Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Meer
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. Meer
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. Meer
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. Meer
Large-Scale Simulation: Models, Algorithms, and Applications gives you firsthand insight on the latest advances in large-scale simulation techniques. Most of the research results are drawn from the authors’ papers in top-tier, peer-reviewed, scientific conference proceedings and journals. Meer
Big data has always been a major challenge in geoinformatics as geospatial data come in various types and formats, new geospatial data are acquired very fast, and geospatial databases are inherently very large. Meer
This book provides a much needed short, reliable and stimulating guide to the mass media in present day society. Incisive, surprising and stimulating it will become an essential text in thinking and writing about the mass media. Meer
Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive introduction to networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers, and their uses. Meer
Modelling and simulation techniques are of central importance to conducting research in sport and exercise science, informing data collection and helping to analyze patterns of movement and physical performance. Meer
Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. Meer
This book presents the analysis, design, documentation, and quality of software solutions based on the OMG UML v2.5. Notably it covers 14 different modelling constructs including use case diagrams, activity diagrams, business-level class diagrams, corresponding interaction diagrams and state machine diagrams. Meer
The book focuses on how machine learning and the Internet of Things (IoT) has empowered the advancement of information driven arrangements including key concepts and advancements. Meer
Critical Theory and Qualitative Data Analysis in Education offers a path-breaking explanation of how critical theories can be used within the analysis of qualitative data to inform research processes, such as data collection, analysis, and interpretation. Meer
Critical Theory and Qualitative Data Analysis in Education offers a path-breaking explanation of how critical theories can be used within the analysis of qualitative data to inform research processes, such as data collection, analysis, and interpretation. Meer
This book reflects the move in Human Computer Interaction studies from standard usability concerns towards a wider set of problems to do with fun, enjoyment, aesthetics and the experience of use. Meer
Intelligent technical systems are networked, embedded systems incorporating real-time capacities that are able to interact with and adapt to their environments. Meer
There are many books on the use of numerical methods for solving engineering problems and for modeling of engineering artifacts. In addition there are many styles of such presentations ranging from books with a major emphasis on theory to books with an emphasis on applications. Meer
Modem computer systems possess two main characteristics: their ever growing complexity and the increasing number and range of abnormal situa tions they have to cope with successfully in order to deliver the service. Meer
Call-by-push-value is a programming language paradigm that, surprisingly, breaks down the call-by-value and call-by-name paradigms into simple primitives. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books