Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The Digital Hit Man is the only book that teaches people how to create and use deception for the purpose of combating sites... [more]
New 2016 Third Edition Take control of your privacy by removing your personal information from the internet with this second... [more]
An inside look at who's watching you, what they know and why it matters. We are being watched. We see online ads from websites... [more]
2016 Revision! Your complete resource to protect you, your family, and your community from digital crime Every day, thousands... [more]
This is the first full account of the cypherpunks who aim to free the world's information, from the Forbes reporter whose... [more]
Originally published in hardcover in 2015 by The MIT Press. [more]
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire... [more]
Gotcha! Cyber security in a language anyone can understand, and not a moment too soon. This essential, easy-to-read, yet deeply... [more]
Looks at the phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget.... [more]
Explains why digital dossiers pose a grave threat to our privacy. This book sets forth a different understanding of what privacy... [more]
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer... [more]
This book covers database security from all aspects of protecting data accessibility and availability. Coverage ranges from... [more]
Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl,... [more]
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer... [more]
This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level... [more]
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and... [more]
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It... [more]
This collection brings together strategies for advancing media reform, prepared by 33 scholars and activists from around the... [more]
Features a comprehensive discussion on the trending topics and emergent research in IT security and governance. This publication... [more]
This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September... [more]
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework... [more]
This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing... [more]
Protecting Privacy in Data Release [more]
There are an estimated 8.7 billion devices currently connected to the Internet - and each one is a threat to its owner. Confronting... [more]