The threat that is posed by "cyber-warriors" is illustrated by recent incidents such as the Year 2000 "Millennium Bug". Strategies to reduce the risk that cyber-attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments. Meer
This book uses the discipline-specific, computational methods of the digital humanities to explore a constellation of rigorous case studies of modernist literature. Meer
Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Meer
Dreamers may envision our future, but it is the pragmatists who build it. Solve the right problem in the right way, mankind moves forward. Solve the right problem in the wrong way or the wrong problem in the right way, however clever or ingenious the solution, neither credits mankind. Meer
This book provides comprehensive details of all Swarm Intelligence based Techniques available till date in a comprehensive manner along with their mathematical proofs. Meer
Machine Learning a branch of Artificial Intelligence is influencing the society, industry and academia at large. The adaptability of Python programming language to Machine Learning has increased its popularity further. Meer
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Meer
Smart Data: State-of-the-Art Perspectives in Computing and Applications explores smart data computing techniques to provide intelligent decision making and prediction services support for business, science, and engineering. Meer
Contemporary High Performance Computing: From Petascale toward Exascale, Volume 3 focuses on the ecosystems surrounding the world’s leading centers for high performance computing (HPC). Meer
"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D’Alessandro, and Roger Bradbury have produced a book that … shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity — what it is, why it matters, and how to do it. Meer
Introducing Autodesk Maya is your perfect hands-on guide to start animating quickly. Using approachable, real-world exercises, you'll master the fundamentals of this animation software by following full-color screen shots step by step. Meer
Introducing Autodesk Maya is your perfect hands-on guide to start animating quickly. Using approachable, real-world exercises, you'll master the fundamentals of this animation software by following full-color screen shots step by step. Meer
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Meer
Preparing for and passing the PMP(R) exam is no small feat. Although the number of certified PMP(R)s continues at a phenomenal rate, the exam failure rate remains uncommonly high. Meer
Recent healthcare reform and its provisions have pushed health information technology (HIT) into the forefront. Higher life expectancies, fewer medical errors, lower costs, and improved transparency are all possible through HIT. Meer
In spite of their importance and potential societal impact, there is currently no comprehensive source of information about vehicular ad hoc networks (VANETs). Meer
First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. Meer
The Internet Book, Fifth Edition explains how computers communicate, what the Internet is, how the Internet works, and what services the Internet offers. Meer
Teach Your Students How to Program Well
Intermediate C Programming provides a stepping-stone for intermediate-level students to go from writing short programs to writing real programs well. Meer
This second edition of Real-Time Embedded Multithreading contains the fundamentals of developing real-time operating systems and multithreading with all the new functionality of ThreadX Version 5. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books