With a focus on strategy and implementation, James Chang discusses business management practices and the technology that enables them. He analyzes the history of process management practices and demonstrates that BPM practices are a synthesis of radical change and continuous change practices. Meer
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single comprehensive reference on the subject. Meer
The Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. Meer
Throughout successive generations of information technology, the importance of the performance evaluation of software, computer architectures, and computer networks endures. Meer
Software engineering is playing an increasingly significant role in computing and informatics, necessitated by the complexities inherent in large-scale software development. Meer
Although C++ was developed as a superset of C language to include object oriented programming features, it can be used as a separate language. Many references require a prior knowledge of C for learning C++. Meer
Hard drives and disk management receive scant attention from the industry press, yet recent surveys have identified disk failure as the #1 source of server downtime. Meer
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Meer
Neural Network Modeling offers a cohesive approach to the statistical mechanics and principles of cybernetics as a basis for neural network modeling. It brings together neurobiologists and the engineers who design intelligent automata to understand the physics of collective behavior pertinent to neural elements and the self-control aspects of neurocybernetics. Meer
The mathematics employed by genetic algorithms (GAs)are among the most exciting discoveries of the last few decades. But what exactly is a genetic algorithm? Meer
Simulation is a multi-disciplinary field, and significant simulation research is dispersed across multiple fields of study. Distributed computer systems, software design methods, and new simulation techniques offer synergistic multipliers when joined together in a distributed simulation. Meer
A developer's knowledge of a computing system's requirements is necessarily imperfect because organizations change. Many requirements lie in the future and are unknowable at the time the system is designed and built. Meer
Grid Database Design investigates the origin, background, and components of this new computing model. This book presents new concepts and analyzes pre-existing ideas in the context of Grid, educating organizations as to how Grid can increase their computing power and strengthen their operations. Meer
Software Requirements: Encapsulation, Quality, and Reuse describes how to make requirements easy to change by using encapsulation. It introduces the Freedom methodology that shows how to encapsulate requirements thereby promoting reuse and quality. Meer
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network infrastructure. Meer
Data flow analysis is used to discover information for a wide variety of useful applications, ranging from compiler optimizations to software engineering and verification. Meer
This collection compiles the seminal contributions of Michio Sugeno on fuzzy systems and technologies. Fuzzy Modeling & Control: Selected Works of Sugeno serves as a singular resource that provides a clear, comprehensive treatment of fuzzy control systems. Meer
Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Meer
Grid computing is an emerging technology designed for high-powered applications. Grid Application Systems Design shows how to unleash the high performance of Grid technology. Meer
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books