Discusses the legal, ethical, and societal implications of information technology.
Covers important topics including infringement of intellectual property, security risks, Internet crime, and social networking. Meer
Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Meer
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be highly useful for Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against Android malware. Meer
This book consolidates findings previously published in prestigious international journals and presented at leading conferences. The book introduces basic mathematical concepts, and later chapters build upon these foundations, but each focusses on specific aspects of ontology alignment, making the content accessible and easy to follow. Meer
Data Science: A First Introduction with Python focuses on using the Python programming language in Jupyter notebooks to perform data manipulation and cleaning, create effective visualizations, and extract insights from data using classification, regression, clustering, and inference. Meer
Data Science: A First Introduction with Python focuses on using the Python programming language in Jupyter notebooks to perform data manipulation and cleaning, create effective visualizations, and extract insights from data using classification, regression, clustering, and inference. Meer
Industry 4.0 is an amalgam of smart factories, cognitive computing, cloud computing, Internet of Things (IoT), and cyber-physical systems. The IoT component is highly networked and vulnerable to attack. Meer
The Unified Modeling Language, better known as UML, has become the de facto standard modeling language for analyzing and designing software applications and systems. Meer
Big Data and Information Theory are a binding force between various areas of knowledge that allow for societal advancement. Rapid development of data analytic and information theory allows companies to store vast amounts of information about production, inventory, service, and consumer activities. Meer
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Meer
This text covers fundamentals of Python up to object-oriented concepts including regular expression, and applications in a single volume. It will an ideal text for senior undergraduate, graduate students, and professionals in the fields of electrical engineering, electronics and communication engineering, and computer engineering. Meer
The text covers concepts of cyber security through quantum computing and quantum cryptography in a single volume. It will be a useful text for graduate students, academic researchers, and professionals in areas including electrical and electronics engineering, computer science, and information technology. Meer
This book focuses on the values and effects that are operational in data technologies as they sustain colonial and imperialist legacies while also highlighting strategies for resistance to autocratic regimes and pathways towards decolonizing efforts. Meer
This pack includes the book Data Sketches, as well as an exclusive set of posters and postcards created by the authors and based on the book.
In Data Sketches, Nadieh Bremer and Shirley Wu document the deeply creative process behind 24 unique data visualization projects, and they combine this with powerful technical insights which reveal the mindset behind coding creatively. Meer
This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols.
In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Meer
This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses. Meer
This book explores the exciting world of quantum computing, from its theoretical foundations to its practical applications, offering both non-technical and expert readers a comprehensive and accessible introduction to this cutting-edge technology that has the potential to revolutionize the way we process and transmit information. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books