OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. Meer
Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. Meer
Advances in Computers, an ongoing series since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. Meer
The field of computational intelligence has grown tremendously over that past five years, thanks to evolving soft computing and artificial intelligent methodologies, tools and techniques for envisaging the essence of intelligence embedded in real life observations. Meer
Using CRC Cards, first published in 1995, is a comprehensive introduction to CRC (Class, Responsibility, Collaborator) cards. It includes a description of the cards and how they can be used in interactive sessions to develop an object-oriented model of an application. Meer
Focusing solely on the latest versions of Python (3.5 and higher), Python Distilled, from Beazley, returns to the roots of his classic Python Essential Reference: it is a concise, but powerfully useful book on effective Python programming. Meer
This best-selling guide from authors Elaine Weinmann and Peter Lourekas has been the go-to tutorial and reference book for photography/design students and has been the textbook of choice in college classrooms for decades. Meer
Beyond simulation and algorithm development, many developers increasingly use MATLAB even for product deployment in computationally heavy fields. This often demands that MATLAB codes run faster by leveraging the distributed parallelism of Graphics Processing Units (GPUs). Meer
User research is global – yet despite its pervasiveness, practitioners are not all well equipped to work globally. What may have worked in Nigeria may not be accepted in Russia, may be done differently in Brazil, may partly work in China, and may completely fail in Kuwait. Meer
Interaction Flow Modeling Language describes how to apply model-driven techniques to the problem of designing the front end of software applications, i. Meer
The field of soft computing is emerging from the cutting edge research over the last ten years devoted to fuzzy engineering and genetic algorithms. The subject is being called soft computing and computational intelligence. Meer
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today’s high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Meer
Service orchestration techniques combine the benefits of Service Oriented Architecture (SOA) and Business Process Management (BPM) to compose and coordinate distributed software services. Meer
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Meer
Problem-Solving in High Performance Computing: A Situational Awareness Approach with Linux focuses on understanding giant computing grids as cohesive systems. Meer
High Performance Parallelism Pearls Volume 2 offers another set of examples that demonstrate how to leverage parallelism. Similar to Volume 1, the techniques included here explain how to use processors and coprocessors with the same programming – illustrating the most effective ways to combine Xeon Phi coprocessors with Xeon and other multicore processors. Meer
High Performance Parallelism Pearls shows how to leverage parallelism on processors and coprocessors with the same programming – illustrating the most effective ways to better tap the computational potential of systems with Intel Xeon Phi coprocessors and Intel Xeon processors or other multicore processors. Meer
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. Meer
Architecting High Performing, Scalable and Available Enterprise Web Applications provides in-depth insights into techniques for achieving desired scalability, availability and performance quality goals for enterprise web applications. Meer
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books