This new and completely updated edition is a comprehensive, easy-to-read, "how-to" guide on user research methods. You'll learn about many distinct user research methods and also pre- and post-method considerations such as recruiting, facilitating activities or moderating, negotiating with product developments teams/customers, and getting your results incorporated into the product. Meer
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Meer
The Intelligent Systems Series publishes reference works and handbooks in three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. Meer
One of the biggest challenges in chip and system design is determining whether the hardware works correctly. That is the job of functional verification engineers and they are the audience for this comprehensive text from three top industry professionals. Meer
High Performance Parallelism Pearls Volume 2 offers another set of examples that demonstrate how to leverage parallelism. Similar to Volume 1, the techniques included here explain how to use processors and coprocessors with the same programming – illustrating the most effective ways to combine Xeon Phi coprocessors with Xeon and other multicore processors. Meer
"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. Meer
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. Meer
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Meer
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). Meer
User Experience Re-Mastered: Your Guide to Getting the Right Design provides an understanding of key design and development processes aimed at enhancing the user experience of websites and web applications. Meer
Universal UX Design: Building Multicultural User Experience provides an ideal guide as multicultural UX continues to emerge as a transdisciplinary field that, in addition to the traditional UI and corporate strategy concerns, includes socio/cultural and neurocognitive concerns that constitute one of the first steps in a truly global product strategy. Meer
Teach the course YOU want in LESS TIME!
In today's fast-moving, mobile environment, the GO! with Office 2016 series focuses on the job skills needed to succeed in the workforce. Meer
The Definitive Guide to Arm® Cortex®-M23 and Cortex-M33 Processors focuses on the Armv8-M architecture and the features that are available in the Cortex-M23 and Cortex- M33 processors. Meer
Linux is today’s dominant Internet server platform. System administrators and Web developers need deep Linux fluency, including expert knowledge of shells and the command line. Meer
For courses in computer/network security
Balancing principle and practice—an updated survey of the fast-moving world of computer and network security
Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network Security. Meer
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Meer
Meeting the Challenges of Data Quality Management outlines the foundational concepts of data quality management and its challenges. The book enables data management professionals to help their organizations get more value from data by addressing the five challenges of data quality management: the meaning challenge (recognizing how data represents reality), the process/quality challenge (creating high-quality data by design), the people challenge (building data literacy), the technical challenge (enabling organizational data to be accessed and used, as well as protected), and the accountability challenge (ensuring organizational leadership treats data as an asset). Meer
Through this guide's carefully constructed explanations and examples, you will develop an understanding of Swift grammar and the elements of effective Swift style - all thoroughly revised for Swift 5. Meer
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. Meer
Industrial Agents explains how multi-agent systems improve collaborative networks to offer dynamic service changes, customization, improved quality and reliability, and flexible infrastructure. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books