Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Meer
Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive introduction to networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers, and their uses. Meer
"Ask not what your compiler can do for you, ask what you can do for your compiler."
--John Levesque, Director of Cray’s Supercomputing Centers of Excellence
The next decade of computationally intense computing lies with more powerful multi/manycore nodes where processors share a large memory space. Meer
Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. Meer
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. Meer
Combining knowledge with strategies, Data Structure Practice for Collegiate Programming Contests and Education presents the first comprehensive book on data structure in programming contests. Meer
In the decade since the idea of adapting the evidence-based paradigm for software engineering was first proposed, it has become a major tool of empirical software engineering. Meer
Complex Systems are natural systems that science is unable to describe exhaustively. Examples of Complex Systems are both unicellular and multicellular living beings; human brains; human immune systems; ecosystems; human societies; the global economy; the climate and geology of our planet. Meer
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. Meer
Mathematica, Maple, and similar software packages provide programs that carry out sophisticated mathematical operations. Applying the ideas introduced in Computer Algebra and Symbolic Computation: Elementary Algorithms, this book explores the application of algorithms to such methods as automatic simplification, polynomial decomposition, and polynomial factorization. Meer
This book examines the semiotic effects of protocols and algorithms at work in popular social media systems, bridging philosophical conversations in human-computer interaction (HCI) and information systems (IS) design with contemporary work in critical media, technology and software studies. Meer
Artificial Intelligence applications build on a rich and proven theoretical background to provide solutions to a wide range of real life problems. The ever expanding abundance of information and computing power enables researchers and users to tackle higly interesting issues for the first time, such as applications providing personalized access and interactivity to multimodal information based on preferences and semantic concepts or human-machine interface systems utilizing information on the affective state of the user. Meer
The increasing demand for sophisticated network applications, allied to the growth of the Internet traffic, has lead to great efforts in the search of improvements in data transmission technologies with the intention of satisfying the increasing demand for bandwidth. Meer
On behalf of the Organizing Committee for this event, we are glad to welcome you to IWASE 2006, the First International Workshop on Advanced Software Engineering. Meer
At once a programming course that emphasises object-oriented thinking as well as a well-documented, versatile, and robust geometry library. All of the relevant geometry is covered in depth to provide a good understanding of the background to this topic. Meer
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Meer
Some of our day-to-day situations dealing with self-organization, mobility management, and energy efficient design directly relate to ad hoc wireless (mobile or static) network applications. Meer
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Meer
This book records the author’s years of experience in the software industry. In his own practices, the author has found that the distributed work pattern has become increasingly popular in more and more work environments, either between vendors and customers or between different teams inside a company. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books