Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Describes the essential software security concepts that are needed to conduct relevant and effective tests. This book considers... [more]
Analyses how technologies are emerging against a background of continuing globalization of research and development activities.... [more]
See how to use Skype for secure chats and connect SkypeOut and SkypeIN. [more]
Explores technologies and applications needed to overcome security issues in wireless and handheld communications devices.... [more]
Describes key technologies in wireless ad hoc networks including networking architectures and protocols, cross-layer architectures,... [more]
Written by the HIMSS RHIO Guidebook Task Force, this book is a comprehensive resource to support and guide those who are exploring,... [more]
Offers a solution to the multi-objective problem in routing computer networks. This book analyzes layer 3 (IP), layer 2 (MPLS),... [more]
Examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured... [more]
Software Development VCE Units 3 & 4 is a complete revision of the highly respected text Building Information Systems VCE... [more]
Covers model theory, practice, and presentation. This book describes the need for model creation and demonstrates how to create... [more]
Defines 802.1X port-based authentication concept and explores its various applications to computer networks using this particular... [more]
Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, this work covers key... [more]
Describes the technologies and capabilities supporting next generation services, focusing particularly on multimedia interactive... [more]
Part of the Made Simple Books series, this book talks about communicating using email and the internet. It is presented... [more]
Offers explanations of key issues in information protection, describing the basic structure of information protection and... [more]
Describes the convergence of two movements - globally distributed and agile software development. This book explores techniques... [more]
Covers various aspects of security in sensor networks. This volume details attacks, encryption, authentication, watermarking,... [more]
Presents a perspective of the ISO/IEC 17799 Information Security Standard and provides an analysis of how to effectively measure... [more]
Illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business... [more]
Knowledge management is the identification and analysis of available and required knowledge, and the subsequent planning and... [more]
Undertakes a comprehensive linguistic and historical study of the plain style tradition in poetry, its relationship with so-called... [more]
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data... [more]
Explains how corporate culture affects perceptions of risk and information security, and how this in turn affects employee... [more]
Includes step-by-step projects useful for learning UNIX and Linux. This book helps the readers employ utilities, learn files,... [more]
A guide for understanding human rights treaties, this work contains an exploration of patterns of participation and of exactly... [more]