Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. Meer
Visualization and visual analytics are powerful concepts for exploring data from various application domains. The endless number of possible parameters and the many ways to combine visual variables as well as algorithms and interaction techniques create lots of possibilities for building such techniques and tools. Meer
Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of security architecture a difficult proposition. Meer
While the JPEG image standard was developed more than 25 years ago, it is still dominant in terms of image formation, manipulation and transmission over the internet and other media. Meer
Almost all the systems in our world, including technical, social, economic, and environmental systems, are becoming interconnected and increasingly complex, and as such they are vulnerable to various risks. Meer
Systems, cybernetics, control, and automation (SCCA)are four interrelated and overlapping scientific and technological fields that have contributed substantially to the development, growth, and progress of human society. Meer
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. Meer
This book provides practical advice for everyone on how to effectively secure yourself, your devices, and your privacy in an era where all of those things seem doomed. Meer
The book discusses continuous and discrete systems in systematic and sequential approaches for all aspects of nonlinear dynamics. The unique feature of the book is its mathematical theories on flow bifurcations, oscillatory solutions, symmetry analysis of nonlinear systems and chaos theory. Meer
Adopting an informational perspective towards knowledge work, this book investigates how enterprise portals can promote knowledge creation, distribution, and use. Meer
Following the great progress made in computing technology, both in computer and programming technology, computation has become one of the most powerful tools for researchers and practicing engineers. Meer
Embodied conversational agents (ECAs) are autonomous software entities with human-like appearance and communication skills. These agents can take on a number of different roles, for example, as an assistant, tutor, information provider, or customer service agent. Meer
The notion of complexity is an important contribution of logic to theoretical computer science and mathematics. This volume attempts to approach complexity in a holistic way, investigating mathematical properties of complexity hierarchies at the same time as discussing algorithms and computational properties. Meer
Advanced visual analysis and problem solving has been conducted successfully for millennia. The Pythagorean Theorem was proven using visual means more than 2000 years ago. Meer
This book presents design guidelines and implementation approaches for enterprise safety management system as integrated within enterprise integrated systems. Meer
Computer-Aided Design of User Interfaces IV gathers the latest research of experts, research teams and leading organisations involved in computer-aided design of user interactive applications supported by software, with specific attention for platform-independent user interfaces and context-sensitive or aware applications. Meer
This volume brings together selected contributed papers presented at the International Conference of Computational Methods in Science and Engineering (ICCMSE 2005), held in Greece, 21 – 26 October 2005. Meer
This volume contains a collection of the lectures of the invited speakers and symposium organizers presented at the International Conference of Computational methods in Science and Engineering (ICCMSE 2005), held in Corinth, Greece, October 2005. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books