Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on their wireless devices... [more]
This book presents insights, interpretations, concepts, and interdependent views-in the landscape of mobile connectivity and... [more]
Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book... [more]
Numerous methods exist to model and analyze the different roles, responsibilities, and process levels of information technology... [more]
Strong stakeholder engagement is perhaps the most critical factor for achieving successful program execution in our fast-paced... [more]
With this book, managers and decision makers are given the tools to make more informed decisions about big data purchasing... [more]
The Most Complete and Up-to-Date Account of Advanced Sensor Networking Technologies Handbook of Sensor Networking: Advanced... [more]
Providing essential information for business managers, computer programmers, system designers, as well as home computer users,... [more]
By exploiting the synergies among available data, information fusion can reduce data traffic, filter noisy measurements, and... [more]
Command and Control (C2) is the set of organizational and technical attributes and processes by which an enterprise marshals... [more]
Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle provides a solid understanding of the foundations of cognitive... [more]
Software Defined Networking: Design and Deployment provides a comprehensive treatment of software defined networking (SDN)... [more]
In today's competitive business environment, most companies realize that the better they can manage their customer relationships,... [more]
Project planning is generally accepted as an important contributor to project success. However, is there research that affirms... [more]
Updated with the latest advances in the field, Jerry FitzGerald, Alan Dennis, and Alexandra Durcikova's 12th Edition of Business... [more]
What are the global implications of the looming shortage of Internet addresses and the slow deployment of the new IPv6 protocol... [more]
Simulation is a widely used mechanism for validating the theoretical models of networking and communication systems. Although... [more]
Recognized as One of the Best Business Books for 2014 by CIO Magazine Based on interviews with more than 150 CIOs, IT/business... [more]
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Revised and updated with the latest... [more]
Offers a resource for HIPAA privacy and security advice that can be applied to various organizations' unique situation. This... [more]
Network science is a rapidly emerging field of study that encompasses mathematics, computer science, physics, and engineering.... [more]
Distributed Systems: An Algorithmic Approach, Second Edition provides a balanced and straightforward treatment of the underlying... [more]
Sensor networks are becoming an integral part of our society to meet some common needs such as healthcare, and smart energy... [more]
Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide... [more]
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal... [more]