Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. Meer
Low-Rank Models in Visual Analysis: Theories, Algorithms, and Applications presents the state-of-the-art on low-rank models and their application to visual analysis. Meer
Heterogeneous Computing with OpenCL, Second Edition teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs) such as AMD Fusion technology. Meer
Complex Systems and Clouds: A Self-Organization and Self-Management Perspective provides insights into the intricate world of self-organizing systems. Meer
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Meer
Understanding Virtual Reality: Interface, Application, and Design, Second Edition arrives at a time when the technologies behind virtual reality have advanced dramatically. Meer
Practical Machine Learning for Data Analysis Using Python is a problem solver’s guide for creating real-world intelligent systems. It provides a comprehensive approach with concepts, practices, hands-on examples, and sample code. Meer
For an introductory, one-semester course in Usability Engineering.
Written in an accessible, conversational style, this comprehensive introduction is crafted to support a project-based course emphasizing the development process. Meer
Deep Learning through Sparse Representation and Low-Rank Modeling bridges classical sparse and low rank models—those that emphasize problem-specific Interpretability—with recent deep network models that have enabled a larger learning capacity and better utilization of Big Data. Meer
The Definitive Guide to Arm® Cortex®-M23 and Cortex-M33 Processors focuses on the Armv8-M architecture and the features that are available in the Cortex-M23 and Cortex- M33 processors. Meer
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. Meer
For a one-semester undergraduate-level course in Cryptology, Mathematics, or Computer Science.
Designed for either the intelligent freshman (good at math) or for a low-level junior year first course, Cryptology introduces a wide range of up-to-date cryptological concepts along with the mathematical ideas that are behind them. Meer
Other books focused on SDN and NFV tend address technical audiences, and information for non-technical people who need only a high level understanding is scant. Meer
This best-selling guide from authors Elaine Weinmann and Peter Lourekas has been the go-to tutorial and reference book for photography/design students and has been the textbook of choice in college classrooms for decades. Meer
Abstract data types (ADT's) and data structures are key elements in unlocking the power of object-oriented programming. Designed for CS2 course; this popular book thoroughly covers ADTs (Abstract Data Types), data structures, and their use in problem solving. Meer
For introductory courses in computer concepts, digital literacy, or computer literacy, often including instruction in Microsoft Office.
Using technology to teach technology
Explore, discover, and experience technology with Technology in Action, the best seller that uses technology to teach technology. Meer
Welcome to CompTIA Security+ SY0-501 Pearson uCertify Course
CompTIA Security+ SY0-501 uCertify Course is an easy-to-use online course that allows you to assess your readiness and teaches you what you need to know to pass the CompTIA Security+ SY0-501 exam. Meer
Now live! SUMMER 2020 DIGITAL UPDATE for digital content
Microsoft Office 365 updates are reflected in the eText and associated MyLab for this title. Meer
Intent-Based Networking (IBN) enables you to create networks that capture business intent, automatically activate it across your network, assure that your network has responded properly, proactively detect and contain security threats, and remedy other network issues before users even notice. Meer
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books