Warning: Undefined array key "computer en informatica" in /data/bigmomma/var-code/master/MGT/m4-deploy-1756382554-18569dc/classes/rubriek.inc on line 88 Computer en informatica - Managementboek.nl
Op werkdagen voor 23:00 besteld, morgen in huisGratis verzending vanaf €20
Data compression is now indispensable to products and services of many industries including computers, communications, healthcare, publishing and entertainment. Meer
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada, in 2007. Meer
The Apple / / series of computers represents one of the most versatile and powerful home computers available. If you've used your computer for a while, you've probably become quite familiar with Applesoft BASIC. Meer
Peer-to-Peer Video Streaming describes novel solutions to enhance video quality, increase robustness to errors, and reduce end-to-end latency in video streaming systems. Meer
This book brings together leading research from engineers and practitioners interested in the technical advances, business and industrial applications of intelligent systems. Meer
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Meer
This book intends to inculcate the innovative ideas for the scheduling aspect in distributed computing systems. Although the models in this book have been designed for distributed systems, the same information is applicable for any type of system. Meer
Never before has there been a greater need for deeper listening and more open communication to cope with the complex problems facing our organizations, businesses and societies. Meer
This book covers the principles and techniques that make RISC a unique and elegant approach for high-performance microprocessor system designs, describing both the practical and theoretical aspects of the RISC design philosophy. Meer
Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Meer
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). Meer
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. Meer
Open Source Systems Security Certification discusses Security Certification Standards and establishes the need to certify open source tools and applications. Meer
Educational institutions in which administrators, managers and teachers will be working in the late 1990's will be far different from those oftoday. Schools, which until recently were lagging behind in the implementation of information technology (IT) in their administration and management, are now attempting to close the gap. Meer
Deryn Watson and David Tinsley The topic of the conference, integrating infonnation technology into education, is both broad and multi-facetted. In order to help focus the papers and discussion we identified 7 themes: • Current developments in society and education influencing integration; • Teachers, their roles and concerns; • Learners, their expectations of and behaviour in an integrated environment; • Developments and concerns in the curriculum; • Successes and failures in existing practice; • Organisation and management of integrated environments; • Identification of social and political influences. Meer
The theme of the 1997 INTERACT conference, 'Discovering New Worlds ofHCI', signals major changes that are taking place with the expansion of new technologies into fresh areas of work and leisure throughout the world and new pervasive, powerful systems based on multimedia and the internet. Meer
Grid Middleware and Services: Challenges and Solutions is the eighth volume of the CoreGRID series. The CoreGrid Proceedings is the premiere European event on Grid Computing. Meer
Making Grids Work includes selected articles from the CoreGRID Workshop on Grid Programming Models, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments held at the Institute of Computer Science, Foundation for Research and Technology - Hellas in Crete, Greece, June 2007. Meer
CHARM '97 is the ninth in a series of working conferences devoted to the development and use of formal techniques in digital hardware design and verification. Meer
Environmental Informatics is a fast growing field which deals with all methods from computer science, environmental planning, ecology and related subjects. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books