Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A longtime chief scientist at Amazon shows how open data can make everyone, not just corporations, richer [more]
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography - the science of sending... [more]
The Weakest Link looks at one of the biggest issues in cyber security: how to protect organisations from their own employees.... [more]
This combination book and audio instructional program is designed to help non-native Americans speak standard American English... [more]
Protecting Your Internet Identity illustrates the depth and importance of a person's online persona and reputation. This updated... [more]
Serving as a reference for the security professional, this book covers aspects of security operations, from lighting and fencing... [more]
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with... [more]
New York Times bestselling author and veteran Washington Times columnist Bill Gertz explains how the United States can beat... [more]
Building a Practical Information Security Program provides users with a strategic view on how to build an information security... [more]
Forensic image acquisition is an important part of post-mortem incident response and evidence collection. Digital forensic... [more]
A guide that is keyed to the CISSP exam. It is streamlined to include only core certification information and is presented... [more]
Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression... [more]
This value-packed packed for the serious CISSP certification candidate combines the bestselling CISSP (ISC)2 Certified Information... [more]
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of... [more]
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics... [more]
<b>Implement maximum control, security, and compliance processes in Azure cloud environments</b>In<i>Microsoft Azure Security... [more]
U. S. critical infrastructures, such as financial institutions, commercial buildings, and energy production and transmission... [more]
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software,... [more]
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable... [more]
This book is a provocative manifesto of disruptive thinking about cyber security. It presents cutting-edge thinking and professional... [more]
Game Hacking shows programmers how to dissect computer games and create bots. [more]
Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN The IKEv2 protocol significantly improves VPN security,... [more]
This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security... [more]
Computers and computer networking provide major benefits to modern society, yet the growing costs of malicious cyber activities... [more]
Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information... [more]