The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. Meer
The
third international conference on INformation Systems Design and Intelligent
Applications (INDIA – 2016) held in Visakhapatnam, India during January 8-9,
2016. Meer
The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. Meer
€ 43,19
Levertijd ongeveer 11 werkdagen | Gratis verzonden
This volume contains the papers presented at the Second International Work ing Conference on Dependable Computing for Critical Applications, sponsored by IFIP Working Group lOA and held in Tucson, Arizona on February 18-20, 1991. Meer
As the cost of developing new semiconductor technology at ever higher bit/gate densities continues to grow, the value of using accurate TCAD simu lation tools for design and development becomes more and more of a necessity to compete in today's business. Meer
The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. Meer
€ 99,46
Levertijd ongeveer 11 werkdagen | Gratis verzonden
The book: "PACKET TRACER FOR YOUNG INTERMEDIATE ADMINS" is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. Meer
The book: "PACKET TRACER FOR YOUNG ADVANCED ADMINS" is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. Meer
The book: "COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS"" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Meer
The book: "COMPUTER NETWORKS IN PACKET TRACER FOR ADVANCED USERS" is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. Meer
The book Mobile Applications for the Student and Developer Technician is designed for individuals seeking to gain knowledge about the process of developing mobile applications for the Android operating system. Meer
This volume presents the proceedings of COMPUTER GRAPHICS INTERNATIONAL '93 (COl '93), the Eleventh International Conference of the Computer Graphics Society (CGS), COl '93 has been held in Lausanne, Switzerland from June 21-25,1993 under the theme Communicating with Virtual Worlds. Meer
Heiko Klarl zeigt, wie Fach- und IT-Seite bei der Absicherung von Geschäftsprozessen näher zusammengebracht werden und wie ein modellgetriebener Softwareentwicklungsprozess für Zugriffskontrollpolicies ermöglicht wird. Meer
Alle Teilgebiete der KI werden mit dieser Einführung kompakt, leicht verständlich und anwendungsbezogen dargestellt. Hier schreibt jemand, der das Gebiet nicht nur bestens kennt, sondern auch in der Lehre engagiert und erfolgreich vertritt. Meer
Praktiker, IT-Verantwortliche und Berater erhalten eine konkrete und leicht verständliche Anleitung zur Arbeit in Microsoft Dynamics AX. Dieses von Microsoft als Premium-Lösung für den Mittelstand und internationale Konzerne positionierte ERP-System ist für alle Unternehmen interessant, die ein leistungsfähiges System suchen, das dennoch einfach zu bedienen ist. Meer
Programmieren bedeutet, die Lösungsmethode für ein Problem zu kennen und diese zielgerichtet anzuwenden. Dafür muss das Problem mithilfe der Mathematik zunächst eingeordnet und seine Lösung dann beispielhaft umgesetzt werden. Meer
Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance with restrictions implied by security policies, in particular, to prevent disclosure of information or access to resources beyond restrictions defined by those security policies. Meer
This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. Meer
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books