Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Nature-inspired includes, roughly speaking, bio-inspired + physical-inspired + social-inspired + and so on. This book contains... [more]
This book examines the convergence of Cloud Computing, Big Data, and the Internet of Things to forge the Next Internet. Ubiquitous... [more]
Over the years, many fundamental changes have occurred in data communications and networking that will shape the future for... [more]
This book introduces students to business process management, an approach that aims to align the organization's business processes... [more]
Simulation is a widely used mechanism for validating the theoretical models of networking and communication systems. Although... [more]
Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through... [more]
Network science is a rapidly emerging field of study that encompasses mathematics, computer science, physics, and engineering.... [more]
This work demonstrates how Lotus Notes/Domino can be used to deliver groupware applications through intranets, extranets and... [more]
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS,... [more]
This book presents state-of-the-art solutions to the theoretical and practical challenges stemming from the leverage of big... [more]
Many of the challenges of the next century will have physical dimensions, such as tsunamis, hurricanes, and climate change... [more]
As a manager of the 90s, you know that IT departments like your own must continue to meet increasingly sophisticated end-user... [more]
As the dividing line between traditional computing science and telecommunications quickly becomes blurred or disappears in... [more]
This essential handbook for the data communications/network manager and planner covers a variety of data communication and... [more]
Servers are the heart of the network. The Handbook of Server Management and Administration keeps you up-to-date with the very... [more]
Cracking open the politics of transparency and secrecy In an era of open data and ubiquitous dataveillance, what does it mean... [more]
Executives should not necessarily know the intricacies of project management, but they should know how project management,... [more]
A book on project management. [more]
The only official study guide for the new CCSP exam As the only official study guide reviewed and endorsed by (ISC)2,... [more]
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for... [more]
Packed with hands-on activities, MCSA GUIDE TO INSTALLATION, STORAGE, AND COMPUTE WITH MICROSOFT (R) WINDOWS SERVER (R) 2016,... [more]
This book serves as an introduction into the world of security and provides insight into why and how current security management... [more]
The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything... [more]
Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate... [more]
This book presents the Cognitive Information Centric Sensor Network (CICSN) framework for the IoT. This framework is built... [more]