Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The Digital Hit Man is the only book that teaches people how to create and use deception for the purpose of combating sites... [more]
New 2016 Third Edition Take control of your privacy by removing your personal information from the internet with this second... [more]
An inside look at who's watching you, what they know and why it matters. We are being watched. We see online ads from websites... [more]
2016 Revision! Your complete resource to protect you, your family, and your community from digital crime Every day, thousands... [more]
This is the first full account of the cypherpunks who aim to free the world's information, from the Forbes reporter whose... [more]
Some people are paranoid about aliens invading America. Some are paranoid about Barack Obama being a Kenyan Muslim terrorist.... [more]
Looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity... [more]
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades... [more]
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems... [more]
Looks at the phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget.... [more]
Explains why digital dossiers pose a grave threat to our privacy. This book sets forth a different understanding of what privacy... [more]
A first-person account of the fight to preserve First Amendment rights in the digital age. [more]
This completely expanded second edition of SSL and TLS: Theory and Practice provides modernized material and a comprehensive... [more]
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks... [more]
This book is about enforcing privacy and data protection. It demonstrates different approaches - regulatory, legal and technological... [more]
This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that... [more]
Examines how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle... [more]
This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September... [more]
Gotcha! Cyber security in a language anyone can understand, and not a moment too soon. This essential, easy-to-read, yet deeply... [more]
This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and... [more]
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework... [more]
This report, the second in a series, reveals insights from chief information security officers; examines network defense measures... [more]
The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking... [more]
Protecting Privacy in Data Release [more]
Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself... [more]