Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Edward Snowden, the man who risked everything to expose the US government's system of mass surveillance, reveals for the first... [more]
`One of the best books yet written on data and algorithms.<br /><br />A... [more]
Cybercrime: coming to your phone, computer or self-driving car [more]
Hackers know everything about us. We know almost nothing about them. Until now. [more]
An explosive, revisionist history of the dark past, and darker present of the internet. [more]
From Russia's tampering with the US election to the WannaCry hack that temporarily crippled Britain's NHS, cyber has become... [more]
A best-selling author and renowned security expert reveals the rise and risks of a new goliath: our massively networked, world-sized... [more]
Explore the most significant cyber attacks in recent years and get exclusive insight into hackers' techniques, the dramatic... [more]
Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international... [more]
A long-time chief data scientist at Amazon shows how open data can make everyone, not just corporations, richer [more]
Should ISPs discriminate against antisocial content that is indisputably objectionable? This is a lucid and compelling book... [more]
In Cybersecurity and CyberWar: What Everyone Needs to Know, New York Times best-selling author P. W. Singer and noted cyber... [more]
Examining the role of communication interception technology (CIT) in the investigation of transnational organised crime, the... [more]
In this digital age, how do we protect kids on the internet? Dangers lie on social media, and there is an increasing risk... [more]
A New York Times bestseller!<br /><br />How to Disappear is the authoritative... [more]
Begins with an introduction covering the basics of binary formats, disassembly, and code injection, then moves on to more... [more]
As increasingly we rely on them to automate big, important decisions - in crime, healthcare, transport, money - they raise... [more]
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending... [more]
Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering... [more]
From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing:... [more]
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in... [more]
The compelling true story of the computer underground and the bizarre lives and crimes of an elite group of young Australian... [more]
Emphasizes the business approach and shows how security is important to be left in the hands of just one department or employee.... [more]
An introduction to the science of codebreaking, explaining what algorithms do, how they are used, the risks associated with... [more]
Since its publication,Security Analysis by Graham and Dodd has been the investment bible and has sold more than 750,000 copies.... [more]