Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers... [more]
An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks... [more]
Smart Videoconferencing is the first book to show people how to participate effectively in videoconferences, rather than just... [more]
A smart, practical guide to managing your identity in a world of hackers, from one of the leading experts in the field. [more]
For one-semester courses on network security for computer science, engineering, and CIS majors, this text provides a practical,... [more]
Revised edition of: D is for digital. 2011. [more]
This modular text shows readers how businesses use--and need--information systems to accomplish their goals, objectives, and... [more]
Networks are involved in many aspects of everyday life, from food webs in ecology and the spread of pandemics to social networking... [more]
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic... [more]
The ultimate guide to cryptography, updated from an author team of the world's... [more]
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds... [more]
Twitter is a household name, discussed for its role in national elections, natural disasters, and political movements, as... [more]
The only official CCSP practice test product endorsed by (ISC)(2) With over 1,000 practice questions, this book gives... [more]
Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review... [more]
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security... [more]
This book examines the convergence of Cloud Computing, Big Data, and the Internet of Things to forge the Next Internet. Ubiquitous... [more]
A realistic and comprehensive review of joint approaches to machine learning and signal processing algorithms, with application... [more]
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS,... [more]
Cracking open the politics of transparency and secrecy In an era of open data and ubiquitous dataveillance, what does it mean... [more]
Revised edition of the author's System forensics, investigation, and response, c2014. [more]
Packed with a wealth of hands-on activities, NETWORKING WITH WINDOWS SERVER (R) 2016, EXAM 70-741 empowers you to successfully... [more]
The only official study guide for the new CCSP exam CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide... [more]
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for... [more]
The essential guide to solving algorithmic and networking problems in commercial computer games, revised and extended Algorithms... [more]
Drawing on the author's 25+ years of teaching experience, Signals and Systems: A MATLAB (R) Integrated Approach presents a... [more]