Network Security products and solutions can help network... [more]
This report describes common commercial practices for cyber workforce management and organizational issues that are applicable... [more]
Fully updated Study Guide for the SSCP This guide prepares you for the SSCP, Systems Security Certified Practitioner certification... [more]
IT Governance offers a full understanding of how best to deal with information security risks, including an overview of the... [more]
Like the Industrial Revolution and the Information Technology Age, this year we started a new Wave headlined as the Golden... [more]
A sobering and insightful book on the dangers of cybercrime and its potentially catastrophic consequences. [more]
This culture hacking toolkit is filled with strategies, techniques, and resources for securing the most volatile element of... [more]
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step... [more]
The Smart Girl's Guide to Privacy teaches you how to protect yourself online. [more]
A one-of-a-kind guide to setting up a state-of-the-art malware research lab, using and customizing dozens of cutting-edge... [more]
Examines the portfolio of tools funded by the State Department s Bureau of Democracy, Human Rights, and Labor that help support... [more]
A lot of personal data is being collected and stored as we use our media devices for business and pleasure in mobile and online... [more]
The inside story of the largest digital piracy sting to date. [more]