The Pearson uCertify courses combine Pearson’s certified and academic peer reviewed content in an accessible, flexible, & scalable platform! Courses can be offered in 3 formats: Instructor-Led, Self-paced or Hybrid. Meer
Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations will assist those who have never collected mobile evidence and augment the work of professionals who are not currently performing advanced destructive techniques. Meer
Search is not just a box and ten blue links. Search is a journey: an exploration where what we encounter along the way changes what we seek. But in order to guide people along this journey, designers must understand both the art and science of search. Meer
Handbook of Probabilistic Models carefully examines the application of advanced probabilistic models in conventional engineering fields. In this comprehensive handbook, practitioners, researchers and scientists will find detailed explanations of technical concepts, applications of the proposed methods, and the respective scientific approaches needed to solve the problem. Meer
Handbook of Pediatric Brain Imaging: Methods and Applications presents state-of-the-art research on pediatric brain image acquisition and analysis from a broad range of imaging modalities, including MRI, EEG and MEG. Meer
How well does your organization manage the risks associated with information quality? Managing information risk is becoming a top priority on the organizational agenda. Meer
Easy, clear, readable, and focused on what you want to do. Step-by-step instructions for the tasks you care about most. Large, full-color, close-up photos with callouts to iPhone photos that show you exactly what to do. Meer
Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. Meer
Are you ready to challenge the ways you have always approached networking? The IT world has undergone a transformation, and fast solutions just aren’t fast enough anymore. Meer
There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. Meer
Whether you are brand new to data mining or working on your tenth predictive analytics project, Commercial Data Mining will be there for you as an accessible reference outlining the entire process and related themes. Meer
Unleash the power of Cisco SD-WAN with this comprehensive guide to design, deployment, and security. Cisco Catalyst SD-WAN: Design, Deploy, and Secure Your WAN is your definitive guide to mastering Cisco's Software-Defined Wide Area Networking. Meer
Visual Computing for Medicine, Second Edition, offers cutting-edge visualization techniques and their applications in medical diagnosis, education, and treatment. Meer
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. Meer
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Meer
3D interaction is suddenly everywhere. But simply using 3D input or displays isn’t enough: 3D interfaces must be carefully designed for optimal user experience. Meer
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Meer
In network design, the gap between theory and practice is woefully broad. This book narrows it, comprehensively and critically examining current network design models and methods. Meer
Text summarization has been studied for over a half century, but traditional methods process texts empirically and neglect the fundamental characteristics and principles of language use and understanding. Meer
Mathematical optimization is used in nearly all computer graphics applications, from computer vision to animation. This book teaches readers the core set of techniques that every computer graphics professional should understand in order to envision and expand the boundaries of what is possible in their work. Meer
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books