Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and... [more]
Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology.... [more]
Now in paperback, an expose of the global cybercrime epidemic and its threat to consumers everywhere. [more]
If a major event such as a terrorist attack, 7.2 earthquake, tsunami, or hacker attack were to disrupt business operations,... [more]
In order to perform effective analysis of today's information security systems, numerous components must be taken into consideration.... [more]
Get prepared for your Information Security job search!<br /><br />Do you... [more]
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected... [more]
Offers an overview of management topics related to information security. This resource promotes an understanding of Enterprise... [more]
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the... [more]
Despite a clear and compelling need for an intelligence-led approach to security, operational, and reputational risks, the... [more]
What spam is, how it works, and how it has shaped online communities and the Internet itself. [more]
Group theoretic problems appear to be the most promising source of hard computational problems for deploying cryptographic... [more]
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive... [more]
Provides complete, focused coverage to prepare students and professionals alike for success on the Certified Information Systems... [more]
As a result of a rigorous, methodical process that (ISC)(2) follows to routinely update its credential exams, it has announced... [more]
Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book... [more]
Many Smart Grid books include privacy in their title, but only touch on privacy, with most of the discussion focusing on... [more]
Since databases are the primary repositories of information for today's organizations and governments, database security has... [more]
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make... [more]
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the... [more]
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing... [more]
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices... [more]
Offers a resource for HIPAA privacy and security advice that can be applied to various organizations' unique situation. This... [more]
HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information.... [more]
In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing:... [more]