Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The Laboratory Manual to Accompany Hacker Techniques, Tools, and Incident Handling is the lab companion to Sean-Philip Oriyano's... [more]
Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world... [more]
The Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network... [more]
The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. This book deals with... [more]
Introduces the theory and algorithms involved in curve-based cryptography. This book provides ready-to-implement algorithms... [more]
Arguing that privacy concerns should not be limited solely to concern about control over personal information, this book counters... [more]
Presents a comprehensive reference source on ethical and security issues relating to technologies. This title includes topics... [more]
Offers a comprehensive guide to various aspects of privacy throughout US history including significant legal cases, events,... [more]
Security demands attention, given the frequency of attacks on web sites. This work explains the common types of attacks and... [more]
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple... [more]
This title uses previously validated psychological inventories to explore and profile the personalities and behavioural traits... [more]
A glimpse inside the mind of today's teenage hacker, including fascinating interviews with FBI agents, criminal psychologists,... [more]
A comprehensive and practical guide to the police investigation of cyber crime offering an overview of the national strategies... [more]
For business managers and CIOs, managing identity data of employees, contractors, business partners, and customers has become... [more]
Providing a comprehensive overview of both the theory and reality of privacy and the media in the 21st Century, Privacy and... [more]
Digital Forensics Trial Graphics: Teaching the Jury through Effective Use of Visuals helps digital forensic practitioners... [more]
This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical... [more]
This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic,... [more]
Using a fictional global corporation as a model to provide continual real-world challenges and solutions, this title covers... [more]
Offers a look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing... [more]
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you... [more]
This book is a practical handbook of research on dealing with mathematical methods in crime prevention for special agents,... [more]
Chapter One reviews basis elementary of residence security, classical residence security and health care surveillance system... [more]