Mapping Cyberspace is a ground-breaking geographic exploration and critical reading of cyberspace, and information and communication technologies. The book:
* provides an understanding of what cyberspace looks like and the social interactions that occur there
* explores the impacts of cyberspace, and information and communication technologies, on cultural, political and economic relations
* charts the spatial forms of virutal spaces
* details empirical research and examines a wide variety of maps and spatialisations of cyberspace and the information society
* has a related website at http://www. Meer
Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instances, traditional firewalls and other conventional controls can no longer get the job done. Meer
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam. Meer
Clearly, nature has been very effective in creating organisms that are capable of protecting themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. Meer
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. Meer
Illustrating the relevance of linear approximation in a variety of fields, Numerical Linear Approximation in C presents a unique collection of linear approximation algorithms that can be used to analyze, model, and compress discrete data. Meer
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. Meer
Whether you are inheriting a test team or starting one up, Manage Software Testing is a must-have resource that covers all aspects of test management. Meer
Most widely available approaches to semantic integration provide ad-hoc, non-systematic, subjective manual mappings that lead to procrustean amalgamations to fit the target standard, an outcome that pleases no one. Meer
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. Meer
By presenting the conditions, methods and techniques of monetisation of business models in the digital economy, this book combines implementation of the theoretical aspects of monetisation with the presentation of practical business solutions in this field. Meer
Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. Meer
This book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area. Meer
The programming language Fortran dates back to 1957 when a team of IBM engineers released the first Fortran Compiler. During the past 60 years, the language had been revised and updated several times to incorporate more features to enable writing clean and structured computer programs. Meer
This is a how-to book for solving geometric problems robustly or error free in actual practice. The contents and accompanying source code are based on the feature requests and feedback received from industry professionals and academics who want both the descriptions and source code for implementations of geometric algorithms. Meer
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. Meer
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Meer
Fueled by ubiquitous computing ambitions, the edge is at the center of confluence of many emergent technological trends such as hardware-rooted trust and code integrity, 5G, data privacy and sovereignty, blockchains and distributed ledgers, ubiquitous sensors and drones, autonomous systems and real-time stream processing. Meer
The complex challenges facing healthcare require innovative solutions that can make patient care more effective, easily available, and affordable. One such solution is the digital reconstruction of medicine that transitions much of patient care from hospitals, clinics, and offices to a variety of virtual settings. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books