Engineering tasks are supposed to achieve defined goals under certain project constraints. Example goals of software engineering tasks include achieving a certain functionality together with some level of reliability or performance. Meer
Grammatical Evolution: Evolutionary Automatic Programming in an Arbitrary Language provides the first comprehensive introduction to Grammatical Evolution, a novel approach to Genetic Programming that adopts principles from molecular biology in a simple and useful manner, coupled with the use of grammars to specify legal structures in a search. Meer
Software Visualization: From Theory to Practice was initially selected as a special volume for "The Annals of Software Engineering (ANSE) Journal", which has been discontinued. Meer
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:
*Secure Networks and Distributed Systems;
*Secure Multicast Communication and Secure Mobile Networks;
*Intrusion Prevention and Detection;
*Access Control Policies and Models;
*Security Protocols;
*Security and Control of IT in Society. Meer
Traditionally, scientific fields have defined boundaries, and scientists work on research problems within those boundaries. However, from time to time those boundaries get shifted or blurred to evolve new fields. Meer
Image Technology Design: A Perceptual Approach is an essential reference for both academic and professional researchers in the fields of image technology, image processing and coding, image display, and image quality. Meer
Information Macrodynamics (IMD) belong to an interdisciplinary science that represents a new theoretical and computer-based methodology for a system informational descriptionand improvement,including various activities in such areas as thinking, intelligent processes, communications, management, and other nonphysical subjects with their mutual interactions, informational superimposition, and theinformation transferredbetweeninteractions. Meer
Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. Meer
Internet Protocols (IP) covers many of the newer internet technologies being developed and explores how they are being implemented in the real world. The author examines numerous implementation details related to IP equipment and software. Meer
The exponential growth of Internet brings to focus the need to control such large scale networks so that they appear as coherent, almost intelligent, organ isms. Meer
Security Education and Critical Infrastructures presents the most recent developments in research and practice on teaching information security, and covers topics including:
-Curriculum design;
-Laboratory systems and exercises;
-Security education program assessment;
-Distance learning and web-based teaching of security;
-Teaching computer forensics;
-Laboratory-based system defense games;
-Security education tools;
-Education in security policies, management and system certification;
-Case studies. Meer
SystemC has received a wide acceptance by users and tool vendors as the next generation system description language in order to deal with higher levels of abstraction for complex SoC designs. Meer
The digitisation of traditional media formats, such as text, images, video, and sound provides us with the ability to store, process, and transport content in a uniform way. Meer
This book is about model-based diagnosis of a class of discrete-event systems called active systems. Roughly, model-based diagnosis is the task of finding out the faulty components of a physical system based on the observed behavior and the system model. Meer
With the fast growth ofmultimedia information, content-based video anal ysis, indexing and representation have attracted increasing attention in re cent years. Meer
Monitoring of public and private sites is increasingly becoming a very important and critical issue, especially after the recent flurry of terrorist attacks including the one on the Word Trade Center in September 2001. Meer
In 1998-99, at the dawn of the SoC Revolution, we wrote Surviving the SOC Revolution: A Guide to Platform Based Design. In that book, we focused on presenting guidelines and best practices to aid engineers beginning to design complex System-on-Chip devices (SoCs). Meer
Books on computation in the marketplace tend to discuss the topics within specific fields. Many computational algorithms, however, share common roots. Meer
Preferential Emergency Communications: From Telecommunications to the Internet, a professional monograph, is divided into three sections. The first describes systems and protocols that have been deployed as private networks for use by government agencies like the U. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books