Learn, prepare, and practice for CompTIA Security+ SY0-701 exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning. Meer
The only authorized Lab Manual for the Cisco Networking Academy Networking Essentials Version 3 Course
The Cisco Certified Support Technician (CCST) Networking certification validates an individual's skills and knowledge of entry-level networking concepts and topics. Meer
Cryptography is a part of everyday life, with most of us being daily users of it, often without knowing. In this second edition, Sean Murphy and Rachel Player explain how cryptography works, discuss its impact on modern society, and highlight recent developments such as blockchain and post-quantum cryptography. Meer
This book discusses information modelling combined with a description of the express information model specification language. EXPRESS is a new language that when used with information modelling abstracts away the implementation bias prevalent in current data modelling technology. Meer
Parallel algorithms, i.e. computer operations designed to be performed independently, have recently increased in importance. Because today's computer applications require more power than can physically be provided by current machines, computing power can only be increased by having multiple processors work on different parts of a problem independently and simultaneously. Meer
Computers have dramatically altered life in the late twentieth century. Today we can draw on worldwide computer links, speeding up communications by radio, newspapers, and television. Meer
The prefix operation on a set of data is one of the simplest and most useful building blocks in parallel algorithms. This introduction to those aspects of parallel programming and parallel algorithms that relate to the prefix problem emphasizes its use in a broad range of familiar and important problems. Meer
Some of the fundamental constraints of automated machine vision have been the inability automatically to adapt parameter settings or utilize previous adaptations in changing environments. Meer
One effect of information technology is the increasing need to present information visually. The trend raises intriguing questions. What is the logical status of reasoning that employs visualization? Meer
According to virtually every business writer, we are in the midst of a new "information age," one that will revolutionize how workers work, how companies compete, perhaps even how thinkers think. Meer
Social Network Sites for Scientists: A Quantitative Survey explores the newest social network sites (for example, ResearchGate and Academia.edu) and web bibliographic platforms (Mendeley, Zotero) that have recently emerged for the scholarly community to use in the interchange of information and documents. Meer
IPv6 Advanced Protocols Implementation is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not specific to IPv6 but are extended to support IPv6. Meer
Architecture of Network Systems explains the practice and methodologies that will allow you to solve a broad range of problems in system design, including problems related to security, quality of service, performance, manageability, and more. Meer
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Meer
A compilation of key chapters from the top MK computer animation books available today - in the areas of motion capture, facial features, solid spaces, fluids, gases, biology, point-based graphics, and Maya. Meer
A new discipline, Quantum Information Science, has emerged in the last two decades of the twentieth century at the intersection of Physics, Mathematics, and Computer Science. Meer
Computability Theory: An Introduction to Recursion Theory provides a concise, comprehensive, and authoritative introduction to contemporary computability theory, techniques, and results. Meer
Writing Effective Business Rules moves beyond the fundamental dilemma of system design: defining business rules either in natural language, intelligible but often ambiguous, or program code (or rule engine instructions), unambiguous but unintelligible to stakeholders. Meer
Writing for Interaction focuses on the art of creating the information experience as it appears within software and web applications, specifically in the form of user interface text. Meer
High Performance Deformable Image Registration Algorithms for Manycore Processors develops highly data-parallel image registration algorithms suitable for use on modern multi-core architectures, including graphics processing units (GPUs). Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books