Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
What spam is, how it works, and how it has shaped online communities and the Internet itself. [more]
BTHb: INRE - Version 2.2 now available. Voted #3 of the 100 Best Cyber Security Books of All Time by Vinod Khosla, Tim O'Reilly... [more]
Fully revised for the 2014 CompTIA Security+ objectives, this study package features 800+ simulated exam questions, including... [more]
Revised and updated for the 2015 CISSP body of knowledge, this new edition by Fernando Maymi continues Shon Harris's bestselling... [more]
Your online identity is quickly becoming more crucial to your personal and professional success than in-person communications.... [more]
Beginning with the foundational and technical components of information security, this title focuses on access control models,... [more]
Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and... [more]
Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic... [more]
New in the Secure Beginner's Guide series, this is the ideal get-up-and-running guide for IT professionals seeking complete... [more]
Suitable for readers who want to help organizations protect critical information assets and secure their systems and networks,... [more]
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic... [more]
An all-new exam guide for Global Information Assurance Certification's sought-after certification, GIAC Security Essentials... [more]
From the #1 name in IT security certification and training, Shon Harris, this comprehensive boxed set bundles Harris' bestselling... [more]
The compelling true story of the computer underground and the bizarre lives and crimes of an elite group of young Australian... [more]
To ensure a successful experience for instructors and students alike, this book includes the following sections for each lab:... [more]
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource to help you pursue the most recognized,... [more]
Looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity... [more]
The tenth anniversary edition of the world's bestselling computer security book [more]
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people, suits all levels... [more]
Emphasizes the business approach and shows how security is important to be left in the hands of just one department or employee.... [more]
The inaugural research programme of the Institute for Mathematical Sciences at the National University of Singapore was devoted... [more]
An introduction to the science of codebreaking, explaining what algorithms do, how they are used, the risks associated with... [more]
This is a comprehensive, up-to-date revision of the market-leading CISSP training resource from the #1 name in IT security... [more]
Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts.... [more]
`One of the best books yet written on data and algorithms.<br /><br />A... [more]