This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection. Meer
In view of the growing presence and popularity of multicore and manycore processors, accelerators, and coprocessors, as well as clusters using such computing devices, the development of efficient parallel applications has become a key challenge to be able to exploit the performance of such systems. Meer
The true pioneers in electronic publishing put their bibliographic databases on tape and online in the 1960s. Nearly all of them had long experience with compiling information for distribution in printed form and a strong market connection. Meer
Papers collected here, from a December 2001 workshop held at the University of Central Florida, examine topics related to process coordination and ubiquitous computing. Meer
If you: need to create and build databases; work with data; design forms and reports want to get the job done, quickly and efficiently need a self-teaching approach want results fastthen Access 97 for Windows Made Simple is for you! Meer
If you: need to process information quickly and accurately want to produce professional looking reports and presentations want to produce spreadsheets, charts and graphs need a self-teaching approachthen Excel 97 for Windows Made Simple is for you! Meer
Is the Unified Process the be all and end all standard for developing object-oriented component-based software? This book is the final in a four volume series that presents a critical review of the Unified Process. Meer
Given the increasing role of intellectual property (IP) in academic research, it is important for academic scientists to gain greater awareness and knowledge of the various issues involved with IP resulting from their research and inventions. Meer
This edition covers the powerful BS2P and many more peripheral options that expand its power. It features several projects including an RS232-controlled power supply and a bridge that lets a Stamp connected to a PC communicate via the Internet. Meer
This technical dictionary defines the 2,500 most-used words in the embedded systems field, with over 4,500 entries and cross-references. Designed to serve both the technical and non-technical audience, this book defines advanced terms in two steps. Meer
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Meer
PgMP Exam Practice Test and Study Guide, Fourth Edition is the book you need to pass the Program Management Professional (PgMP) exam the first time around. Meer
Recent healthcare reform and its provisions have pushed health information technology (HIT) into the forefront. Higher life expectancies, fewer medical errors, lower costs, and improved transparency are all possible through HIT. Meer
The third book in the Healthcare Payment Systems series, Prospective Payment Systems examines the various types of prospective payment systems (PPS) used by healthcare providers and third-party payers. Meer
"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D’Alessandro, and Roger Bradbury have produced a book that … shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity — what it is, why it matters, and how to do it. Meer
Introducing Autodesk Maya is your perfect hands-on guide to start animating quickly. Using approachable, real-world exercises, you'll master the fundamentals of this animation software by following full-color screen shots step by step. Meer
Introducing Autodesk Maya is your perfect hands-on guide to start animating quickly. Using approachable, real-world exercises, you'll master the fundamentals of this animation software by following full-color screen shots step by step. Meer
Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Meer
Nowadays software engineers not only have to worry about the technical knowledge needed to do their job, but they are increasingly having to know about the legal, professional and commercial context in which they must work. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books