Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This book describes various methods and recent advances in predictive computing and information security. Coverage also... [more]
This textbook offers an accessible introduction to the emerging subfield of cyber warfare. The international relations, policy,... [more]
Regulations such as Sarbanes-Oxley, NERC CIP, the Gramm-Leach-Bliley Act, and HIPAA are complex and require a nuanced understanding.... [more]
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer... [more]
Introduces the reader to psychometrics and its various aspects, ranging from its early history, school examinations, how to... [more]
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.... [more]
Papers presented at the 7th in a series of interdisciplinary conferences on safety and security engineering are contained... [more]
Developing secure software requires the integration of numerous methods and tools into the development process, and software... [more]
Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100%... [more]
Cryptography is one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy... [more]
The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management,... [more]
This book sheds light on aviation security, considering both technologies and legal principles. It considers the protection... [more]
This class-tested textbook will provide in-depth coverage of the fundamentals of machine learning, with an exploration of... [more]
Originally published in hardcover in 2016 by Simon & Schuster. [more]
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer... [more]
This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Consequently,... [more]
This authoritative guide on computer network security covers current security solutions and best practices in both fixed and... [more]
Mapped to the new CompTIA Security+ SY0-501 Certification Exam, best-selling COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS,... [more]
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set... [more]
Has your organization begun efforts to comply with the General Data Protection Regulation (GDPR) adopted by the European Union?... [more]
This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system,... [more]
Facing Cyber Threats Head On explains battle against hackers as a fight between people, not technologies. Brian Minick offers... [more]
As a society that has revered learning and education for millennia, China has a long history of valuing information. As early... [more]
This new, exclusive Oracle Press exam guide prepares certification candidates for the coveted Oracle OCP MySQL certification.... [more]