Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security.... [more]
This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC) CISSP Certified... [more]
Get a practical guide for information management professionals that provides a framework for applying ethical principles and... [more]
This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality... [more]
This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication... [more]
Beginning with the foundational and technical components of information security, this title focuses on access control models,... [more]
A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa... [more]
From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing:... [more]
Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks.... [more]
Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in... [more]
Presents a compendium of protocols for securing online commerce and payments that provides a broad overview of electronic... [more]
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring goes beyond... [more]
The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition,... [more]
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information... [more]
The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically... [more]
The infusion of digital technology into contemporary society has had significant effects for everyday life and for everyday... [more]
Unsafe at Download Speeds teaches those who are not 100% confident in their cyber security what they need to know to be safe... [more]
Digital forensics has been a discipline of Information Security for decades now. Its principles, methodologies, and techniques... [more]
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book... [more]
1,000 practice questions for smart CompTIA CySA+ preparation CompTIA CySA+ Practice Tests provides invaluable preparation... [more]
Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication.... [more]
Geek will only get you so far; for technical professionals, success depends on other equally important skills. [more]
Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review... [more]
Everything that we know about the world of finance is changing before us. Innovation is happening constantly, despite the... [more]
All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic... [more]