SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. Meer
Emotions, Technology, and Social Media discusses the ways the social media sphere uses emotion and technology, and how each of these has become part of the digital culture. Meer
Pragmatic Enterprise Architecture is a practical hands-on instruction manual for enterprise architects. This book prepares you to better engage IT, management, and business users by equipping you with the tools and knowledge you need to address the most common enterprise architecture challenges. Meer
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. Meer
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. Meer
Repurposing Legacy Data: Innovative Case Studies takes a look at how data scientists have re-purposed legacy data, whether their own, or legacy data that has been donated to the public domain. Meer
Bio-Inspired Computation and Applications in Image Processing summarizes the latest developments in bio-inspired computation in image processing, focusing on nature-inspired algorithms that are linked with deep learning, such as ant colony optimization, particle swarm optimization, and bat and firefly algorithms that have recently emerged in the field. Meer
Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. Meer
Example-Based Super Resolution provides a thorough introduction and overview of example-based super resolution, covering the most successful algorithmic approaches and theories behind them with implementation insights. Meer
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. Meer
Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today’s corporate security professionals: piracy, espionage, and computer hacking. Meer
The Material Point Method: A Continuum-Based Particle Method for Extreme Loading Cases systematically introduces the theory, code design, and application of the material point method, covering subjects such as the spatial and temporal discretization of MPM, frequently-used strength models and equations of state of materials, contact algorithms in MPM, adaptive MPM, the hybrid/coupled material point finite element method, object-oriented programming of MPM, and the application of MPM in impact, explosion, and metal forming. Meer
Extended Finite Element Method provides an introduction to the extended finite element method (XFEM), a novel computational method which has been proposed to solve complex crack propagation problems. Meer
Bitemporal data has always been important. But it was not until 2011 that the ISO released a SQL standard that supported it. Currently, among major DBMS vendors, Oracle, IBM and Teradata now provide at least some bitemporal functionality in their flagship products. Meer
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. Meer
Applications of Multi-Criteria Decision-Making Theories in Healthcare and Biomedical Engineering contains several practical applications on how decision-making theory could be used in solving problems relating to the selection of best alternatives. Meer
Mathematica by Example, Sixth Edition is an essential resource for the Mathematica user, providing step-by-step instructions on achieving results from this powerful software tool. Meer
Human-Machine Shared Contexts considers the foundations, metrics, and applications of human-machine systems. Editors and authors debate whether machines, humans, and systems should speak only to each other, only to humans, or to both and how. Meer
The Intelligent Systems Series publishes reference works and handbooks in three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. Meer
There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. Meer
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books