Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. Meer
Computer access is the only way to retrieve up-to-date sequences and this book shows researchers puzzled by the maze of URLs, sites, and searches how to use internet technology to find and analyze genetic data. Meer
Brain-Computer Interfaces: Lab Experiments to Real-World Applications, the latest volume in the Progress in Brain Research series, focuses on new trends and developments. Meer
There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. Meer
Whether you are brand new to data mining or working on your tenth predictive analytics project, Commercial Data Mining will be there for you as an accessible reference outlining the entire process and related themes. Meer
Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE explains how to apply the complex MARTE standard in practical situations. This approachable reference provides a handy user guide, illustrating with numerous examples how you can use MARTE to design and develop real-time and embedded systems and software. Meer
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. Meer
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. Meer
Signal Processing for Active Control sets out the signal processing and automatic control techniques that are used in the analysis and implementation of active systems for the control of sound and vibration. Meer
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. Meer
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Meer
€ 63,91
Levertijd ongeveer 11 werkdagen | Gratis verzonden
Brainstorming and Beyond describes the techniques for generating ideas verbally, in writing, or through sketches. The first chapter focuses on brainstorming, the foundation method for ideation, which is a complex social process building off of social psychology principles, motivational constructs, and corporate culture. Meer
High Performance Deformable Image Registration Algorithms for Manycore Processors develops highly data-parallel image registration algorithms suitable for use on modern multi-core architectures, including graphics processing units (GPUs). Meer
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Meer
€ 97,46
Levertijd ongeveer 11 werkdagen | Gratis verzonden
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Meer
€ 63,91
Levertijd ongeveer 11 werkdagen | Gratis verzonden
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Meer
€ 76,49
Levertijd ongeveer 11 werkdagen | Gratis verzonden
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Meer
€ 63,91
Levertijd ongeveer 11 werkdagen | Gratis verzonden
User Experience in the Age of Sustainability focuses on the economic, sociological and environmental movement in business to make all products including digital ones more sustainable. Meer
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. Meer
VHDL-2008: Just the New Stuff, as its title says, introduces the new features added to the latest revision of the IEEE standard for the VHDL hardware description language. Meer
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books