Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Meer
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). Meer
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity. Meer
Heterogeneous Systems Architecture - a new compute platform infrastructure presents a next-generation hardware platform, and associated software, that allows processors of different types to work efficiently and cooperatively in shared memory from a single source program. Meer
The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method. Meer
How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? Meer
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. Meer
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. Meer
Network Storage: Tools and Technologies for Storing Your Company’s Data explains the changes occurring in storage, what they mean, and how to negotiate the minefields of conflicting technologies that litter the storage arena, all in an effort to help IT managers create a solid foundation for coming decades. Meer
Through this guide's carefully constructed explanations and examples, you will develop an understanding of Swift grammar and the elements of effective Swift style - all thoroughly revised for Swift 5. Meer
Reliable Object-Oriented Software presents the underlying principles associated with object-orientation and its practical application. More than just another text on methodology, this 1998 book focuses on the fundamental concepts related to the process of software development and architectural design in order to lay the basis necessary for the development of robust, maintainable, and evolvable software. Meer
Meta-Analytics: Consensus Approaches and System Patterns for Data Analysis presents an exhaustive set of patterns for data science to use on any machine learning based data analysis task. Meer
Advances in Computational Techniques for Biomedical Image Analysis: Methods and Applications focuses on post-acquisition challenges such as image enhancement, detection of edges and objects, analysis of shape, quantification of texture and sharpness, and pattern analysis. Meer
Today, JavaScript is radically different and more powerful than ever. In an environment where user interfaces are increasingly web-based, it’s become the “lingua franca” of the web browser. Meer
This is Cisco's official, comprehensive self-study resource for Ciscos CLCEI 300-820 exam (Implementing Cisco Collaboration Cloud and Edge Solutions), one of the most popular concentration exams required for the Cisco Certified Network Professional (CCNP) Collaboration certification. Meer
The field of computational intelligence has grown tremendously over that past five years, thanks to evolving soft computing and artificial intelligent methodologies, tools and techniques for envisaging the essence of intelligence embedded in real life observations. Meer
The Optimum-Path Forest (OPF) classifier was first published in 2008 in its supervised and unsupervised versions with applications in medicine and image classification. Meer
IPv6 Advanced Protocols Implementation is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not specific to IPv6 but are extended to support IPv6. Meer
Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Meer
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books