Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Meer
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Meer
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Meer
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. Meer
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Meer
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. Meer
Mastering C# Beginner’s Guide will take you, step by step, through the process of learning one of the best programming languages out there.
Mastering C# takes the language to the next level by promoting the ability to cleanly run programs that don’t rely on static type definitions. Meer
This book consolidates findings previously published in prestigious international journals and presented at leading conferences. The book introduces basic mathematical concepts, and later chapters build upon these foundations, but each focusses on specific aspects of ontology alignment, making the content accessible and easy to follow. Meer
This textbook provides a strong foundation and a clear overview for students of membrane biology and an invaluable synthesis of cutting-edge research for working scientists. Meer
The first edition of the Encyclopedia of Complexity and Systems Science (ECSS, 2009) presented a comprehensive overview of granular computing (GrC) broadly divided into several categories: Granular computing from rough set theory, Granular Computing in Database Theory, Granular Computing in Social Networks, Granular Computing and Fuzzy Set Theory, Grid/Cloud Computing, as well as general issues in granular computing. Meer
Information seeking is a fundamental human activity. In the modern world, it is frequently conducted through interactions with search systems. The retrieval and comprehension of information returned by these systems is a key part of decision making and action in a broad range of settings. Meer
Structural information theory is a coherent theory about the way the human visual system organises a raw visual stimulus into objects and object parts. Meer
More students study management and organization studies than ever, the number of business schools worldwide continues to rise, and more management research is being published in a greater number of journals than could have been imagined twenty years ago. Meer
Computational experiments on algorithms can supplement theoretical analysis by showing what algorithms, implementations and speed-up methods work best for specific machines or problems. Meer
Written for the OCR A/AS Level Computer Science specifications for first teaching from 2015, this print student book helps students build their knowledge and master underlying computing principles and concepts. Meer
Is college worth the cost? Should I worry about arsenic in my rice? Can we recycle pollution? Real questions of personal finance, public health, and social policy require sober, data-driven analyses. Meer
Implement the powerful multimedia and interactive capabilities offered by HTML5, including style control tools, illustration tools, video, audio, and rich media solutions. Meer
This book aims to capture the fundamentals of computer programming without tying the topic to any specific programming language. To the best of the authors’ knowledge there is no such book in the market. Meer
In view of the growing presence and popularity of multicore and manycore processors, accelerators, and coprocessors, as well as clusters using such computing devices, the development of efficient parallel applications has become a key challenge to be able to exploit the performance of such systems. Meer
Recent healthcare reform and its provisions have pushed health information technology (HIT) into the forefront. Higher life expectancies, fewer medical errors, lower costs, and improved transparency are all possible through HIT. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books