Warning: Undefined array key "computer en informatica" in /data/bigmomma/var-code/master/MGT/m4-deploy-1754379177-e92ecf6/classes/rubriek.inc on line 88 Computer en informatica - Managementboek.nl
Op werkdagen voor 23:00 besteld, morgen in huisGratis verzending vanaf €20
This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. Meer
Written in an informal yet informative style, Programming Language Fundamentals by Example uses active learning techniques, giving students a professional learning experience based on professional methods applied with professional standards. Meer
Parallel Computing: Methods, Algorithms and Applications presents a collection of original papers presented at the international meeting on parallel processing, methods, algorithms, and applications at Verona, Italy in September 1989. Meer
This book aims at helping software teams work more efficiently by setting up their own design processes
In a world where being able to satisfy users’ needs becomes a crucial element for products’ existence, this book helps organizations understand design processes, allowing them efficiently deliver experiences that address the real problems of their audiences. Meer
This book aims at helping software teams work more efficiently by setting up their own design processes
In a world where being able to satisfy users’ needs becomes a crucial element for products’ existence, this book helps organizations understand design processes, allowing them efficiently deliver experiences that address the real problems of their audiences. Meer
Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services. Meer
Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. Meer
Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Meer
Although the web and online SAS® communities can provide volumes of information for programmers, these resources are often overwhelming and lack a simple path to guide coding SAS. Meer
This book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area. Meer
This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists.
Since the introduction and proliferation of the Internet, cybersecurity maintenance issues have grown exponentially. Meer
The book is based on the best papers of IEEE IRI 2018 and IEEE FMI 2018, Salt Lake City, July, 2018. They have been enhanced and modified suitably for publication. Meer
Master the complexities of the world's bestselling 2D and 3D software with Introduction to AutoCAD 2020. Ideally suited to new users, and relevant for both AutoCAD 2020 and AutoCAD 2021, this book will be a useful resource for drawing modules in both vocational and introductory undergraduate courses in engineering and construction. Meer
This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. Meer
JavaScript is the native language of the Internet. Originally created to make web pages more dynamic, it is now used for software projects of all kinds, including scientific visualization and data services. Meer
Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Meer
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. Meer
We create technology enabling us to do things never before possible and it ultimately changes the way we live, work, play, and interact with each other. Meer
Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books