Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Focuses on defending enterprise networks from sophisticated and malicious spyware. This book examines the various types of... [more]
In his role managing the content for a site and a weekly newsletter, the author has learned how to talk to people about computer... [more]
There is no such thing as perfect security when it comes to keeping all systems intact and functioning properly. Good penetration... [more]
Shows how to strategically maximize a limited security budget without compromising the quality of risk management initiatives.... [more]
Digital rights management (DRM) is a type of server software developed to enable secure distribution to disable illegal distribution... [more]
Today's uber viruses, worms, and trojans may seem more damaging than ever, but the attacking malware and malicious hackers... [more]
This book includes additional features to the first edition which offered a practical introductory approach to the techniques... [more]
Presents the technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes... [more]
This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus on secret-key... [more]
Symbian OS is an advanced, customizable operating system, which is licensed by the world's leading mobile phone manufacturers.... [more]
Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information... [more]
Addresses a variety of issues related to the protection of digital media content, including audio, image, and video protection.... [more]
With advances in digital communications leading to an increased threat of piracy, intellectual property owners must exploit... [more]
Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents... [more]
As regulation and legislation evolve, the need for cost-effective audit and monitoring solutions will grow. This book offers... [more]
Teaches users how to select passwords that always meet complexity requirements. This book examines the password problem from... [more]
Praise for Sarbanes-Oxley Guide for Finance and Information Technology Professionals Effective SOX programs enlist the... [more]
Originally published in 2006, this book brings together the views of leading law and economics scholars on the nature of the... [more]
Protect your network from both internal and external threats. Check Point NGX VPN-1/Firewall-1 is a Check Point's flagship... [more]
Covers optimal authentication codes, unconditionally secure authentication schemes, and both symmetric and asymmetric authentication... [more]
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge... [more]
Shows readers how to strengthen the weak spots they find in their network's armor. This book enables readers discover how... [more]
Addresses the theories of sound security training and awareness, then shows the reader how to put the theories into practice... [more]
Introduces the problems of computer security to researchers with a machine learning background. This book introduces machine... [more]
The idea of actively using the power of quantum mechanical principles and special entangled states has fueled a revolution... [more]