Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model.... [more]
Teaches the essentials of developing secure software in accordance with industry standards. This book leads readers through... [more]
Presents the primary hardware-based computer security approaches in an easy to read format. Provides comprehensive coverage... [more]
Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed... [more]
Offers an approach to handle and recover from a catastrophic data loss. This book helps both technical and non-technical professionals... [more]
Covers management issues facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann... [more]
Fuzzing is often described as a 'black box' software testing technique. It works by automatically feeding a program multiple... [more]
Combines cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information... [more]
Suitable for IT professionals managing enterprise security, this book allows readers to assess vulnerabilities, design protection... [more]
Cyber Security and Quality of Service: Modelling and Analysis for Systems Dependability presents a wide range of modeling,... [more]
Provides IT security professionals with the information needed to create, manage and sustain a digital forensics lab and investigative... [more]
Focuses on the role of the state in defending against cyber-threats and in securing the information age. This volume argues... [more]
Deals with the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in... [more]
Containing information on steganalysis and steganography, this book includes watermarking with side information, QIM, and... [more]
Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, steal their information,... [more]
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job . [more]
This title eases the research burden, develops investigative protocols, and pulls together data into a comprehensive and practical... [more]
Information Security is achieved through a mix of technical, organizational and legal measures. This book includes: the emergence... [more]
An ideal book and companion Web site for multitasked security professionals and IT managers reveals how to secure corporate... [more]
Discusses the concepts, methodology, and technology that makes XSS a valid concern. This book explains various types of XSS... [more]
Offers an explanation of information security, physical security, and why approaching these two different types of security... [more]
A guide to the Snort version 2.6. It offers coverage ranging from packet inspection to optimizing Snort for speed to using... [more]
A comprehensive guide to the technology, market and behavioural aspects involved in implementing multi-application smart cards.... [more]
Contains information on a wide variety of topics related to Techno Security. This book takes the approach of identifying some... [more]
Suitable for the professional system administrators who need to securely deploy Microsoft Vista in their networks, this work... [more]