Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers... [more]
Revised edition of: D is for digital. 2011. [more]
A smart, practical guide to managing your identity in a world of hackers, from one of the leading experts in the field. [more]
The MOS 2016 Study Guide for Microsoft Outlook covers Microsoft Outlook 2016, specifically the skills required to pass the... [more]
Experiencing MIS has been designed to be approachable and easy-to-use, but always with the goal of underlining the importance... [more]
Networks are involved in many aspects of everyday life, from food webs in ecology and the spread of pandemics to social networking... [more]
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic... [more]
Broad and up-to-date coverage of the principles and practice in the fast moving area of Distributed Systems. Distributed Systems... [more]
Before the internet if you wanted to sell something you marketed with leaflets through the door or with an expensive television... [more]
Since Thorne's emailed efforts to settle an overdue account with a drawing of a spider achieved massive worldwide online exposure... [more]
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital... [more]
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds... [more]
Covers useful aspects of deploying and administering Windows Server 2008, the popular server software. This title features... [more]
Talking about the world of computer networking, this book helps you to: learn basic networking terminology; understand how... [more]
This text describes how to use a desk-top computer to sense, analyse and display real-world quantities, including displacement,... [more]
This satellite textbook in the Routledge Intertext explores the nature of the electronic word and presents the new types of... [more]
Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your... [more]
What does the Internet look like? It's the single most essentail aspect of modern life, and yet, for many of us, the Internet... [more]
A leading expert in cyberspace policy shows how governments are waging war online-and the chilling implications for geopolitics,... [more]
<p><b>â€œ</b><span style="line-height: 1.45em;">Technology is rapidly moving into our bodies,â€?... [more]
Using original research from more than 2 years of work, 5 different data sets, around 1000 videos, 9 individual studies and... [more]
Combining the classic commandments of persuasive writing and the increasing demands of the newest of new media, On Message... [more]
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]
The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves... [more]
An engaging approach for anyone beginning a career in networking As the world leader of networking products and services,... [more]