Het boek 'Prompten als een Pro' is het onmisbare handboek voor iedereen die AI-systemen optimaal wil benutten. Dit diepgravende werk leert je hoe je krachtige prompts formuleert die leiden tot nauwkeurige en nuttige antwoorden van AI.
This book constitutes the refereed proceedings of the 13th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2014, held in Dublin, Ireland, in September 2014. Meer
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Meer
This two volume set LNCS 8634 and LNCS 8635 constitutes the refereed conference proceedings of the 39th International Symposium on Mathematical Foundations of Computer Science, MFCS 2014, held in Budapest, Hungary, in August 2014. Meer
This book covers the basic theory, practical details and advanced research of the implementation of evolutionary methods on physical substrates. Most of the examples are from electronic engineering applications, including transistor-level design and system-level implementation. Meer
The LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical and mathematical foundations, through all aspects of rough set theory and its applications, such as data mining, knowledge discovery, and intelligent information processing, to relations between rough sets and other approaches to uncertainty, vagueness, and incompleteness, such as fuzzy sets and theory of evidence. Meer
This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. Meer
This book constitutes the refereed proceedings of the 22st Annual European Symposium on Algorithms, ESA 2014, held in Wrocław, Poland, in September 2014, as part of ALGO 2014. Meer
This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014. Meer
Der Autor erläutert algorithmische Grundlagen der Mensch-Maschine-Interaktion. Ausgangspunkt ist dabei eine Requirements-Analyse für ein Mensch-Maschine-Interface und eine Analyse der mit diesem bearbeitbaren Tasks. Meer
This book constitutes the refereed proceedings of the 26th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2014, held in Istanbul, Turkey, in September 2014. Meer
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014. Meer
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Meer
This book constitutes the refereed proceedings of the 8th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2014, held in Hangzhou, China, in October 2014. Meer
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. Meer
This book constitutes the proceedings of the 28th International Symposium on Distributed Computing, DISC 2014, held in Austin, TX, USA, in October 2014. Meer
The two-volume set LNCS 8802 and LNCS 8803 constitutes the refereed proceedings of the 6th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2014, held in Imperial, Corfu, Greece, in October 2014. Meer
This book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. Meer
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. Meer
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on the Applications of Evolutionary Computation, EvoApplications 2014, held in Granada, Spain, in April 2014, colocated with the Evo* 2014 events EuroGP, EvoCOP, and EvoMUSART. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books