Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, steal their information,... [more]
Features the real world cases of botnet attacks to underscore the need for action. This title explains botnet fundamentals... [more]
Provides explicit hacks, tutorials, penetration tests, and demonstrations for security professionals and Web application developers... [more]
Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness... [more]
Addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed... [more]
This book provides an introduction to applied cryptanalysis, that is, cryptanalysis that actually breaks ciphers and/or... [more]
How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection... [more]
An insider's guide to auditing software security. It uncovers vulnerabilities in applications ranging from sendmail to Microsoft... [more]
Acts as a guide for software developers who must learn and implement cryptography. Introducing the subject of cryptography,... [more]
Examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic... [more]
Focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. This work is suitable... [more]
An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and... [more]
Would your company be prepared in the event of: Computer-driven espionage A devastating virus attack A hacker's unauthorized... [more]
Explores organized crime, terrorist threats, and hackers. This work addresses the steps organizations must take to address... [more]
A book on Windows Server 2003 Security Infrastructures for Windows 2003 SP1 & SP2. It illustrates the intricacies of the different... [more]
Helps system administrators learn more than hundred tips for automating daily system administration tasks using Windows command... [more]
Contains terms that are used in the broad fields of electronics data protection and data management in the interconnected... [more]
The frequency of digital attacks and intrusions has steadily increased over the years as the number of people with the appropriate... [more]
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools,... [more]
Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall and... [more]
A dictionary and handbook that defines the field and provides unique insight Turn to Minoli-Cordovana's Authoritative... [more]
Managers responsible for IT/Security departments from mall office environments up to enterprise networks need to have an understanding... [more]
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Educating... [more]
Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages... [more]
Maps fully to CWSP Certification Exam and covers how to defend wireless networks against the latest attacks! --Cover. [more]