Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
* Integrates a unifying theme throughout the book - 'efficiency of network resource utilization' to reinforce strategic organizational... [more]
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical... [more]
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied... [more]
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal... [more]
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability;... [more]
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer... [more]
In Cybersecurity and CyberWar: What Everyone Needs to Know, New York Times best-selling author P. W. Singer and noted cyber... [more]
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers... [more]
Examines the elements of computer security, employee roles and responsibilities, and common threats. This book presents a... [more]
All That Matters about cyber crime and warfare. All That Matters books are a fast way to get right to the heart of key issues.... [more]
Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded... [more]
Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns... [more]
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority... [more]
The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive... [more]
This text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors... [more]
The FBI estimates that billions of U.S. dollars are lost each year to foreign and domestic competitors who deliberately target... [more]
The 'Information Security Management Handbook' serves not only as an everyday reference for information security practitioners,... [more]
Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six... [more]
Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue... [more]
This text provides a classroom-tested, practical introduction to software design and implementation, cryptographic tools,... [more]
Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning... [more]
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the... [more]
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art... [more]
Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare... [more]
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various... [more]