This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017.
The 18 full papers presented were carefully reviewed and selected from 42 submissions. Meer
This book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput. Meer
The key component in forecasting demand and consumption of resources in a supply network is an accurate prediction of real-valued time series. Indeed, both service interruptions and resource waste can be reduced with the implementation of an effective forecasting system. Meer
This book constitutes the refereed proceedings of the 18th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2017, held in Antwerp, Belgium, in September 2017. Meer
Devoted to information security, this volume begins with a short course on cryptography, mainly based
on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid
1990s. Meer
This book focuses on the design, development, management, governance and application of evolving software processes that are aligned with changing business objectives, such as expansion to new domains or shifting to global production. Meer
This book constitutes the refereed proceedings of the 7th International Workshop on Software Engineering for Resilient Systems, SERENE 2015, held in Paris, France, in September 2015. Meer
This book constitutes the refereed proceedings of the 9th International Conference, NooJ 2015, held in Minsk, Belarus, in June 2015.
NooJ 2015 received 51 submissions. Meer
This book offers a short and concise introduction to the many facets of chaos theory.
While the study of chaotic behavior in nonlinear, dynamical systems is a well-established research field with ramifications in all areas of science, there is a lot to be learnt about how chaos can be controlled and, under appropriate conditions, can actually be constructive in the sense of becoming a control parameter for the system under investigation, stochastic resonance being a prime example. Meer
This book contains a selection of refereed and revised papers from three special tracks: Ad-hoc and Wireless Sensor Networks, Intelligent Distributed Computing and, Business Intelligence and Big Data Analytics originally presented at the International Symposium on Intelligent Systems Technologies and Applications (ISTA), August 10-13, 2015, Kochi, India. Meer
This volume contains the refereed proceedings of the 13th International Conference on Logic Programming and Nonmonotonic Reasoning, LPNMR 2015, held in September 2015 in Lexington, KY, USA. Meer
This book constitutes the refereed proceedings of the 12th European Workshop on Computer Performance Engineering, EPEW 2015, held in Madrid, Spain, in August/September 2015. Meer
This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015. Meer
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Meer
This book constitutes the refereed proceedings of the 9th International Conference on Intelligent Computer Mathematics, CICM 2016, held in Bialystok, Poland, in July 2016. Meer
This book constitutes the proceedings of the Second International Conference on Big Data Computing and Communications, BigCom 2016, held in Shenyang, China, in July 2016. Meer
This book constitutes the refereed proceedings of the 22nd International Conference on Computing and Combinatorics, COCOON 2016, held in Ho Chi Minh City, Vietnam, in August 2016. Meer
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. Meer
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. Meer
This book constitutes the refereed proceedings of the 4th International Workshop and Challenge on Computational Methods and Clinical Applications for Spine Imaging, CSI 2016, held in conjunction with MICCAI 2016, in Athens, Greece, in October 2016. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books