Almost 12 years have passed by since we wrote Chaos and Fractals. At the time we were hoping that our approach of writing a book which would be both accessible without mathematical sophistication and portray these exiting new fields in an authentic manner would find an audience. Meer
This second edition of Grune and Jacobs’ brilliant work presents new developments and discoveries that have been made in the field. Parsing, also referred to as syntax analysis, has been and continues to be an essential part of computer science and linguistics. Meer
The Art of Algorithm design is a complementary perception of all books on Algorithm design and is a roadmap for all levels of learners as well as professionals dealing with algorithmic problems. Meer
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. Meer
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. Meer
This book examines the semiotic effects of protocols and algorithms at work in popular social media systems, bridging philosophical conversations in human-computer interaction (HCI) and information systems (IS) design with contemporary work in critical media, technology and software studies. Meer
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di? Meer
Performance optimization is vital in the design and operation of modern engineering systems, including communications, manufacturing, robotics, and logistics. Meer
This book is an easy, concise but fairly complete introduction to ISO/ANSI C++ with special emphasis on object-oriented numeric computation. A user-defined numeric linear algebra library accompanies the book and can be downloaded from the web. Meer
Unique selling point:
• This book proposes several approaches for dynamic Android malware detection based on system calls which do not have the limitations of existing mechanisms. Meer
Functional verification has become an important aspect of the chip design process. Significant resources, both in industry and academia, are devoted to the design complexity and verification endeavors. Meer
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. Meer
The crypto wars have raged for half a century.
In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. Meer
The crypto wars have raged for half a century.
In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. Meer
There has continuously been a massive growth of Internet traffic for these years despite the "bubble burst" in year 2000. As the telecom market is gradually picking up, it would be a consensus in telecom and data-com industries that the CAPEX (Capital Expenditures) to rebuild the network infrastructure to cope with this traffic growth would be imminent, while the OPEX (Operational Expenditures) has to be within a tight constraint. Meer
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con'2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. Meer
Extending Web Services Technologies addresses the rapidly growing impact of Multi-Agent Systems on web services tools and techniques. In particular, the book addresses the potential for MAS techniques to impact the difficult challenges that must be tackled for web services technology to realize its promises. Meer
Next-generation high-speed Internet backbone networks will be required to support a broad range of emerging applications which may not only require significant bandwidth, but may also have strict quality of service (QoS) requirements. Meer
How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial efforts have advanced the notion of a "trusted computing platform" as a building block. Meer
1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books