Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Combines network design fundamentals with fresh material on LAN devices and topologies, wireless local networks, and LAN inter... [more]
By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides businesses... [more]
Fundamentals of Network Planning and Optimisation for Wireless Communications presents a detailed coverage of Network Planning... [more]
Telegeoinformatics is a rapidly emerging subject focusing on the theory and applications of integrated telecommunications,... [more]
Offers a synopsis of LDAP fundamentals. This book delivers the theoretical background needed to understand how these servers... [more]
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]
A self study guide that includes clear instructions or drill book on Project Management. It includes sections on 'The Math'... [more]
Explains security through a holistic approach by considering both the overall security infrastructure and the roles of each... [more]
Presents a compendium of protocols for securing online commerce and payments that provides a broad overview of electronic... [more]
Reveals how readers can evaluate the security needs of their networks, develop a security policy for their companies, and... [more]
Offers a formal framework for finding and eliminating network security threats. This title focuses on the steps necessary... [more]
Presents the fundamentals of information theory and data compression. This book discusses the historical and theoretical basis... [more]
Internet based applications are the emerging major source of traffic for wireless networks. Soon we will all be able to... [more]
Communications and IT professionals are often asked to make decisions that affect telecommunications services and costs for... [more]
Discusses successful approaches for the CISSP exam, provides sample questions and test-taking tips, and contains an annotated... [more]
A reference for the communications field that covers topics such as: Telephony Communication Networks; Optical Communications;... [more]
Describes the journey of a frustrated call center manager who discovers hidden secrets about delivering the most outrageously... [more]
Takes readers through developing, distributing, and monitoring an information security awareness program. This book includes... [more]
Fault-tolerant computing is the use of redundant elements in a system's design which allow the system to continue functioning... [more]
Are you putting your best foot forward in meetings? Are you connecting with the right people at functions? Throughout your... [more]
Presents Internet management know-how. This book gives a strategic and a tactical view of the Internet landscape covering... [more]
The convergence of knowledge, technology, and human performance that comprises an enterprise necessitates creative business... [more]
Supported by global case studies highlighting good practice, and from the results of a survey of top UK corporate intranet... [more]
The only thing worse than no e-business presence is a bad e-business presence. This book explores using Internet technology... [more]
Helps designers world-wide find relevant guidelines for the design of HCI, to facilitate the use of advanced technologies... [more]