Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Offers a resource for HIPAA privacy and security advice that can be applied to various organizations' unique situation. This... [more]
Network science is a rapidly emerging field of study that encompasses mathematics, computer science, physics, and engineering.... [more]
Although program management has received much attention in recent books, program governance remains a relatively new subject.... [more]
Distributed Systems: An Algorithmic Approach, Second Edition provides a balanced and straightforward treatment of the underlying... [more]
Sensor networks are becoming an integral part of our society to meet some common needs such as healthcare, and smart energy... [more]
Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide... [more]
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal... [more]
The editors of the HIMSS Books' best-seller Health: From Smartphones to Smart Systems have returned to deliver an expansive... [more]
Usability is the key to the meaningful use of EHRs, resulting in safe, easy-to-use, and useful applications. Good usability... [more]
Fieldbuses, particularly wireless fieldbuses, offer a multitude of benefits to process control and automation. Fieldbuses... [more]
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability;... [more]
The editors of the HIMSS Books' best-seller mHealth: From Smartphones to Smart Systems (603) have returned to deliver an expansive... [more]
Although project team members play crucial roles in projects, they often do not possess the required mastery of project management... [more]
Explores the platforms that you can use to develop hardware or software, discusses design concepts that can make your products... [more]
Data Science gets thrown around in the press like it's magic. Major retailers are predicting everything from when their customers... [more]
Examines the elements of computer security, employee roles and responsibilities, and common threats. This book presents a... [more]
While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless... [more]
This is the story of an up-and-coming project manager that has been handed a large program to lead. Follow along as Susan... [more]
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents'... [more]
This is not another how-to guide for program managers or another reiteration of the Project Management Institute's standards... [more]
Using original research from more than 2 years of work, 5 different data sets, around 1000 videos, 9 individual studies and... [more]
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority... [more]
Although the information and communication technology (ICT) industry accounted for only 2 percent of global greenhouse gas... [more]
Plan, design, and launch a brand in SharePoint If you are planning,... [more]
Up to date with the third edition of PMI's Program Management Standard, The PgMP (R) Exam Challenge! contains more than 300... [more]