Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
After an introduction to cryptography and data security, the authors of this book explain the main techniques in modern cryptography.... [more]
Open-air surveillance is employed by metropolitan jurisdictions and by homeland security agencies. Focusing on legitimate... [more]
<p>This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security... [more]
Internet-enabled propaganda, espionage and attacks on critical infrastructure can target decision makers, weapons systems... [more]
Provides an understanding of the fast-paced world of retail loss prevention, the day-to-day challenges retailers face, and... [more]
Because requirements engineers, safety engineers, and security engineers do not know how to collaborate to produce proper... [more]
This comprehensive guide to DNS security offers in-depth understanding of how DNS works, and how best to ensure integrity... [more]
Offers insight into the hacking realm by featuring tales about characters that practice hacking as an art. Focusing on the... [more]
Focuses on the topic of computer forensics with emphasis on the establishment and management of a computer forensics laboratory... [more]
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors... [more]
An encyclopedia that examines various aspects of the mysterious world of cybercrime. It includes articles that address: terminology,... [more]
Volume ... of 5 mapping to EC-Council Certified Security Analyst certification. [more]
In this age of computer systems and technology, an increasing majority of the world's information is stored electronically.... [more]
Security engineering is different from any other kind of programming... if you're even thinking of doing any security engineering,... [more]
Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers,... [more]
Deals with computers/software. [more]
Challenges to Digital Forensic Evidence is a monograph about how the seemingly perfect evidence from computers, networks,... [more]
Computer Security Handbook, Fifth Edition provides comprehensive coverage of the broad scope of issues relating to computer... [more]
This book takes a pragmatic view of the field, with emphasis on enterprise security. It begins with an overview of what... [more]
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides... [more]
Designing BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system.... [more]
Updated for 2009 Covers the critical information you'll need to know to score higher on your CISSP exam! * Build and manage... [more]
Foundations of Security: What Every Programmer Needs to Know deals with computers/software. [more]
The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's... [more]