How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. Meer
Low-Rank Models in Visual Analysis: Theories, Algorithms, and Applications presents the state-of-the-art on low-rank models and their application to visual analysis. Meer
Digital Signal Processing 101: Everything You Need to Know to Get Started provides a basic tutorial on digital signal processing (DSP). Beginning with discussions of numerical representation and complex numbers and exponentials, it goes on to explain difficult concepts such as sampling, aliasing, imaginary numbers, and frequency response. Meer
User Experience Re-Mastered: Your Guide to Getting the Right Design provides an understanding of key design and development processes aimed at enhancing the user experience of websites and web applications. Meer
Learning Processing, Second Edition, is a friendly start-up guide to Processing, a free, open-source alternative to expensive software and daunting programming languages. Meer
Customizable processors have been described as the next natural step in the evolution of the microprocessor business: a step in the life of a new technology where top performance alone is no longer sufficient to guarantee market success. Meer
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Meer
Computer Networks ISE, Fifth Edition, is the sole introductory networking book written by authors with first-hand experience with several of the protocols covered in the book who have actually designed some of them as well and who are still actively designing the computer networks today. Meer
Network Simulation Experiments Manual, Third Edition, is a practical tool containing detailed, simulation-based experiments to help students and professionals learn about key concepts in computer networking. Meer
User interface design is a challenging, multi-disciplinary activity that requires understanding a wide range of concepts and techniques that are often subjective and even conflicting. Meer
The fourth book of a four-part series, Design Theory and Methods using CAD/CAE integrates discussion of modern engineering design principles, advanced design tools, and industrial design practices throughout the design process. Meer
Imagine how much easier creating web and mobile applications would be if you had a practical and concise, hands-on guide to visual design. Visual Usability gets into the nitty-gritty of applying visual design principles to complex application design. Meer
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. Meer
Complex Systems and Clouds: A Self-Organization and Self-Management Perspective provides insights into the intricate world of self-organizing systems. Meer
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). Meer
The divide between UX and Web development can be stifling. Bridging UX and Web Development prepares you to break down those walls by teaching you how to integrate with your team’s developers. Meer
As technology continues to rapidly advance, individuals and society are profoundly changed. So too are the tools used to measure this universe and, therefore, our understanding of reality improves. Meer
Discrete-Time Neural Observers: Analysis and Applications presents recent advances in the theory of neural state estimation for discrete-time unknown nonlinear systems with multiple inputs and outputs. Meer
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. Meer
"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books