Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Emphasizes information security issues and includes topics like certifying computer professionals, non-invasive attacks, computer... [more]
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how... [more]
Written by a team of computer forensics experts, this book presents six realistic investigations and provides a DVD with the... [more]
Cisco Systems, Inc is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products... [more]
Defines practical techniques for building an environment that takes advantage of all of a company's information resources.... [more]
Contains a series of 25 to 30 page chapter by world-renowned network security personalities written from the point of an attacker... [more]
A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the... [more]
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because... [more]
Teaches system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network.... [more]
Suitable for those interested in the construction and operation of an information assurance (IA) program, this book describes... [more]
Using a fictional global corporation as a model to provide continual real-world challenges and solutions, this title covers... [more]
Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective.... [more]
CNN is reporting that a vicious new virus is wreaking havoc on the world's computer networks. Somebody's hacked one of your... [more]
Whether you're encrypting or decrypting ciphers, a solid background in number theory is essential for success. This book takes... [more]
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits... [more]
Provides a practical approach for establishing, managing and operating a comprehensive Information Assurance program. This... [more]
Offers an overview of how to develop a strategy to implement security within an organization. This managerial and practical... [more]
Most computer users are ignorant of the tracks, trails, and traces they leave behind when they use their computer. This book... [more]
Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN, and management... [more]
A guide to protecting your Windows 2000 Network. It covers methods of attack and hacker secrets. It is suitable for IT professionals... [more]
An insight into the biometric industry and the steps for successful deployment Biometrics technologies verify identity through... [more]
Computer security is quickly becoming the #1 need to have solution for the Fortune 1000. The process for implementing strong... [more]
The area of video source coding is one of the key challenges in the worldwide push to deliver full video communications over... [more]
An effective information security program preserves your information assets and helps you meet business objectives. This book... [more]
Ubiquitous computing is about distributed systems with a difference. It is about hundreds and thousands of computers embedded... [more]