Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
After an introduction to cryptography and data security, the authors of this book explain the main techniques in modern cryptography.... [more]
The tenth anniversary edition of the world's bestselling computer security book [more]
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all... [more]
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people, suits all levels... [more]
This book shows the risks and protections cyberspace offers for national security and information warfare. [more]
Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness... [more]
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data... [more]
The current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency on computers... [more]
Including easy-to-understand definitions of viruses, spyware, and hackers, this book helps you understand what you're up against... [more]
Since being introduced in the late nineties, Cascading Style Sheets or CSS has become an indispensable tool for every web... [more]
General Internet use is all the experience required. This is a fun, gossipy read about Black Hats - aka hackers. This is not... [more]
The Honeynet guys have always been fighting the good fight: messing with the hackers' heads, learning what they're doing,... [more]
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because... [more]
Using material taken from interviews with a wide range of interested parties such as computer scientists, security experts... [more]
. . . the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be... [more]
This book presents and analyzes classical cryptosystems and then looks at the new directions of public-key cryptology. [more]
Klein tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code, poring... [more]
More than 100 malicious computer attacks (malware) occur every second. The skills required to analyze and assess these attacks... [more]
The inside story of the largest digital piracy sting to date. [more]
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of... [more]
This premium edition includes one year of unlimited access to Practice Labs for CompTIA Security+, hundreds of accurate practice... [more]
The Weakest Link looks at one of the biggest issues in cyber security: how to protect organisations from their own employees.... [more]
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials... [more]
A ground shaking expose on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity... [more]
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks with the tried-and-true Hacking Exposed way [more]