Formal methods traditionally address the question of transforming software engineering into a mature engineering discipline. This essentially refers to trusting that the software-intensive systems that form our society’s infrastructures are behaving according to their specifications. Meer
This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Meer
Have you ever thought of creating beautiful, blazing-fast native apps for iOS and Android from a single codebase? Have you dreamt of taking your native apps to the web and desktop without it costing a fortune? Meer
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. Meer
How can we recruit out of your program? We have a project – how do we reach out to your students? If we do research together who owns it? We have employees who need to "upskill" in analytics – can you help me with that? Meer
There are many distinct pleasures associated with computer programming. Craftsmanship has its quiet rewards, the satisfaction that comes from building a useful object and making it work. Meer
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Meer
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. Meer
Private clouds allow for managing multiple databases under one roof, avoiding unnecessary resource management. Private cloud solutions can be applied in sectors such as healthcare, retail, and software. Meer
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. Meer
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. Meer
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Meer
Applied User Data Collection and Analysis Using JavaScript and PHP is designed to provide the technical skills and competency to gather a wide range of user data from web applications in both active and passive methods. Meer
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. Meer
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. Meer
This book presents the Android plug-in technology used in Android development. This technology is widely used by a majority of Chinese internet companies, and is becoming more widely used worldwide. Meer
Social networking has increased drastically in recent years, resulting in an increased amount of data being created daily. Furthermore, diversity of issues and complexity of the social networks pose a challenge in social network mining. Meer
The Security Hippie is Barak Engel’s second book. As the originator of the “Virtual CISO” (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books