This book is for both specialist and generalist. For Information Technology (IT) and Educational Management (EM) researchers, it brings together the latest information and analysis of ITEM projects in eleven countries. Meer
The primary aim for this book is to gather and collate articles which represent the best and latest thinking in the domain of technology transfer, from research, academia and practice around the world. Meer
Algorithmic Learning in a Random World describes recent theoretical and experimental developments in building computable approximations to Kolmogorov's algorithmic notion of randomness. Meer
Many animators and designers would like to supplement their Maya learning with a less-technical, more helpful book. This self-study manual is both a general guide for understanding 3-D computer graphics and a specific guide for learning the fundamentals of Maya: workspace, modeling, animation, shading, lighting, and rendering. Meer
Monte Carlo simulation has become one of the most important tools in all fields of science. Simulation methodology relies on a good source of numbers that appear to be random. Meer
Helps in the development of large software projects.
Uses a well-known open-source software prototype system (Vesta developed at Digital and Compaq Systems Research Lab). Meer
Population dynamics is an important subject in mathematical biology. A cen tral problem is to study the long-term behavior of modeling systems. Most of these systems are governed by various evolutionary equations such as difference, ordinary, functional, and partial differential equations (see, e. Meer
The State of Memory Technology Over the past decade there has been rapid growth in the speed of micropro cessors. CPU speeds are approximately doubling every eighteen months, while main memory speed doubles about every ten years. Meer
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Meer
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. Meer
The aim of this book is to bring together the research of academics and practitioners in the field of communication systems testing. It covers four major topic areas; types of testing including conformance testing, inoperability testing, performance and QoS testing; phases of testing including test case generation, means of testing, test execution and test results analysis; classes of systems tested and the theory and practice of testing including test-related algorithms, practical testing methodology and practical testing experience. Meer
Environmental Informatics is a fast growing field which deals with all methods from computer science, environmental planning, ecology and related subjects. Meer
This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the Proceedings of the 3rd Joint Working Conference of IFIP TC6 and TC11, arranged by the International Federation for Information Processing and held in Athens, Greece in September 1997. Meer
Recently, IT has entered all important areas of society. Enterprises, individuals and civilisations all depend on functioning, safe and secure IT. Focus on IT security has previously been fractionalised, detailed and often linked to non-business applicaitons. Meer
This book presents the leading edge in several related fields, specifically object orientated programming, open distributed systems and formal methods for object oriented systems. Meer
The general theme of this conference is notations, methods, and tool support for the calculation of programs from specifications. The purpose of this working conference is to present the results of ongoing research, descriptions of existing and proposed systems, and applications to the production of practical software. Meer
FORTE/PSTV '97 addresses Formal Description Techniques (FDTs) applicable to Distributed Systems and Communication Protocols (such as Estelle, LOTOS, SDL, ASN. Meer
It is always confusing, and perhaps inconvenient at times, using generic terms that will mean something to everyone but different things to different people. Meer
This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students with a broad perspective of recent developments in what is recognised as a key topic in business and in the public sector. Meer
This monograph is a technical survey of concepts and techniques for describing and analyzing large-scale time-series data streams. Some topics covered are algorithms for query by humming, gamma-ray burst detection, pairs trading, and density detection. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books