As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Meer
Augmented Materials and Smart Objects investigates the issues required to ensure technology platforms capable of being seamlessly integrated into everyday objects, particularly the requirements for integrated computation and MEMs sensors, System-in-a-package solutions, multi-chip modules, the impact of the trend towards embedded microelectronic electronics sub-systems, novel assembly techniques for autonomous MEMs sensors, as well as practical performance issues that are key to the AmI concept. Meer
This book is about using interactive and dynamic plots on a computer screen as part of data exploration and modeling, both alone and as a partner with static graphics and non-graphical computational methods. Meer
Much current research in computer science is concerned with two questions: is a program correct? And how can we improve a correct program preserving correctness? Meer
Implicit definition and description of geometric objects and surfaces plays a critical role in the appearance and manipulation of computer graphics. In addition, the mathematical definition of shapes, using an implicit form, has pivotal applications for geometric modeling, visualization and animation. Meer
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Meer
This edited volume explores several issues relating to parametric segmentation including robust operations, model selection criteria and automatic model selection, plus 2D and 3D scene segmentation. Meer
In establishing a framework for dealing with uncertainties in software engineering, and for using quantitative measures in related decision-making, this text puts into perspective the large body of work having statistical content that is relevant to software engineering. Meer
Computer models offer a means of interpreting and analyzing the dynamics of real-world systems ranging from population growth to ozone depletion and a new section on modeling in genetics. Meer
Addressing various aspects of object-oriented software techniques with respect to their impact on testing, this text argues that the testing of object-oriented software is not restricted to a single phase of software development. Meer
According to some estimates, 95% of information today is stored on paper, 3% on microfiche, and only 2% on magnetic/optical and semiconductor storage devices. Meer
Beginning with realistic mathematical or verbal models of physical or biological phenomena, the author derives tractable models for further mathematical analysis or computer simulations. Meer
Making Grids Work includes selected articles from the CoreGRID Workshop on Grid Programming Models, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments held at the Institute of Computer Science, Foundation for Research and Technology - Hellas in Crete, Greece, June 2007. Meer
An Updated Guide to the Visualization of Data for Designers, Users, and Researchers
Interactive Data Visualization: Foundations, Techniques, and Applications, Second Edition provides all the theory, details, and tools necessary to build visualizations and systems involving the visualization of data. Meer
Although the web and online SAS® communities can provide volumes of information for programmers, these resources are often overwhelming and lack a simple path to guide coding SAS. Meer
This two-volume book describes the most common IP routing protocols used today, explaining the underlying concepts of each protocol and how the protocol components and processes fit within the typical router. Meer
This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer’s perspective, linking theory and fundamental concepts to common practices and everyday examples. Meer
Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography.
Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the presentation emphasises the essential mathematical nature of the computations and arguments involved in cryptography. Meer
Provides a thorough coverage and comparison of a wide array of time series models and methods: Exponential Smoothing, Holt Winters, ARMA and ARIMA, deep learning models including RNNs, LSTMs, GRUs, and ensemble models composed of combinations of these models. Meer
Represents a substantial research contribution to state-of-the-art solutions for addressing the threats to Confidentiality, Integrity, and Availability (CIA Triad) in high-performance computing (HPC) environments. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books