Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. Meer
Put Predictive Analytics into ActionLearn the basics of Predictive Analysis and Data Mining through an easy to understand conceptual framework and immediately practice the concepts learned using the open source RapidMiner tool. Meer
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. Meer
Content-based 3-D object retrieval has attracted extensive attention recently and has applications in a variety of fields, such as, computer-aided design, tele-medicine,mobile multimedia, virtual reality, and entertainment. Meer
High Performance Parallelism Pearls Volume 2 offers another set of examples that demonstrate how to leverage parallelism. Similar to Volume 1, the techniques included here explain how to use processors and coprocessors with the same programming – illustrating the most effective ways to combine Xeon Phi coprocessors with Xeon and other multicore processors. Meer
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. Meer
Network Storage: Tools and Technologies for Storing Your Company’s Data explains the changes occurring in storage, what they mean, and how to negotiate the minefields of conflicting technologies that litter the storage arena, all in an effort to help IT managers create a solid foundation for coming decades. Meer
Topological UML Modeling: An Improved Approach for Domain Modeling and Software Development presents a specification for Topological UML® that combines the formalism of the Topological Functioning Model (TFM) mathematical topology with a specified software analysis and design method. Meer
The Physics of Computing gives a foundational view of the physical principles underlying computers. Performance, power, thermal behavior, and reliability are all harder and harder to achieve as transistors shrink to nanometer scales. Meer
Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, Second Edition takes an interdisciplinary approach to applying principles for efficient implementation of network devices, offering solutions to the problem of network implementation bottlenecks. Meer
Strategy, Leadership and AI in the Cyber Ecosystem investigates the restructuring of the way cybersecurity and business leaders engage with the emerging digital revolution towards the development of strategic management, with the aid of AI, and in the context of growing cyber-physical interactions (human/machine co-working relationships). Meer
Now live! SUMMER 2020 DIGITAL UPDATE for digital content
Microsoft Office 365 updates are reflected in the eText and associated MyLab for this title. Meer
Now live! SUMMER 2020 DIGITAL UPDATE for digital content
Microsoft Office 365 updates are reflected in the eText and associated MyLab for this title. Meer
Now live! SUMMER 2020 DIGITAL UPDATE for digital content
Microsoft Office 365 updates are reflected in the eText and associated MyLab for this title. Meer
Step-by-step instructions with callouts to Google Chromebook photos that show you exactly what to do. Help when you run into Chromebook problems or limitations Tips and Notes to help you get the most from your Chromebook. Meer
Nature-inspired computation and swarm intelligence have become popular and effective tools for solving problems in optimization, computational intelligence, soft computing and data science. Meer
The promises and realities of digital innovation have come to suffuse everything from city regions to astronomy, government to finance, art to medicine, politics to warfare, and from genetics to reality itself. Meer
This book offers full, comprehensive coverage of Microsoft Access.
The goal of the Exploring series is to move students beyond the point-and-click, to understanding the why and how behind each skill. Meer
This book is the perfect complement to the Excel or Access Comprehensive texts, particularly for instructors looking for more complex, real world cases for students to work through. Meer
This hands-on routing Lab Manual is the perfect companion for all Cisco Networking Academy students who are taking the new course CCNP Cisco Networking Academy CCNP Enterprise: Core Networking (ENCOR) as part of their CCNP preparation. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books