Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
A three volume set on data warehousing, contains 'The Data Warehouse Toolkit', 'The Data Warehouse Lifecycle Toolkit', 'The... [more]
Linked Data Management presents techniques for querying and managing Linked Data that is available on today's Web. The book... [more]
Administrators of academic professional and technical communication (PTSC) programs have long relied upon lore--stories of... [more]
Originating from Facebook, LinkedIn, Twitter, Instagram, YouTube, and many other networking sites, the social media shared... [more]
Preface In the international marketplace, businesses, suppliers, and customers do create and consume vast amounts of information.... [more]
Suitable for researchers in machine learning, data mining, and computer vision, this book presents discussions on algorithms... [more]
Looking at safe computing, this text gives in-depth exposure to the various ways in which security of information on computers... [more]
Powerful, Flexible Tools for a Data-Driven World As the data deluge continues in today's world, the need to master data mining,... [more]
This text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors... [more]
This revised and updated edition of the bestseller provides a complete library of dimensional modeling techniques, the most... [more]
Expert Bytes: Computer Expertise in Forensic Documents - Players, Needs, Resources and Pitfalls -introduces computer scientists... [more]
Providing a broad overview of the state of the art, this book presents mathematical methods and tools for representing fuzzy... [more]
Research on the problem of clustering tends to be fragmented across the pattern recognition, database, data mining, and machine... [more]
Although today's job market requires IT professionals to understand cloud computing theories and have hands-on skills for... [more]
New technologies have enabled us to collect massive amounts of data in many fields. However, our pace of discovering useful... [more]
Integrating ideas from the fields of systems science and knowledge science, Knowledge and Systems Science: Enabling Systemic... [more]
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the... [more]
Get started with the new Access 2013 with this impressive all-in-one reference!<br... [more]
The easy guide to Microsoft Access returns with updates on the latest version!<br... [more]
With today's consumers spending more time on their mobiles than on their PCs, new methods of empirical stochastic modeling... [more]
Data mining has witnessed substantial advances in recent decades. New research questions and practical challenges have arisen... [more]
Data anonymisation provides a systematic and integrated approach to privacy protection. Discussing the analysis, planning,... [more]
Collecting, analyzing, and extracting valuable information from a large amount of data requires easily accessible, robust,... [more]
Learn How to Design Effective Visualization Systems Visualization Analysis and Design provides a systematic, comprehensive... [more]
Going beyond performing simple analyses, researchers involved in the highly dynamic field of computational intelligent data... [more]