Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
With all signs pointing to an increased use of and interest in project-based work in modern organizations, the better scholars... [more]
This book looks at various application and data demand drivers, along with data infrastructure options from legacy on premise,... [more]
User-Centric Networks (UCN) and Information-Centric Networks (ICN) are new communication paradigms to increase the efficiency... [more]
(ISC)2 created the information security industry's first and only CBK[registered], a global compendium of information security... [more]
As demand for on-chip functionalities and requirements for low power operation continue to increase as a result of the emergence... [more]
An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives,... [more]
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient... [more]
Business managers have long known the power of the Balanced Scorecard in executing corporate strategy. Implementing the Project... [more]
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in... [more]
This book presents a framework to model the main activities of information security management and governance. The same model... [more]
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database... [more]
Transformation and Your New EHR offers a robust communication and change leadership approach to support electronic health... [more]
Get up to speed with the world s best email application Outlook 2019 Of the millions of people who use Outlook,... [more]
Presents a process for building a highly available and highly scalable content delivery network (CDN). This book offers terminology,... [more]
This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding... [more]
With 70 percent of organizations already adopting bring your own device (BYOD) and Gartner expecting this number to increase... [more]
Although enterprise mobility is in high demand across domains, an absence of experts who have worked on enterprise mobility... [more]
In today's business world, project managers not only have to be diligent in project planning and execution, but also need... [more]
By exploiting the synergies among available data, information fusion can reduce data traffic, filter noisy measurements, and... [more]
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents'... [more]
The bestselling CWNA study guide, updated for the latest exam The CWNA: Certified Wireless Network Administrator Study... [more]
The Internet Book, Fifth Edition explains how computers communicate, what the Internet is, how the Internet works, and what... [more]
This book introduces electrical machine modeling and control for electrical engineering and science to graduate, undergraduate... [more]
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach... [more]
Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security... [more]