Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This is the story of an up-and-coming project manager that has been handed a large program to lead. Follow along as Susan... [more]
This is not another how-to guide for program managers or another reiteration of the Project Management Institute's standards... [more]
Using original research from more than 2 years of work, 5 different data sets, around 1000 videos, 9 individual studies and... [more]
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority... [more]
Although the information and communication technology (ICT) industry accounted for only 2 percent of global greenhouse gas... [more]
Plan, design, and launch a brand in SharePoint If you are planning,... [more]
Up to date with the third edition of PMI's Program Management Standard, The PgMP (R) Exam Challenge! contains more than 300... [more]
Revised edition of: PMP exam challenge! / J. LeRoy Ward, Ginger Levin. 5th ed. [more]
ESI International, an informa business. [more]
Suitable for formal courses, self-study, or professional reference, this title employs a lab-based approach to help users... [more]
The 'Information Security Management Handbook' serves not only as an everyday reference for information security practitioners,... [more]
Equalizers are present in all forms of communication systems. Neuro-Fuzzy Equalizers for Mobile Cellular Channels details... [more]
Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books... [more]
The bestselling guide on running SharePoint, now updated to cover all the new features of SharePoint 2013 SharePoint Portal... [more]
The fun and friendly way to manage your busy life with the new Outlook 2013 As the number one e-mail client and personal... [more]
Most wireless networking books do not explain how to tackle practical internetworking challenges. This book addresses the... [more]
Learn to build business solutions with SharePoint 2013 Now in its third edition, this perennial bestseller features a... [more]
Recent healthcare reform and its provisions have pushed health information technology (HIT) into the forefront. Higher life... [more]
Due to the rapid increase in the number of mobile device users worldwide, location-based services (LBSs) have become pervasive,... [more]
A complete revision to a popular SharePoint developer's resource Fully updated for SharePoint 2013, this book is an ideal... [more]
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various... [more]
Discusses general principles behind network models and the essential concepts in mathematical modeling of molecular regulatory... [more]
Provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This text covers... [more]
Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and... [more]
Nelson Systems Engineering VCE Units 1-4 has been thoroughly updated and produced in full colour for better student learning.... [more]