Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Covering quality development practices based on ISO 9001, which help you create consistently high-quality software in a cost-efficient... [more]
Integrating Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) for the first time, this comprehensive... [more]
Supplying a complete overview of the concepts executives need to know, this book provides the tools needed to ensure your... [more]
Today's aggressively competitive networking market requires not building bigger, more complicated networks, but smarter, more... [more]
More than just an explanation of IMS, this book addresses how IMS-based services could be deployed in an operator's network.... [more]
Outlines the best way to position yourself for future success. With coverage ranging from basic concepts to research, this... [more]
This book explores how bar coding technologies are used in healthcare to provide safe patient care and reduce preventable... [more]
Written by two CIOs with a wealth of leadership experience in healthcare, this book provides prescriptive guidance for the... [more]
Presents a comprehensive view of the methods, functions, network elements, and the interfaces among them that enable the building... [more]
Blogging and other types of social media such as wikis and social networking sites have transformed the way we use the internet.... [more]
Whether you're new to Active Directory (AD) or a savvy system administrator looking to brush up on your skills, this title... [more]
Provides an introduction to security issues, advances, and future directions. This book examines the standards of security,... [more]
Companies worldwide are rapidly adopting Service-Oriented Architecture, a design methodology used to connect systems as services,... [more]
With examples and exercises, this work develops simple models and analytical methods from first principles to evaluate performance... [more]
Offers a SWOT analysis of PSTN/GSM operators that are facing such threats as internet communities, unlicensed spectrum, and... [more]
Employees know a company's computer system better than anyone and have access to important information about the company and... [more]
Contains papers selected from the 'International Forum of Information Systems Frontiers - Xian International Symposium (IFISF,... [more]
User identification and authentication are essential to modern security. This book presents the general philosophy of user... [more]
Describes the essential software security concepts that are needed to conduct relevant and effective tests. This book considers... [more]
Analyses how technologies are emerging against a background of continuing globalization of research and development activities.... [more]
See how to use Skype for secure chats and connect SkypeOut and SkypeIN. [more]
Explores technologies and applications needed to overcome security issues in wireless and handheld communications devices.... [more]
Describes key technologies in wireless ad hoc networks including networking architectures and protocols, cross-layer architectures,... [more]
Written by the HIMSS RHIO Guidebook Task Force, this book is a comprehensive resource to support and guide those who are exploring,... [more]
Examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured... [more]