Now live! SUMMER 2020 DIGITAL UPDATE for digital content
Microsoft Office 365 updates are reflected in the eText and associated MyLab for this title. Meer
Now live! SUMMER 2020 DIGITAL UPDATE for digital content
Microsoft Office 365 updates are reflected in the eText and associated MyLab for this title. Meer
IT Essentials v7 Companion Guide supports the Cisco Networking Academy IT Essentials version 7 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues. Meer
Designing Secure IoT devices with the Arm Platform Security Architecture and Cortex-M33 explains how to design and deploy secure IoT devices based on the Cortex-M23/M33 processor. Meer
In just a few years, deep reinforcement learning (DRL) systems such as DeepMinds DQN have yielded remarkable results. This hybrid approach to machine learning shares many similarities with human learning: its unsupervised self-learning, self-discovery of strategies, usage of memory, balance of exploration and exploitation, and its exceptional flexibility. Meer
The Exploring Microsoft® Office 365® series moves students beyond rote tasks to a deeper comprehension of how, when, and why to apply Office skills. Meer
Quantum Information Processing and Quantum Error Correction is a self-contained, tutorial-based introduction to quantum information, quantum computation, and quantum error-correction. Meer
Parallel Programming with OpenACC is a modern, practical guide to implementing dependable computing systems. The book explains how anyone can use OpenACC to quickly ramp-up application performance using high-level code directives called pragmas. Meer
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Meer
IPv6 Advanced Protocols Implementation is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not specific to IPv6 but are extended to support IPv6. Meer
Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Meer
"TCP/IP sockets in C# is an excellent book for anyone interested in writing network applications using Microsoft .Net frameworks. It is a unique combination of well written concise text and rich carefully selected set of working examples. Meer
Power and Performance: Software Analysis and Optimization is a guide to solving performance problems in modern Linux systems. Power-efficient chips are no help if the software those chips run on is inefficient. Meer
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Meer
OCEB Certification Guide delivers expert insight into BPM from one of the developers of the OCEB Fundamental exam, offering full coverage of the exam material for both the business and technical tracks. Meer
As the computer industry retools to leverage massively parallel graphics processing units (GPUs), this book is designed to meet the needs of working software developers who need to understand GPU programming with CUDA and increase efficiency in their projects. Meer
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. Meer
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. Meer
Heterogeneous Computing with OpenCL, Second Edition teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs) such as AMD Fusion technology. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books