Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A bestselling Exchange Server guide, updated for the 2016 release Mastering Microsoft Exchange Server 2016 is the gold-standard... [more]
The most detailed, comprehensive coverage of CWSP-205 exam objectives CWSP: Certified Wireless Security Professional Study... [more]
Networking's leading authority joins Sybex for the ultimate CCNA prep guide CCNA Routing and Switching Complete Study Guide,... [more]
Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of... [more]
What makes WiFi faster at home than at a coffee shop? How does Google order search results? Why do Amazon, Netflix, and YouTube... [more]
Revised edition of: D is for digital. 2011. [more]
The U.S. economy thrives on the development of new products, new systems, and new processes. Usually, these advances start... [more]
Presenting a multidisciplinary approach on the demand side issues of new information technologies in the home, this text examines... [more]
The aim of this book is to contribute to a better understanding of those intermediate countries with specific reference to... [more]
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software,... [more]
What does the Internet look like?<br /><br />It's the single most essentail... [more]
Learn all the ins and outs of SharePoint, launch your site, collaborate with coworkers, and go mobile There's no doubt... [more]
This book offers a rigorous analysis of the achievements in the field of traffic control in large networks, oriented on two... [more]
Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your... [more]
The bestselling CCNA prep guide with the field's leading Cisco authority CCNA Routing and Switching Complete Deluxe Study... [more]
Guide to TCP/IP: IPv6 and IPv4 introduces students to the concepts, terminology, protocols, and services that the Transmission... [more]
The #1 bestselling beginner's guide to computer networking-now in a new edition Need networking know-how, but don't know where... [more]
Computer Network Simulations Using NS2 provides a solid foundation of computer networking knowledge and skills, covering everything... [more]
In recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an... [more]
Learn how to attack and defend the world s most popular web server platform Linux Server Security: Hack and Defend... [more]
Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide... [more]
Production-targeted Spark guidance with real-world use cases Spark: Big Data Cluster Computing in Production goes beyond... [more]
A comprehensive treatment of the most popular electronic payment schemes based on SET and SSL. After defining electronic commerce... [more]
Almost no one had heard of social media a decade ago, but today websites such as Facebook, Twitter, and LinkedIn have more... [more]
Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in... [more]