Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives. Meer
Beginning with realistic mathematical or verbal models of physical or biological phenomena, the author derives tractable models for further mathematical analysis or computer simulations. Meer
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Meer
This book intends to inculcate the innovative ideas for the scheduling aspect in distributed computing systems. Although the models in this book have been designed for distributed systems, the same information is applicable for any type of system. Meer
In the era of the Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such a humongous amount of data, it has now become mandatory to exploit the power of massively parallel architecture for fast computation. Meer
Have you ever thought of creating beautiful, blazing-fast native apps for iOS and Android from a single codebase? Have you dreamt of taking your native apps to the web and desktop without it costing a fortune? Meer
Computer simulation has developed into a powerful tool for problem solving in a variety of areas, in the sciences as well as in industrial environments. Meer
This book offers an overview on the background to systemics. It introduces the concept of Collective Being as a Multiple System established by processes of emergence and self-organization of the same agents simultaneously or dynamically interacting in different ways. Meer
With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Meer
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Meer
Describes how to design object-oriented code and accompanying algorithms that can be reverse engineered for greater flexibility in future code maintenance and alteration. Meer
Fundamentals of Image, Audio, and Video Processing Using MATLAB® introduces the concepts and principles of media processing and its applications in pattern recognition by adopting a hands-on approach using program implementations. Meer
This collection of essays explores the different ways the insights from complexity theory can be applied to law. Complexity theory – a variant of systems theory – views law as an emergent, complex, self-organising system comprised of an interactive network of actors and systems that operate with no overall guiding hand, giving rise to complex, collective behaviour in law communications and actions. Meer
This book offers a practical understanding of issues involved in improving data quality through editing, imputation, and record linkage. The first part of the book deals with methods and models, focusing on the Fellegi-Holt edit-imputation model, the Little-Rubin multiple-imputation scheme, and the Fellegi-Sunter record linkage model. Meer
Data mining is the science and technology of exploring large and complex bodies of data in order to discover useful patterns. It is extremely important because it enables modeling and knowledge extraction from abundant data availability. Meer
Understanding sequence data, and the ability to utilize this hidden knowledge, will create a significant impact on many aspects of our society. Examples of sequence data include DNA, protein, customer purchase history, web surfing history, and more. Meer
Challenges in complexity and variability of multimedia data have led to revolutions in machine learning techniques. Multimedia data, such as digital images, audio streams and motion video programs, exhibit richer structures than simple, isolated data items. Meer
Kim Marriott Bernd Meyer Communication is one of the hallmarks of humans. When we think of hu man communication, most people first think of spoken and written lan guages. Meer
This is a book for the PC user who would like to understand how their PCs work. It is written for the reader who is not a computer or electrical engineer but who wants enough information so that they can make intelligent buying or upgrading decisions, maximize their productivity, and become less dependant on others for help with their computer questions and problems. Meer
Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books