Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows... [more]
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach... [more]
This text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors... [more]
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]
Many of those who are actively involved in the digital forensics process have a limited background in computer science and... [more]
As corporations and governments become more litigious and risk averse, international risk management becomes more complex.... [more]
Demonstrates the effectiveness of certification and accreditation as a risk management methodology for IT systems in public... [more]
Offering ideas, tools, and a fresh way of thinking, this guide introduces the concept of emerging risk and the effective mitigation... [more]
The 'Information Security Management Handbook' serves not only as an everyday reference for information security practitioners,... [more]
Focusing on both the private security professional and the consumer of corporate investigative services, this text provides... [more]
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents... [more]
Presenting theoretical concepts, practical techniques, and experimental results, this book provides a step-by-step illustration... [more]
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is... [more]
SCADA (Supervisory Control and Data Acquisition) systems do not necessarily mesh well with standard IT security. Nevertheless,... [more]
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements... [more]
The rapid shift in business and government communications from mail and telephone to computer services, email, web transactions,... [more]
Synopsis coming soon....... [more]
Updated annually, this handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required... [more]
First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time... [more]
A Holistic Approach from a Business Perspective. . [more]
Max Vision Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to... [more]
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography... [more]
Provides insight into precisely how to conduct an information security risk assessment. Designed for security professionals... [more]
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant... [more]
The growing complexity of today's interconnected systems has not only increased the need for improved information security,... [more]