Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. Meer
This book brings together experts to discuss relevant results in software process modeling, and expresses their personal view of this field. It is designed for a professional audience of researchers and practitioners in industry, and graduate-level students. Meer
The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. Meer
It takes more e?ort to verify that digital system designs are correct than it does to design them, and as systems get more complex the proportion of cost spent on veri? Meer
Human Identification Based on Gait is the first book to address gait as a biometric. Biometrics is now in a unique position where it affects most people's lives. Meer
Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. Meer
Hop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. If a message that is part of a denial-of-service attack is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet. Meer
This book presents research results on data dissemination in mobile networks and peer-to-peer systems for mobile devices. The main focus is a novel resource-sharing mechanism for mobile devices that introduces a new paradigm of information-sharing cooperation among mobile devices not necessarily connected to the internet. Meer
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di? Meer
Collaborative Networks is a fast developing area, as shown by the already large number of diverse real-world implemented cases and the dynamism of its related involved research community. Meer
Challenges in complexity and variability of multimedia data have led to revolutions in machine learning techniques. Multimedia data, such as digital images, audio streams and motion video programs, exhibit richer structures than simple, isolated data items. Meer
Information Systems Development (ISD) progresses rapidly, continually creating new challenges for the professionals involved. New concepts, approaches and techniques of systems development emerge constantly in this field. Meer
In this book I argue that a reason for the limited success of various studies under the general heading of cybernetics is failure to appreciate the importance of con- nuity, in a simple metrical sense of the term. Meer
With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Meer
Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Meer
This book examines the newer and emerging models of telecommunications technology that play instrumental roles in providing international economic and societal interconnectivity. Meer
The diverse applications of IoT are achieved by a set of complex inter-related networks of things and communications. IoT applications are also concerned about an array of devices such as sensors, mobile devices, personal computers, the smart systems such as Alexa, Eco, etc, besides the whole range of communication network binding them together in a seamless manner. Meer
The European Computing Conference offers a unique forum for establishing new collaborations within present or upcoming research projects, exchanging useful ideas, presenting recent research results, participating in discussions and establishing new academic collaborations, linking university with the industry. Meer
This book initiates a new digital multimedia standards series. The purpose of the series is to make information about digital multimedia standards readilyavailable. Meer
Shortly after the end of World War II high-speed digital computing machines were being developed. It was clear that the mathematical aspects of com putation needed to be reexamined in order to make efficient use of high-speed digital computers for mathematical computations. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books