Many enterprises are moving their applications and IT services to the cloud. Better risk management results in fewer operational surprises and failures, greater stakeholder confidence and reduced regulatory concerns; proactive risk management maximizes the likelihood that an enterprise’s objectives will be achieved, thereby enabling organizational success. Meer
Today's enterprise cannot effectively function without a network, and today's enterprise network is almost always based on LAN technology. In a few short years, LANs have become an essential element of today's business environment. Meer
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. Meer
This latest textbook from bestselling author, Douglas E. Comer, is a class-tested book providing a comprehensive introduction to cloud computing. Focusing on concepts and principles, rather than commercial offerings by cloud providers and vendors, The Cloud Computing Book: The Future of Computing Explained gives readers a complete picture of the advantages and growth of cloud computing, cloud infrastructure, virtualization, automation and orchestration, and cloud-native software design. Meer
On behalf of the Organizing Committee for this event, we are glad to welcome you to IWASE 2006, the First International Workshop on Advanced Software Engineering. Meer
This is the first book treatment on two "hot button" topics in Information Systems, Computer Science and Education: the application of web technology for educational use. Meer
Presents original method of enhanced ant colony optimization in feature selection, based on mathematical experiments and modelling.
Provides a theoretical concept in iris features searching and detection as part of feature extraction process. Meer
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors' works already introduced at the International Multi-Conference on Advanced Computer Information and Security Systems ACS-CISIM 2005. Meer
Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography.
Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the presentation emphasises the essential mathematical nature of the computations and arguments involved in cryptography. Meer
This book describes the state-of-the-art in ontology-driven information systems (ODIS) and gives a complete perspective on the problems, solutions and open research questions in this field. Meer
Illustrates by example the typical steps necessary in computer science to build a mathematical model of any programming paradigm .
Presents results of a large and integrated body of research in the area of 'quantitative' program logics. Meer
Now available in paperback, this book covers some recent developments in statistical inference. It provides methods applicable in problems involving nuisance parameters such as those encountered in comparing two exponential distributions or in ANOVA without the assumption of equal error variances. Meer
A brilliant treatment of a knotty problem in computing. This volume contains chapters written by reputable researchers and provides the state of the art in theory and algorithms for the traveling salesman problem (TSP). Meer
Intelligent Information Processing supports the most advanced productive tools that are said to be able to change human life and the world itself. This book presents the proceedings of the 4th IFIP International Conference on Intelligent Information Processing. Meer
This book presents state-of-the-art analytical methods from statistics and data mining for the analysis of high-throughput data from genomics and proteomics. Meer
Semantic Web: Real-World Applications from Industry offers a glimpse into the opening door of semantic technologies by means of concentrated examples of semantic applications in real business environments. Meer
Joseph Dvorak has over 10 years experience in wearable technology and design. He led the Conformables project at Motorola which researched highly wearable and easy to use devices and applications. Meer
Functional verification has become an important aspect of the chip design process. Significant resources, both in industry and academia, are devoted to the design complexity and verification endeavors. Meer
Information Systems Development (ISD) progresses rapidly, continually creating new challenges for the professionals involved. New concepts, approaches and techniques of systems development emerge constantly in this field. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books