Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Cyber Mercenaries explores how and why states use hackers as proxies to project power through cyberspace. [more]
A long-time chief data scientist at Amazon shows how open data can make everyone, not just corporations, richer [more]
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography - the science of sending... [more]
From Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies: past, present... [more]
Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded,... [more]
This book outlines social and moral guidelines to combat violent, hateful, and illegal activity on the Internet. [more]
In Cybersecurity and CyberWar: What Everyone Needs to Know, New York Times best-selling author P. W. Singer and noted cyber... [more]
Examining the role of communication interception technology (CIT) in the investigation of transnational organised crime, the... [more]
Explore the most significant cyber attacks in recent years and get exclusive insight into hackers' techniques, the dramatic... [more]
Help for grown-ups new to coding Getting a jump on learning how coding makes technology work is essential to prepare... [more]
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in... [more]
Revised edition of: D is for digital. 2011. [more]
Provides a non-technical approach to practical computer security for various users, from business professionals to students... [more]
BTHb: INRE - Version 2.2 now available. The Blue Team Handbook is a zero fluff reference guide for cyber security incident... [more]
Suitable for readers who want to help organizations protect critical information assets and secure their systems and networks,... [more]
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic... [more]
The inaugural research programme of the Institute for Mathematical Sciences at the National University of Singapore was devoted... [more]
Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts.... [more]
From the premiere New York Times Washington correspondent, a stunning and incisive look into how cyberwarfare is influencing... [more]
From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing:... [more]
Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review... [more]
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security... [more]
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS,... [more]
More than 100 malicious computer attacks (malware) occur every second. The skills required to analyze and assess these attacks... [more]
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for... [more]