jQuery is een JavaScript-framework voor het programmeren van dynamische en interactieve websites. Dit boek legt precies uit hoe jQuery werkt, welke code u moet kennen en wat u met jQuery kunt bereiken..
Blijf bij in een wereld vol digitale innovatie met boeken over software, hardware, data en meer. Of je nu programmeert, onderzoekt of gewoon nieuwsgierig bent – hier ontdek je de kracht van technologie.
Zoek verder in Computer en informatica
Bekijk resultaten in...
Alle productenManagementboekenSeminars + TrainingenOnline magazineSale
The two-volume set, CCIS 681 and CCIS 682, constitutes the proceedings of the 11th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2016, held in Xi'an, China, in October 2016. Meer
The two-volume set, CCIS 681 and CCIS 682, constitutes the proceedings of the 11th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2016, held in Xi'an, China, in October 2016. Meer
In this book, the author has presented an introduction to the practical application of some of the essential technical topics related to computer-aided engineering (CAE). Meer
Proposing the concept of real-world data circulation (RWDC), this book presents various practical and industry-related studies in human, mechanical, and social data domains. Meer
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. Meer
This book constitutes the refereed proceedings of the 10th CCF Conference on BigData 2022, which took place in Chengdu, China, in November 2022.
The 8 full papers presented in this volume were carefully reviewed and selected from 28 submissions. Meer
This book constitutes the refereed proceedings of the 19th Australasian Conference on Data Mining, AusDM 2021, held in Brisbane, Queensland, Australia, in December 2021. Meer
This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Meer
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. Meer
Entering the field of artificial intelligence and data science can seem daunting to beginners with little to no prior background, especially those with no programming experience. Meer
This book introduces important results and techniques in property testing, where the goal is to design algorithms that decide whether their input satisfies a predetermined property in sublinear time, or even in constant time – that is, time is independent of the input size. Meer
This book introduces important results and techniques in property testing, where the goal is to design algorithms that decide whether their input satisfies a predetermined property in sublinear time, or even in constant time – that is, time is independent of the input size. Meer
This book presents a number of research efforts in combining AI methods or techniques to solve complex problems in various areas. The combination of different intelligent methods is an active research area in artificial intelligence (AI), since it is believed that complex problems can be more easily solved with integrated or hybrid methods, such as combinations of different soft computing methods (fuzzy logic, neural networks, and evolutionary algorithms) among themselves or with hard AI technologies like logic and rules; machine learning with soft computing and classical AI methods; and agent-based approaches with logic and non-symbolic approaches. Meer
This two-volume set (CCIS 1137 and CCIS 1138) constitutes the proceedings of the Third International Conference on Cyberspace Data and Intelligence, Cyber DI 2019, and the International Conference on Cyber-Living, Cyber-Syndrome, and Cyber-Health, CyberLife 2019, held under the umbrella of the 2019 Cyberspace Congress, held in Beijing, China, in December 2019. Meer
With the end of Dennard scaling and Moore’s law, IC chips, especially large-scale ones, now face more reliability challenges, and reliability has become one of the mainstay merits of VLSI designs. Meer
Over the last decade, there has been a growing interest in human behavior analysis, motivated by societal needs such as security, natural interfaces, affective computing, and assisted living. Meer
This book addresses the frontier advances in the theory and application of nature-inspired optimization techniques, including solving the quadratic assignment problem, prediction in nature-inspired dynamic optimization, the lion algorithm and its applications, optimizing the operation scheduling of microgrids, PID controllers for two-legged robots, optimizing crane operating times, planning electrical energy distribution systems, automatic design and evaluation of classification pipelines, and optimizing wind-energy power generation plants. Meer
This book introduces readers to an advanced combinatorial testing approach and its application in the cloud environment. Based on test algebra and fault location analysis, the proposed combinatorial testing method can support experiments with 250 components (with 2 * (250) combinations), and can detect the fault location based on the testing results. Meer
This volume contains selected papers presented at the 10th International Conference on Advanced Computing and Communication Technologies (10th ICACCT 2016), technically sponsored by Institution of Electronics and Telecommunication Engineers (India), held during 18 – 20 November 2016 at Asia Pacific Institute of Information Technology, Panipat, India. Meer
As the first to focus on the issue of Data Warehouse Requirements Engineering, this book introduces a model-driven requirements process used to identify requirements granules and incrementally develop data warehouse fragments. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books