Mathematicians have skills that, if deepened in the right ways, would enable them to use data to answer questions important to them and others, and report those answers in compelling ways. Meer
This book comprehensively conveys the theoretical and practical aspects of IoT and big data analytics with the solid contributions from practitioners as well as academicians. Meer
An Introduction. This book explains how to use business analytics to sort through an ever-increasing amount of data and improve the decision-making capabilities of an organization. Meer
To understand the dynamic patterns of behaviours and interactions between athletes that characterize successful performance in different sports is an important challenge for all sport practitioners. Meer
To understand the dynamic patterns of behaviours and interactions between athletes that characterize successful performance in different sports is an important challenge for all sport practitioners. Meer
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. Meer
In this age of globalization, process improvement practitioners must be able to comprehend and work with the different standards and frameworks used around the world. Meer
Written in an informal yet informative style, Programming Language Fundamentals by Example uses active learning techniques, giving students a professional learning experience based on professional methods applied with professional standards. Meer
Large-Scale 3D Data Integration: Challenges and Opportunities examines the fundamental aspects of 3D geo-information, focusing on the latest developments in 3D GIS (geographic information) and AEC (architecture, engineering, construction) systems. Meer
Developing Performance Support for Computer Systems: A Strategy for Maximizing Usability and Learnability provides detailed planning, design, and development guidance for generating performance support for new or upgraded computer systems. Meer
Developments in Lisp technology have been accelerated by a number of factors, including the increased interest in Artificial Intelligence and the emergence of Common Lisp. Meer
As Web-based systems and e-commerce carry businesses into the 21st century, databases are becoming workhorses that shoulder each and every online transaction. Meer
Featuring an international team of authors, Neural Network Perspectives on Cognition and Adaptive Robotics presents several approaches to the modeling of human cognition and language using neural computing techniques. Meer
"The Encyclopedia of Microcomputers serves as the ideal companion reference to the popular Encyclopedia of Computer Science and Technology. Now in its 10th year of publication, this timely reference work details the broad spectrum of microcomputer technology, including microcomputer history; explains and illustrates the use of microcomputers throughout academe, business, government, and society in general; and assesses the future impact of this rapidly changing technology. Meer
Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. Meer
This book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area. Meer
Artificial Intelligence applications build on a rich and proven theoretical background to provide solutions to a wide range of real life problems. The ever expanding abundance of information and computing power enables researchers and users to tackle higly interesting issues for the first time, such as applications providing personalized access and interactivity to multimodal information based on preferences and semantic concepts or human-machine interface systems utilizing information on the affective state of the user. Meer
This book collects the proceedings of the Second International Conference on Open Software - OSS 2006, held in Como, Italy in June, 2006, where researchers from all over the world discussed how OSS is produced, its huge potential for innovative applications and in groundbreaking OSS business models. Meer
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. Meer
Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books