Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
`One of the best books yet written on data and algorithms.<br /><br />A... [more]
Hackers know everything about us. We know almost nothing about them. Until now. [more]
An explosive, revisionist history of the dark past, and darker present of the internet. [more]
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending... [more]
From Russia's tampering with the US election to the WannaCry hack that temporarily crippled Britain's NHS, cyber has become... [more]
A best-selling author and renowned security expert reveals the rise and risks of a new goliath: our massively networked, world-sized... [more]
Explore the most significant cyber attacks in recent years and get exclusive insight into hackers' techniques, the dramatic... [more]
Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international... [more]
Cybersecurity has become a front-page issue. This book is written for anybody interested in how states use the internet and... [more]
A long-time chief data scientist at Amazon shows how open data can make everyone, not just corporations, richer [more]
Should ISPs discriminate against antisocial content that is indisputably objectionable? This is a lucid and compelling book... [more]
In Cybersecurity and CyberWar: What Everyone Needs to Know, New York Times best-selling author P. W. Singer and noted cyber... [more]
Examining the role of communication interception technology (CIT) in the investigation of transnational organised crime, the... [more]
Cybercrime: coming to your phone, computer or self-driving car [more]
An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives,... [more]
Begins with an introduction covering the basics of binary formats, disassembly, and code injection, then moves on to more... [more]
As increasingly we rely on them to automate big, important decisions - in crime, healthcare, transport, money - they raise... [more]
First edition titled Social engineering: the art of human hacking. [more]
Tons of malicious content floods the internet which can compromise your system and your device, be it your laptop, tablet... [more]
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in... [more]
Revised and updated for the 2015 CISSP body of knowledge, this new edition by Fernando Maymi continues Shon Harris's bestselling... [more]
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic... [more]
The compelling true story of the computer underground and the bizarre lives and crimes of an elite group of young Australian... [more]
To ensure a successful experience for instructors and students alike, this book includes the following sections for each lab:... [more]
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource to help you pursue the most recognized,... [more]