Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Meer
Semantics, Web services, and Web processes promise better re-use, universal interoperability and integration. Semantics has been recognized as the primary tool to address the challenges of a broad spectrum of heterogeneity and for improving automation through machine understandable descriptions. Meer
Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal. Meer
Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography.
Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the presentation emphasises the essential mathematical nature of the computations and arguments involved in cryptography. Meer
The 1995-1996 program at the Institute for Mathematics and its Applications was devoted to mathematical methods in material science, and was attended by materials scientists, physicists, geologists, chemists engineers, and mathematicians. Meer
A timely survey of the field from the point of view of some of the subject's most active researchers. Divided into several parts organized by theme, the book first covers the underlying methodology regarding active rules, followed by formal specification, rule analysis, performance analysis, and support tools. Meer
This is a book for the PC user who would like to understand how their PCs work. It is written for the reader who is not a computer or electrical engineer but who wants enough information so that they can make intelligent buying or upgrading decisions, maximize their productivity, and become less dependant on others for help with their computer questions and problems. Meer
In March 1997, the Association for Computing Machinery will celebrate the fiftieth anniversary of the electronic computer. To understand what an extraordinary fifty years the computer has had, you need only look around you--probably no farther than your desk. Meer
Represents a substantial research contribution to state-of-the-art solutions for addressing the threats to Confidentiality, Integrity, and Availability (CIA Triad) in high-performance computing (HPC) environments. Meer
According to some estimates, 95% of information today is stored on paper, 3% on microfiche, and only 2% on magnetic/optical and semiconductor storage devices. Meer
This book presents the results of two major international research projects on phenomenology, theory and applications of Nonclassical Nonlinearity. It conveys concepts, experimental techniques and applications which were previously found in specialized journals. Meer
2. Some Background Information 49 3. Definitions and Terminology 52 4. The One Clause at a Time (OCAT) Approach 54 4. 1 Data Binarization 54 4. 2 The One Clause at a Time (OCAT) Concept 58 4. Meer
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di? Meer
This book presents the proceedings of the Working Conference on the societal and organizational implications for information systems of social inclusion. Meer
The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing. Meer
In the world of information technology, it is no longer the computer in the classical sense where the majority of IT applications is executed; computing is everywhere. Meer
The papers contained in this volume were presented at the fourth edition of the IFIP International Conference on Theoretical Computer Science (IFIP TCS), held August 23-24, 2006 in Santiago, Chile. Meer
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Meer
Position-based routing was originally developed for packet radio networks in the 1980s [6]. It received renewed interest during the last few years as a method for routing in mobile wireless ad hoc and sensor networks [1, 2, 4]. Meer
These proceedings derive from an international conference on the history of computing and education. This conference is the second of hopefully a series of conferences that will take place within the International Federation for Information Processing (IFIP) and hence, we describe it as the "Second IFIP Conference on the History of Computing and Education" or simply "History of Computing and Education 2" (HCE2). Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books