Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Shows ways in which to use a standard recognized notation to capture, or model, knowledge to be used in a knowledge management... [more]
Addresses the basics, network architectures, protocol, and traffic engineering needed to operate MPLS and GMPLS networks.... [more]
Incorporating readings of Heaney's elegies, pastoral eclogues and sonnets, this book presents a formal analysis which comprises... [more]
Wireless mesh networking is a technology that has the potential to revolutionize how we access the Internet and communicate... [more]
Offers advice for project and application managers looking to minimize the number of crises they have to deal with and for... [more]
This updated guide covers everything readers need to know about electronic mail. New to this edition is: advice on choosing... [more]
This book explains the key features of Symbian OS and will help you to write effective C++ code. It focuses on aspects of... [more]
Explains the methodologies, framework, and 'unwritten conventions' that ethical hacks should employ to provide the maximum... [more]
Presents an overview of information systems security, offering the basic underpinnings of information security and concluding... [more]
Provides a comprehensive insight into the world of wireless technology marketing. This book is based upon the rationale that... [more]
Shows how information security must be integrated into various aspects of the business process. This book examines Tier 1,... [more]
By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides businesses... [more]
Fundamentals of Network Planning and Optimisation for Wireless Communications presents a detailed coverage of Network Planning... [more]
Telegeoinformatics is a rapidly emerging subject focusing on the theory and applications of integrated telecommunications,... [more]
Offers a synopsis of LDAP fundamentals. This book delivers the theoretical background needed to understand how these servers... [more]
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]
A self study guide that includes clear instructions or drill book on Project Management. It includes sections on 'The Math'... [more]
Explains security through a holistic approach by considering both the overall security infrastructure and the roles of each... [more]
Presents a compendium of protocols for securing online commerce and payments that provides a broad overview of electronic... [more]
Reveals how readers can evaluate the security needs of their networks, develop a security policy for their companies, and... [more]
Offers a formal framework for finding and eliminating network security threats. This title focuses on the steps necessary... [more]
Presents the fundamentals of information theory and data compression. This book discusses the historical and theoretical basis... [more]
Internet based applications are the emerging major source of traffic for wireless networks. Soon we will all be able to... [more]
Discusses successful approaches for the CISSP exam, provides sample questions and test-taking tips, and contains an annotated... [more]
A reference for the communications field that covers topics such as: Telephony Communication Networks; Optical Communications;... [more]