Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses honeypots from a variety... [more]
As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware... [more]
Provides an understanding of the fast-paced world of retail loss prevention, the day-to-day challenges retailers face, and... [more]
Presents an exploration of security issues for the SOA and web services. This book demonstrates the applications of these... [more]
The (ISC)^2(R) Systems Security Certified Practitioner (SSCP(R)) certification is one of the most important credentials an... [more]
Covers privacy and anonymity for data mining applications. This book presents novel application domains, such as data mining... [more]
Offers gaming security professionals with the means to mitigate the myriad security threats facing the gaming world. Providing... [more]
An introduction to basic security principles that offers unusual methods of thinking about security challenges and solutions... [more]
Clarifies the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework... [more]
Highlighting the interplay between public actors and policy tools, this work provides a theoretical and empirical foundation... [more]
Updated annually, this handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required... [more]
Teaches you how to apply best practices and standards for consistent and secure software development. This title details specific... [more]
Examines incidents of targeted violence, including contract killings, assassinations, and planned kidnappings. This book analyzes... [more]
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It [more]
From streets in London to subway stations in New York City, hundreds of thousands of surveillance cameras are constantly collecting... [more]
Supplying a complete overview of the concepts executives need to know, this book provides the tools needed to ensure your... [more]
Providing a fundamental understanding of technology risks from an interloper's perspective, this work offers the guidance... [more]
Details the recommended protocol for protecting people and assets in hostile global settings. This work offers the fundamental... [more]
Whether the cause of a disaster is a terrorist or criminal attack, fire emergency, civil or geographic disruption, or major... [more]
Includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals... [more]
Illustrating the power of algorithms, this book describes algorithmic methods with cryptographically relevant examples. Focusing... [more]
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors... [more]
A how-to guide for implementing algorithms and protocols. Addressing real-world implementation issues, it emphasizes cryptographic... [more]
Discusses the nature of computer misuse and the legal and non-legal responses to it. This book explores what is meant by the... [more]
Offers an approach to developing and implementing relevant security metrics essential for effective security management. This... [more]