Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Provides a compilation of the fundamental knowledge, skills, techniques, and tools required of IT security professional. It... [more]
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant... [more]
Provides an inclusive analysis of the topics covered on the ISSEP Exam. This guide to the test promotes understanding of the... [more]
Provides information about the many methods of trickery that hackers use in order to gather information with the intent of... [more]
This timely volume presents current developments in ICT and privacy/data protection. Readers will find an alternative view... [more]
These self-study resources are built with the objective of providing assessment, review, and practice to help ensure you are... [more]
A New York Times bestseller! How to Disappear is the authoritative and comprehensive guide for people who seek to protect... [more]
Prepare for the new version of CEH certification with this advanced guide Once you learn the thought processes of unethical... [more]
This book provides information security and risk management teams with detailed, practical guidance on how to develop and... [more]
Cybercrime is on the move. Cybercrime and related forms of malicious activity will seek out your weak points in order to exploit... [more]
Information Security in Healthcare is an essential guide for implementing a comprehensive information security management... [more]
Get ready for the latest Certified Ethical Hacker exam with the only book authorized by the creators of the certification,... [more]
Hospitals, doctors' offices, and pharmacies are sitting on some very valuable information - your medical information. This... [more]
A rigorous treatment of Encryption, Signatures, and General Cryptographic Protocols, emphasizing fundamental concepts. [more]
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals,... [more]
Arguing that privacy concerns should not be limited solely to concern about control over personal information, this book counters... [more]
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer... [more]
Because requirements engineers, safety engineers, and security engineers do not know how to collaborate to produce proper... [more]
Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry... [more]
Best-selling author Vicki Courtney clearly explains to uninformed parents the basics and potential hazards of cell phone and... [more]
Role engineering secures information systems. It ensures that every user has the right permission to access just the right... [more]
This book takes a pragmatic view of the field, with emphasis on enterprise security. It begins with an overview of what... [more]
Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness... [more]
An insider's guide to auditing software security. It uncovers vulnerabilities in applications ranging from sendmail to Microsoft... [more]