Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Shows you how to create simulations from templates and solve problems using Mathematica. Along with sections on order statistics,... [more]
Greater competition is pressuring industries to improve efficiency through the use of Software Product Line (SPL), which has... [more]
Discusses the fundamentals, security challenges, and solutions in Radio Frequency Identification (RFID), Wireless Sensor Networks... [more]
Outlines the best way to position yourself for future success. With coverage ranging from basic concepts to research, this... [more]
Image and video signals require large transmission bandwidth and storage, leading to high costs. The data must be compressed... [more]
If you're ready to take your knowledge of ArcGIS to the next level, then you need to learn how to work with ArcObjects. But... [more]
Computer systems have become an important element of the world economy, with billions of dollars spent each year on development,... [more]
Efficient access to data, sharing data, extracting information from data, and making use of the information have become urgent... [more]
Traditional methods for handling spatial data are encumbered by the assumption of separate origins for horizontal and vertical... [more]
This introductory reference focuses on the concept of the semantic Web, its principal technologies, its real-world applications,... [more]
Presents an analysis of key scaling technologies. This book demonstrates the effectiveness of the technologies via mathematical... [more]
Includes an introduction to LAN/MAN/WAN network design detailing the network architecture and equipment. This work describes... [more]
Developed by Jean-Paul Benzerci, correspondence analysis as a framework for analyzing data quickly found widespread popularity... [more]
Presents an overview to the theory and applications of mechatronic processes, emphasizing the adaptation and incorporation... [more]
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of... [more]
Addresses the migration and macro-level scalability requirements to support DoD/DIS/GAO drive for an IPv6-based US Government... [more]
Demonstrates the design principles and techniques that enable the design of software that empowers business staff to make... [more]
Covers model theory, practice, and presentation. This book describes the need for model creation and demonstrates how to create... [more]
Discusses the CM framework from a standards viewpoint, using original DoD standards to describe elements of configuration... [more]
By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides businesses... [more]
Details the applications needed to investigate properties of PNs relevant to the improvement of modern wireless systems. This... [more]
Offers an overview of advanced methods for solving problems in business, economics, and finance. This book describes techniques,... [more]
Contains an embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues... [more]
The product of many years of practical experience and research in the software measurement business, this technical reference... [more]
Introduces a fresh generation of network technologies and architecture that allows the creation, customization, and management... [more]