Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This combination book and audio instructional program is designed to help non-native Americans speak standard American English... [more]
The Weakest Link looks at one of the biggest issues in cyber security: how to protect organisations from their own employees.... [more]
<p>Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight... [more]
Protecting Your Internet Identity illustrates the depth and importance of a person's online persona and reputation. This updated... [more]
Serving as a reference for the security professional, this book covers aspects of security operations, from lighting and fencing... [more]
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with... [more]
This book is a provocative manifesto of disruptive thinking about cyber security. It presents cutting-edge thinking and professional... [more]
Building a Practical Information Security Program provides users with a strategic view on how to build an information security... [more]
Forensic image acquisition is an important part of post-mortem incident response and evidence collection. Digital forensic... [more]
A guide that is keyed to the CISSP exam. It is streamlined to include only core certification information and is presented... [more]
Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression... [more]
This value-packed packed for the serious CISSP certification candidate combines the bestselling CISSP (ISC)2 Certified Information... [more]
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of... [more]
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics... [more]
<b>Implement maximum control, security, and compliance processes in Azure cloud environments</b>In<i>Microsoft Azure Security... [more]
U. S. critical infrastructures, such as financial institutions, commercial buildings, and energy production and transmission... [more]
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software,... [more]
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable... [more]
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography - the science of sending... [more]
Game Hacking shows programmers how to dissect computer games and create bots. [more]
IKEv2 IPsec Virtual Private Networks is the first plain English introduction to IKEv2: both a complete primer on this important... [more]
This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security... [more]
Computers and computer networking provide major benefits to modern society, yet the growing costs of malicious cyber activities... [more]
Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information... [more]
This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion... [more]