This book constitutes the proceedings of the 20th International Semantic Web Conference, ISWC 2021, which took place in October 2021. Due to COVID-19 pandemic the conference was held virtually. Meer
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Meer
This book provides tools and algorithms for solving a wide class of optimization tasks by learning from their repetitions. A unified framework is provided for learning algorithms that are based on the stochastic gradient (a golden standard in learning), including random simultaneous perturbations and the response surface the methodology. Meer
This two-volume set of LNAI 13028 and LNAI 13029 constitutes the refereed proceedings of the 10th CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2021, held in Qingdao, China, in October 2021. Meer
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. Meer
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. Meer
This book constitutes the refereed proceedings of the 4th International Workshop on Machine Learning for Medical Reconstruction, MLMIR 2021, held in conjunction with MICCAI 2021, in October 2021. Meer
This book provides a comprehensive view of cyber operations, analysis and targeting, including operational examples viewed through a lens of conceptual models available in current technical and policy literature. Meer
This book constitutes the proceedings of the 20th International Symposium on Intelligent Data Analysis, IDA 2022, which was held in Rennes, France, during April 20-22, 2022. Meer
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. Meer
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Meer
Add the power of HDR photography, Full HD video, and AI image recognition to your Raspberry Pi projects. Give intelligence and depth to your creations, making your projects smarter and more responsive. Meer
The Book of Making 2025 distills the latest year of HackSpace magazine down to our favourite maker projects. Written by makers for makers, this book features a diverse range of projects to build. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books