Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
In this new book, Stiennon presents a comprehensive view of the technology, methodology, and tools needed to defend digital... [more]
No further information found for this title. [more]
The Laboratory Manual to Accompany Hacker Techniques, Tools, and Incident Handling is the lab companion to Sean-Philip Oriyano's... [more]
Thorough and comprehensive coverage from one of the foremost experts in browser security. -Tavis Ormandy, Google Inc. Modern... [more]
The Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network... [more]
The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. This book deals with... [more]
Introduces the theory and algorithms involved in curve-based cryptography. This book provides ready-to-implement algorithms... [more]
This fascinating and timely book traces the emergence and evolution of cybercrime as an increasingly intransigent threat to... [more]
Deals with the relations between identity, security and democracy. This book shows how full of nuances the process of human... [more]
Presents a comprehensive reference source on ethical and security issues relating to technologies. This title includes topics... [more]
Offers a comprehensive guide to various aspects of privacy throughout US history including significant legal cases, events,... [more]
Security demands attention, given the frequency of attacks on web sites. This work explains the common types of attacks and... [more]
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple... [more]
A glimpse inside the mind of today's teenage hacker, including fascinating interviews with FBI agents, criminal psychologists,... [more]
This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates... [more]
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches,... [more]
Boolean functions are the building blocks of symmetric cryptographic systems. This book shows how Boolean functions are used... [more]
Originally published in hardcover in 2016 by Simon & Schuster. [more]
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of... [more]
For business managers and CIOs, managing identity data of employees, contractors, business partners, and customers has become... [more]
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and... [more]
Explores the field of information security and assurance with content including various innovations in technology and methodologies.... [more]
Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners... [more]