Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. Meer
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. Meer
Architecting High Performing, Scalable and Available Enterprise Web Applications provides in-depth insights into techniques for achieving desired scalability, availability and performance quality goals for enterprise web applications. Meer
This book describes the technical problems and solutions for automatically recognizing and parsing a medical image into multiple objects, structures, or anatomies. Meer
People today use technology on different devices in different locations. Users expect to access information on all relevant screens and across multiple channels through smartphones, tablets, laptops/desktops, smart (internet-connected) TVs, and other devices, such as smartwatches for example. Meer
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. Meer
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. Meer
Handbook of Diffusion MR Tractography: Imaging Methods, Biophysical Models, Algorithms and Applications presents methods and applications of MR diffusion tractography, providing deep insights into the theory and implementation of existing tractography techniques and offering practical advice on how to apply diffusion tractography to research projects and clinical applications. Meer
Advances in Mathematics for Industry 4.0 examines key tools, techniques, strategies, and methods in engineering applications. By covering the latest knowledge in technology for engineering design and manufacture, chapters provide systematic and comprehensive coverage of key drivers in rapid economic development. Meer
Numerical Methods in Environmental Data Analysis introduces environmental scientists to the numerical methods available to help answer research questions through data analysis. Meer
Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. Meer
OCEB Certification Guide delivers expert insight into BPM from one of the developers of the OCEB Fundamental exam, offering full coverage of the exam material for both the business and technical tracks. Meer
The demand for SQL information and training continues to grow with the need for a database behind every website capable of offering web-based information queries. Meer
Computer vision and machine intelligence paradigms are prominent in the domain of medical image applications, including computer assisted diagnosis, image guided radiation therapy, landmark detection, imaging genomics, and brain connectomics. Meer
Fractional Order Systems: An Overview of Mathematics, Design, and Applications for Engineers introduces applications from a design perspective, helping readers plan and design their own applications. Meer
Teaches the basic principles of programming as outlined in the ACM curriculum for a CS1 class and the basic constructs of the C++ language. This title stresses incremental program development, wherein program analysis is followed by building a structure chart, constructing UML flow diagrams, writing algorithms, and undertaking program design. Meer
€ 228,96
Levertijd ongeveer 16 werkdagen | Gratis verzonden
Information Management: Gaining a Competitive Advantage with Data is about making smart decisions to make the most of company information. Expert author William McKnight develops the value proposition for information in the enterprise and succinctly outlines the numerous forms of data storage. Meer
Bitemporal data has always been important. But it was not until 2011 that the ISO released a SQL standard that supported it. Currently, among major DBMS vendors, Oracle, IBM and Teradata now provide at least some bitemporal functionality in their flagship products. Meer
In this Oracle Press guide, a member of the PeopleTools mobile development team shows how to build powerful and secure mobile applications for PeopleSoft PeopleTools using the latest techniques and best practices. Meer
€ 61,50
Levertijd ongeveer 16 werkdagen | Gratis verzonden
Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Meer
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books