Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers... [more]
What makes WiFi faster at home than at a coffee shop? How does Google order search results? Is it really true that everyone... [more]
First edition titled Social engineering: the art of human hacking. [more]
Tons of malicious content floods the internet which can compromise your system and your device, be it your laptop, tablet... [more]
A best-selling author and renowned security expert reveals the rise and risks of a new goliath: our massively networked, world-sized... [more]
This book brings together recent advances and presents a comprehensive picture of the scientific study of networks. It includes... [more]
A smart, practical guide to managing your identity in a world of hackers, from one of the leading experts in the field. [more]
For one-semester courses on network security for computer science, engineering, and CIS majors, this text provides a practical,... [more]
Revised edition of: D is for digital. 2011. [more]
New 2018 Fourth Edition Take control of your privacy by removing your personal information from the internet with this updated... [more]
Experiencing MIS has been designed to be approachable and easy-to-use, but always with the goal of underlining the importance... [more]
Accompanying CD-ROM contains more than 450 practice questions for the exam, memory table exercises, answer keys, and a study... [more]
'CCNP Routing and Switching Foundation Learning Library' contains three books that cover the three new required exams for... [more]
Without Computer Networks, nothing in this world could proceed. Right from Facebook till bank transactions everything is based... [more]
The premium edition of Mike Meyers' bestselling CompTIA Network+ guide includes 10 hours of additional video training and... [more]
An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks... [more]
Registered trademark symbol appears after CompTIA in title. [more]
Microsoft Exchange Server 2013 doesn't just add dozens of new features: It integrates multiple technologies into a common,... [more]
Networks are involved in many aspects of everyday life, from food webs in ecology and the spread of pandemics to social networking... [more]
New in the Secure Beginner's Guide series, this is the ideal get-up-and-running guide for IT professionals seeking complete... [more]
Revision of: Guided to TCP/IP / by Laura A. Chappell and Ed Tittel. -- 3rd. ed. -- 2003. [more]
The VMware Certified Professional on vSphere 5 Datacenter Virtualization (VCP5-DCV) certification is the most desired certification... [more]
A detailed look at a diverse set of Cloud topics, particularly Azure and Office 365 More and more companies are realizing... [more]
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic... [more]
An authoritative guide to extending SharePoint's power with cloud-based services If you want to be part of the next major... [more]