After providing an introduction to the Perl programming language, this helpful guide teaches computer networking using Perl. Topics discussed include ethernet network analysis, programming standard Internet protocols, and exploring mobile agent programming. Meer
New practical techniques for nonlinear system research and evaluation
Nonlinear Systems Techniques and Applications provides the most practical techniques currently available for analyzing and identifying nonlinear systems from random data measured at the input and output points of the nonlinear systems. Meer
Are You Ready to Meet the Demand for Object COBOL Programming? Now you can keep up–to–date with the newest standards in COBOL. With its use of straightforward language and real–world examples, An Introduction To Object COBOL is a concise and accessible introduction to using Object COBOL. Meer
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure– based on advanced internet protocols. Meer
A clear–cut, practical approach to software development! Emphasizing both the design and analysis of the technology, Peters and Pedrycz have written a comprehensive and complete text on a quantitative approach to software engineering. Meer
A unique, integrated treatment of computer modeling and simulation "The future of science belongs to those willing to make the shift to simulation–based modeling," predicts Rice Professor James Thompson, a leading modeler and computational statistician widely known for his original ideas and engaging style. Meer
The major reason for the lack of use of parallel computing is the mismatch between the complexity and variety of parallel hardware, and the software development tools to program it. Meer
Encyclopedia of Multimedia, Second Edition provides easy access to important concepts, issues and technology trends in the field of multimedia technologies, systems, techniques, and applications. Meer
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. Meer
Semistructured Database Design provides an essential reference for anyone interested in the effective management of semsistructured data. Since many new and advanced web applications consume a huge amount of such data, there is a growing need to properly design efficient databases. Meer
Hard real-time systems are very predictable, but not sufficiently flexible to adapt to dynamic situations. They are built under pessimistic assumptions to cope with worst-case scenarios, so they often waste resources. Meer
Abstract In this chapter we provide an overview of probabilistic logic networks (PLN), including our motivations for developing PLN and the guiding principles underlying PLN. Meer
Every mathematical discipline goes through three periods of development: the naive, the formal, and the critical. David Hilbert The goal of this book is to explain the principles that made support vector machines (SVMs) a successful modeling and prediction tool for a variety of applications. Meer
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. Meer
Open Source Systems Security Certification discusses Security Certification Standards and establishes the need to certify open source tools and applications. Meer
Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It is a rapidly evolving field with applications ranging from securely accessing one’s computer to gaining entry into a country. Meer
ITIL® Version 3 At a Glance takes a graphical approach to consolidating the information of ITIL® version 3. ITIL® is an internationally-recognized set of best practices for providing IT service management. Meer
The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. Meer
Mapping Cyberspace is a ground-breaking geographic exploration and critical reading of cyberspace, and information and communication technologies. The book:
* provides an understanding of what cyberspace looks like and the social interactions that occur there
* explores the impacts of cyberspace, and information and communication technologies, on cultural, political and economic relations
* charts the spatial forms of virutal spaces
* details empirical research and examines a wide variety of maps and spatialisations of cyberspace and the information society
* has a related website at http://www. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books