Gesture Recognition: Theory and Applications covers this important topic in computer science and language technology that has a goal of interpreting human gestures via mathematical algorithms. Meer
Advanced Machine Learning for Cyber-Attack Detection in IoT Networks analyzes diverse machine learning techniques, including supervised, unsupervised, reinforcement, and deep learning, along with their applications in detecting and preventing cyberattacks in future IoT systems. Meer
Quantum Computing for Healthcare Data: Revolutionizing the Future of Medicine presents an advanced overview of the fundamentals of quantum computing, from the transition of traditional to quantum computing, to the challenges and opportunities encountered as various industries enter into the paradigm shift. Meer
Soft computing is an emerging discipline which aims to exploit tolerance for imprecision, approximate reasoning, and uncertainty to achieve robustness, tractability, and cost effectiveness for building intelligent machines. Meer
Antivirus Engines: From Methods to Innovations, Design, and Applications offers an in-depth exploration of the core techniques employed in modern antivirus software. Meer
Hands–on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, this practical book is for you. Meer
Thorough and updated coverage on all the essential C++ concepts
Aimed at providing you with a solid foundation in programming with C++, this new edition incorporates programming exercises with helpful self–check questions that reinforce the concepts discussed throughout the book. Meer
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. Meer
Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Meer
Artificial Intelligence of Things (AIoT): Current and Future Trends brings together researchers and developers from a wide range of domains to share ideas on how to implement technical advances, create application areas for intelligent systems, and how to develop new services and smart devices connected to the Internet. Meer
Fractional Modeling of Fluid Flow and Transport Phenomena focuses on mathematical and numerical aspects of fractional-order modeling in fluid flow and transport phenomena. Meer
Iris and Periocular Recognition using Deep Learning systematically explains the fundamental and most advanced techniques for ocular imprint-based human identification, with many applications in sectors such as healthcare, online education, e-business, metaverse, and entertainment. Meer
Intelligent Evolutionary Optimization introduces biologically-inspired intelligent optimization algorithms to address complex optimization problems and provide practical solutions for tackling combinatorial optimization problems. Meer
If you ve dreamed about having a customized multimedia PC or one tricked out for your favorite games, build your own and make your dreams come true! Meer
The first edition, published in 1973, has become a classic reference in the field. Now with the second edition, readers will find information on key new topics such as neural networks and statistical pattern recognition, the theory of machine learning, and the theory of invariances. Meer
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Meer
You can get there
Whether you′re already working and looking to expand your skills in the computer networking and security field or setting out on a new career path, Network Security Fundamentals will help you get there. Meer
You can get there
Introduction to Databases Project Manual offers a wealth of easy–to–read, practical, up–to–date activities that reinforce fundamental database design and management concepts. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books