Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A guide that is keyed to the CISSP exam. It is streamlined to include only core certification information and is presented... [more]
This value-packed packed for the serious CISSP certification candidate combines the bestselling CISSP (ISC)2 Certified Information... [more]
This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on... [more]
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of... [more]
IKEv2 IPsec Virtual Private Networks is the first plain English introduction to IKEv2: both a complete primer on this important... [more]
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable... [more]
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given... [more]
<b>Implement maximum control, security, and compliance processes in Azure cloud environments</b>In<i>Microsoft Azure Security... [more]
This book describes the current and most probable future wireless security solutions. [more]
Internal auditors are expected to perform risk-based audits, but do so partially because they focus on financial and compliance... [more]
This book is a provocative manifesto of disruptive thinking about cyber security. It presents cutting-edge thinking and professional... [more]
U. S. critical infrastructures, such as financial institutions, commercial buildings, and energy production and transmission... [more]
Digital information and communication technologies are seen as a threat to privacy, a step forward for freedom of expression... [more]
Game Hacking shows programmers how to dissect computer games and create bots. [more]
This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security... [more]
As Internet connectivity continues to spread, this book will offer readers greater awareness of the cyber threats of tomorrow-and... [more]
Computers and computer networking provide major benefits to modern society, yet the growing costs of malicious cyber activities... [more]
Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information... [more]
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography - the science of sending... [more]
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures... [more]
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software,... [more]
There is a lot of buzz about Bitcoin and Blockchain lately, our expert authors will help to answer some imperative questions... [more]
Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications... [more]
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies... [more]
This collection brings together strategies for advancing media reform, prepared by 33 scholars and activists from around the... [more]