Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress... [more]
The fourth edition of the Official (ISC)2(R) Guide to the SSCP CBK(R) is a comprehensive resource providing an in-depth look... [more]
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop... [more]
E-based systems and computer networks are becoming standard practice across all sectors, including health, engineering, business,... [more]
Although there are already some books published on Big Data, most of them only cover basic concepts and society impacts and... [more]
The Project Management Professional (R) Certification exam is one of the most challenging exams anyone faces. Conquering this... [more]
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on... [more]
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication... [more]
Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization's business processes... [more]
Smart Grid: Networking, Data Management, and Business Models delivers a comprehensive overview of smart grid communications,... [more]
We are at the dawn of an era in networking that has the potential to define a new phase of human existence. This era will... [more]
A leading expert in cyberspace policy shows how governments are waging war online-and the chilling implications for geopolitics,... [more]
John Glaser has been an astute observer and recognized leader in the health care industry for over thirty years. He has written... [more]
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive... [more]
Updated second edition discusses the basic concepts of Quality of Service (QoS) and illustrates their application in practical... [more]
How many IT books have you read that are long on theory and short on practical application? They are interesting, but not... [more]
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire... [more]
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been... [more]
Cable and Wireless Networks: Theory and Practice presents a comprehensive approach to networking, cable and wireless communications,... [more]
Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere... [more]
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking... [more]
Wireless communication is one of the fastest growing industry segments today. Many types of wireless networks are now being... [more]
This comprehensive and up-to-date reference presents a practical approach to RF and microwave amplifier design and development.... [more]
Wireless sensor networks (WSNs) are a special class of ad hoc network in which network nodes composed of tiny sensors pass... [more]
Detailing the advantages and limitations of multi-carrier communication, this book proposes possible solutions for these limitations.... [more]