The Soft Edge is a one-of-a-kind history of the information revolution. In his lucid and direct style, Paul Levinson, historian and philosopher of media and communications, gives us more than just a history of information technologies. Meer
Mapping Cyberspace is a ground-breaking geographic exploration and critical reading of cyberspace, and information and communication technologies. The book:
* provides an understanding of what cyberspace looks like and the social interactions that occur there
* explores the impacts of cyberspace, and information and communication technologies, on cultural, political and economic relations
* charts the spatial forms of virutal spaces
* details empirical research and examines a wide variety of maps and spatialisations of cyberspace and the information society
* has a related website at http://www. Meer
Mapping Cyberspace is a ground-breaking geographic exploration and critical reading of cyberspace, and information and communication technologies. The book:
* provides an understanding of what cyberspace looks like and the social interactions that occur there
* explores the impacts of cyberspace, and information and communication technologies, on cultural, political and economic relations
* charts the spatial forms of virutal spaces
* details empirical research and examines a wide variety of maps and spatialisations of cyberspace and the information society
* has a related website at http://www. Meer
Reactive systems are computing systems which are interactive, such as real-time systems, operating systems, concurrent systems, control systems, etc. They are among the most difficult computing systems to program. Meer
These are my lecture notes from CS681: Design and Analysis of Algo rithms, a one-semester graduate course I taught at Cornell for three consec utive fall semesters from '88 to '90. Meer
John Sculley In the short history of personal computing, the task of the software programmer has been one of the least recognized-but one of the most significant-in the industry. Meer
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Meer
Multi-Agent Programming is an essential reference for anyone interested in the most up-to-date developments in MAS programming. While previous research has focused on the development of formal and informal approaches to analyze and specify Multi-Agent Systems, this book focuses on the development of programming languages and tools which not only support MAS programming, but also implement key concepts of MAS in a unified framework. Meer
Architecture Description Languages is an essential reference for both academic and professional researchers in the field of system engineering and design. Meer
Argumentation is all around us. Letters to the Editor often make points of cons- tency, and “Why” is one of the most frequent questions in language, asking for r- sons behind behaviour. Meer
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Meer
Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. Meer
Motion-Free Super-Resolution is a compilation of very recent work on various methods of generating super-resolution (SR) images from a set of low-resolution images. Meer
Continuous System Simulation describes systematically and methodically how mathematical models of dynamic systems, usually described by sets of either ordinary or partial differential equations possibly coupled with algebraic equations, can be simulated on a digital computer. Meer
This easy-to-use, classroom-tested textbook covers the C programming language for computer science and IT students. Designed for a compulsory fundamental course, it presents the theory and principles of C. Meer
This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Meer
This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books