Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your... [more]
Hundreds of accurate practice questions-thoroughly revised for the CEH v9 exam [more]
A sobering and insightful book on the dangers of cybercrime and its potentially catastrophic consequences. [more]
Fully up-to-date coverage of every topic on the CEH v9 certification exam [more]
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to... [more]
Fully up-to-date coverage of every topic on the CEH v9 certification exam, plus one year of access* to the complete Ethical... [more]
A leading expert in cyberspace policy shows how governments are waging war online-and the chilling implications for geopolitics,... [more]
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire... [more]
Gotcha! Cyber security in a language anyone can understand, and not a moment too soon. This essential, easy-to-read, yet deeply... [more]
A comprehensive doctrinal analysis of cybercrime laws in four major common law jurisdictions: Australia, Canada, the UK and... [more]
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the... [more]
Fully updated Study Guide for the SSCP This guide prepares you for the SSCP, Systems Security Certified Practitioner certification... [more]
This incisive investigation into the Kremlin's massive online surveillance state and the activists and rebels trying to take... [more]
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides... [more]
The inside story of the largest digital piracy sting to date. [more]
Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and... [more]
Businesses are frequently under attack by rivals and antagonists, and their reputations can be ruined by false websites, hacking... [more]
Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to... [more]
Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book... [more]
SAVE when you buy the CISSP(R) Boxed Set, plus bonus DVD! Bonus DVD contains audio and video instruction featuring Shon Harris... [more]
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical... [more]
Helps users hone essential information security skills by applying their knowledge to detailed, realistic exercises using... [more]
All That Matters about cyber crime and warfare. All That Matters books are a fast way to get right to the heart of key issues.... [more]
How, in the name of greater security, our current electronic surveillance policies are creating major security risks. [more]
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]