In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Meer
"This book addresses how health apps, in-home measurement devices, telemedicine, data mining, and artificial intelligence and smart medical algorithms are all enabled by the transition to a digital health infrastructure…. Meer
The book provides an advanced vision and trends of computational intelligence in cyberspace and cyber-enabled spaces. It reviews architectures and models, as well as state-of-the-art computational and interpretation capabilities for social, industrial, and multimedia applications. Meer
There is an ongoing data explosion transpiring that will make previous creations, collections, and storage of data look trivial. Big Data, Mining, and Analytics: Components of Strategic Decision Making ties together big data, data mining, and analytics to explain how readers can leverage them to extract valuable insights from their data. Meer
Cloud Computing and Digital Media: Fundamentals, Techniques, and Applications presents the fundamentals of cloud and media infrastructure, novel technologies that integrate digital media with cloud computing, and real-world applications that exemplify the potential of cloud computing for next-generation digital media. Meer
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Meer
A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Meer
Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instances, traditional firewalls and other conventional controls can no longer get the job done. Meer
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam. Meer
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. Meer
Whether you are inheriting a test team or starting one up, Manage Software Testing is a must-have resource that covers all aspects of test management. Meer
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. Meer
Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage. Meer
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Meer
A developer's knowledge of a computing system's requirements is necessarily imperfect because organizations change. Many requirements lie in the future and are unknowable at the time the system is designed and built. Meer
Maximizing ROI on Software Development explains how to execute best quality software development and testing while maximizing business value. It discusses Applied ROI in the context of methodologies such as Agile and Extreme Programming, and traditional methodologies including Six Sigma, the Capability Maturity Model® (CMM®), Total Cost of Ownership (TCO), and Product Line Models (PLM). Meer
To understand the dynamic patterns of behaviours and interactions between athletes that characterize successful performance in different sports is an important challenge for all sport practitioners. Meer
Advanced Data Mining Tools and Methods for Social Computing explores advances in the latest data mining tools, methods, algorithms and the architectures being developed specifically for social computing and social network analysis. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books