Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
With powerful computer-based exercises, simulations and in-depth remediation capabilities, LabConnection' provides a uniquely... [more]
Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used... [more]
Presenting the methodologies and concepts required for successful penetration testing, this book discusses the process from... [more]
The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the... [more]
Rev. ed. of: Antipatterns / Phillip A. Laplante, Colin J Neill. [more]
The core concepts and technologies you need to administer a Windows Server OS Administering a Windows operating system... [more]
Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile... [more]
IP Telephony Interconnection Reference: Challenges, Models, and Engineering [more]
This book provides an introduction to optimization theory and its applications. It is written for senior undergraduate students... [more]
Although recent global disasters have clearly demonstrated the power of social media to communicate critical information in... [more]
This title offers a gentle pathway to the essential ideas that constitute ODP and shows how these ideas can be applied when... [more]
Cloud and Virtual Data Storage Networking [more]
In an era of intensive competition where plant operating efficiencies must be maximized, downtime due to machinery failure... [more]
Presents information in forensic computing and IT security. This volume offers practical insight to security and its importance... [more]
Widespread availability of pervasive and mobile devices coupled with advances in networking technologies make opportunistic... [more]
Winner of HIMSS 2011 Book of the Year Award!<br /><br />Health Information... [more]
Examines analytical measures and discusses virtualization, network computing, and web services as approaches for green data... [more]
Data Center Storage: Cost-Effective Strategies, Implementation, and Management [more]
Offering an introduction to Cloud-based healthcare IT system, this timely book equips healthcare providers with the background... [more]
Provides ergonomic principles of times, machines, production space, materials and organisation, within contemporary demands... [more]
The perennial bestseller shows you how share your files andInternet connection across a wireless network Fully updated for... [more]
Focusing just on the essentials of command-line interface (CLI), this title shows how to quickly perform day-to-day tasks... [more]
While there are sporadic journal articles on socio-technical networks, there's long been a need for an integrated resource... [more]
Provides a comprehensive introduction to developing location-based information systems based on GPS-enabled cellular phones.... [more]
An exploration of security issues in self-organizing networks, this book reflects the research and advances to address security... [more]