Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A best-selling author and renowned security expert reveals the rise and risks of a new goliath: our massively networked, world-sized... [more]
An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks... [more]
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers... [more]
First edition titled Social engineering: the art of human hacking. [more]
Tons of malicious content floods the internet which can compromise your system and your device, be it your laptop, tablet... [more]
A smart, practical guide to managing your identity in a world of hackers, from one of the leading experts in the field. [more]
For one-semester courses on network security for computer science, engineering, and CIS majors, this text provides a practical,... [more]
Revised edition of: D is for digital. 2011. [more]
New 2018 Fourth Edition Take control of your privacy by removing your personal information from the internet with this updated... [more]
Fully revised for the 2014 CompTIA Security+ objectives, this study package features 800+ simulated exam questions, including... [more]
New in the Secure Beginner's Guide series, this is the ideal get-up-and-running guide for IT professionals seeking complete... [more]
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic... [more]
An all-new exam guide for Global Information Assurance Certification's sought-after certification, GIAC Security Essentials... [more]
From the #1 name in IT security certification and training, Shon Harris, this comprehensive boxed set bundles Harris' bestselling... [more]
To ensure a successful experience for instructors and students alike, this book includes the following sections for each lab:... [more]
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people, suits all levels... [more]
Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and... [more]
This is a comprehensive, up-to-date revision of the market-leading CISSP training resource from the #1 name in IT security... [more]
This book presents a framework to model the main activities of information security management and governance. The same model... [more]
This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality... [more]
Unsafe at Download Speeds teaches those who are not 100% confident in their cyber security what they need to know to be safe... [more]
How does Bitcoin mine money from 1s and 0s? Through blockchain, a tool for creating secure, decentralized peer-to-peer applications.... [more]
Digital forensics has been a discipline of Information Security for decades now. Its principles, methodologies, and techniques... [more]
The only official CCSP practice test product endorsed by (ISC)(2) With over 1,000 practice questions, this book gives... [more]
Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review... [more]