Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]
This text provides in-depth fundamentals, recent technical achievements, challenges and emerging trends in mobile and wireless... [more]
Although multihomed communication is a rapidly emerging trend for next generation networks, no known book explores multihomed... [more]
Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation: An Action Guide for Business and IT Leaders explains... [more]
Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability... [more]
The fourth book in the Healthcare Payment System series, Cost-Based, Charge-Based, and Contractual Payment Systems compares... [more]
Emulation is a hybrid experimentation technique intended to bridge the gap... [more]
With the increased concern for energy conservation in recent years, much attention has been focused on lighting energy consumption... [more]
New concepts are presented in clear language and the hands on activities along with realistic case studies reinforce learning... [more]
A hands on guide to planning, designing , installing and configuring wireless LANS from two of the principle wireless LAN... [more]
Distributed sensor networks comprise systems like 'Smart Dust' which gather large amounts of data from multiple locations... [more]
Physicians and hospitals are receiving incentives to use electronic health records (EHRs), but there is little emphasis on... [more]
Designed as a comprehensive introduction to the topic of communications system security, this text covers the basics of establishing... [more]
This book from the Healthcare Payment Systems series reviews and discusses the various types of payment systems in use by... [more]
The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves... [more]
Includes bibliographical references and index. [more]
Implementing Business Intelligence in Your Healthcare Organization offers an inside look at how healthcare organizations of... [more]
Now in its third edition, this dictionary contains 3,400 key terms, words, and phrases used in the day-to-day practice of... [more]
A guide to building wealth by designing, creating, and marketing a successful app across any platform Chad Mureta has made... [more]
Electronic Health Record: A Systems Analysis of the Medications Domain [more]
Security De-Engineering: Solving the Problems in Information Risk Management [more]
Perkovic's Introduction to Programming Using Python provides an imperative-first introduction to Python focusing on computer... [more]
The 'Information Security Management Handbook' serves not only as an everyday reference for information security practitioners,... [more]
A clear and focused guide to creating useful user experience documentation As web sites and applications become richer... [more]
To deal with security issues effectively, it is usually not sufficient to have knowledge of theories. Practical experience... [more]