As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. Meer
Maintaining the advanced technical focus found in Developing Essbase Applications, this second volume is another collaborative effort by some of the best and most experienced Essbase practitioners from around the world. Meer
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. Meer
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. Meer
1) Provides holistic and comprehensive literature review in the field of mobile security with statistical inferences
2) Includes in-depth discussions on Android security
3) Covers a novel technique of detecting Android malware
4) Provides a new technique to classify detected malware into families
5) Provides a novel framework of mapping malware to vulnerabilities exploited using Android malware’s behavior reports leveraging pre-trained language models and deep learning techniques. Meer
The high failure rate of enterprise resource planning (ERP) projects is a pressing concern for both academic researchers and industrial practitioners. Meer
With the Internet, a new space, cyberspace, has formed, been rapidly integrated into daily life, and become the fourth living space for human beings. Cyberspace is the digital world created based on traditional physical, social, and thinking spaces (PST). Meer
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples. Meer
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. Meer
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Meer
There are a number of books on computational intelligence (CI), but they tend to cover a broad range of CI paradigms and algorithms rather than provide an in-depth exploration in learning and adaptive mechanisms. Meer
This book provides a nuanced exploration of digital data governance, highlighting the importance of cooperation across sectors to adapt to an evolving technological landscape. Meer
Internet of Medical Things (IoMT) is a system that collects data from patients with the help of different sensory inputs, e.g., accelerometer, electrocardiography, and electroencephalography. Meer
Computational complexity is critical in analysis of algorithms and is important to be able to select algorithms for efficiency and solvability. Algorithm and Design Complexity initiates with discussion of algorithm analysis, time space trade-off, symptotic notations and so forth. Meer
Cascading Style Sheets (CSS) is an open-source programming language used in website building and HTML templates that integrates all relevant information related to web page displays. Meer
Have you ever considered how these visuals and games are shown in a web browser? What technology is at the heart of it? Of course, employing HTML and CSS alone will not be sufficient. Meer
In a world increasingly powered by AI, understanding these technologies is no longer a luxury but a necessity. This book stands as your guide through the complex terrain of artificial intelligence terms, transforming the intricate into the accessible. Meer
1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat’s 7 and 6 when warranted.
2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. Meer
Cloud computing, the Internet of Things (IoT), and big data are three significant technological trends affecting the world's largest corporations. This book discusses big data, cloud computing, and the IoT, with a focus on the benefits and implementation problems. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books