Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The Digital Hit Man is the only book that teaches people how to create and use deception for the purpose of combating sites... [more]
New 2016 Third Edition Take control of your privacy by removing your personal information from the internet with this second... [more]
An inside look at who's watching you, what they know and why it matters. We are being watched. We see online ads from websites... [more]
2016 Revision! Your complete resource to protect you, your family, and your community from digital crime Every day, thousands... [more]
This is the first full account of the cypherpunks who aim to free the world's information, from the Forbes reporter whose... [more]
Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your... [more]
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal... [more]
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to... [more]
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire... [more]
Gotcha! Cyber security in a language anyone can understand, and not a moment too soon. This essential, easy-to-read, yet deeply... [more]
Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book... [more]
Looks at the phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget.... [more]
Explains why digital dossiers pose a grave threat to our privacy. This book sets forth a different understanding of what privacy... [more]
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]
A first-person account of the fight to preserve First Amendment rights in the digital age. [more]
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical... [more]
This book describes techniques and results in cyber threat intelligence from the center of the malicious hacking underworld... [more]
Preventing Credit Card Fraud looks at all angles of this crime and is an easily-accessible guide that everyone engaged in... [more]
This book covers database security from all aspects of protecting data accessibility and availability. Coverage ranges from... [more]
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer... [more]
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the... [more]
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions.... [more]
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information... [more]
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and... [more]
Features a comprehensive discussion on the trending topics and emergent research in IT security and governance. This publication... [more]