Everything users need to maximize the power of Linux is included in this convenient, inexpensive package. The Complete Linux Kit contains the third editions of the best-selling Linux Universe and LINUX-Unleashing the Workstation in your PC. Meer
An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research. Meer
Almost 12 years have passed by since we wrote Chaos and Fractals. At the time we were hoping that our approach of writing a book which would be both accessible without mathematical sophistication and portray these exiting new fields in an authentic manner would find an audience. Meer
This second edition of Grune and Jacobs’ brilliant work presents new developments and discoveries that have been made in the field. Parsing, also referred to as syntax analysis, has been and continues to be an essential part of computer science and linguistics. Meer
Advances in surgery have reached an exponential scale, and the changes of the last decade of the twentieth century have become common pr- tice. Imagination and foresight are the more visible standards for prof- sional appointments than ever before. Meer
A brief but comprehensive introduction to the field and pragmatic guidance on the implementation of a sound quality system in the organization. It provides an enhanced knowledge of software inspections, metrics, process involvement, assessment of organization, problem solving, customer satisfaction surveys, the CMM, SPICE, and formal methods. Meer
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. Meer
This updated textbook introduces readers to assembly and its evolving role in computer programming and design. The author concentrates the revised edition on protected-mode Pentium programming, MIPS assembly language programming, and use of the NASM and SPIM assemblers for a Linux orientation. Meer
Details the different activities of software development with a case-study approach whereby a project is developed through the course of the book
The sequence of chapters is essentially the same as the sequence of activities performed during a typical software project. Meer
The breakthrough idea of parallel coordinates has enchanted many people with its cleverness and power. Al Inselberg, the source of that cleverness and power, ? Meer
An understanding of the techniques used to make distributed computing systems and networks reliable, fault-tolerant and secure will be crucial to those involved in designing and deploying the next generation of mission-critical applications and Web Services. Meer
This book provides an accelerated introduction to Maple for scientific programmers who already have experience in other computer languages (such as C, Pascal, or FORTRAN). Meer
This book focuses on artificial intelligence and deep learning approaches, with case studies to solve problems associated with biometric security such as authentication, spoofing attack detection, and object detection. Meer
Reliable human authentication schemes are of paramount importance in our highly networked society. Advances in biometrics help address the myriad of problems associated with traditional human recognition methods. Meer
Optical networks have moved from laboratory settings and theoretical research to real-world deployment and service-oriented explorations. New technologies such as Ethernet PON, traffic grooming, regional and metropolitan network architectures and optical packet switching are being explored, and the landscape is continuously and rapidly evolving. Meer
1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. Meer
Data mining is a mature technology. The prediction problem, looking for predictive patterns in data, has been widely studied. Strong me- ods are available to the practitioner. Meer
Introduction The goal of this book is to introduce XML to a bioinformatics audience. It does so by introducing the fundamentals of XML, Document Type De? Meer
Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books