Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. Meer
Practical UML Statecharts in C/C plus plus Second Edition bridges the gap between high-level abstract concepts of the Unified Modeling Language (UML) and the actual programming aspects of modern hierarchical state machines (UML statecharts). Meer
This technical dictionary defines the 2,500 most-used words in the embedded systems field, with over 4,500 entries and cross-references. Designed to serve both the technical and non-technical audience, this book defines advanced terms in two steps. Meer
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Meer
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Meer
Created to help scientists and engineers write computer code, this practical book addresses the important tools and techniques that are necessary for scientific computing, but which are not yet commonplace in science and engineering curricula. Meer
BTEC National for IT Practitioners has been written specifically to cover the compulsory core units and selected specialist units of the BTEC National specifications. Meer
While teaching Java programming at Minnesota State University, the authors noticed that engineering students were enrolling in Java programming courses in order to obtain basic programming skills, but there were no Java books suitable for courses intended for engineers. Meer
This book looks at various application and data demand drivers, along with data infrastructure options from legacy on premise, public cloud, hybrid, software-defined data center (SDDC), software data infrastructure (SDI), container as well as serverless along with infrastructure as a Service (IaaS), IT as a Service (ITaaS) along with related technology, trends, tools, techniques and strategies. Meer
Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data. Meer
PhoneGap is a standards-based, open-source development framework that can be deployed to any mobile device without losing the features of the native app—allowing for access to device contacts, the local file system, camera, and media on multiple platforms without requiring users to write a single line of code. Meer
This book serves as an introduction into the world of security and provides insight into why and how current security management practices fail, resulting in overall dissatisfaction by practitioners and lack of success in the corporate environment. Meer
Smart Data: State-of-the-Art Perspectives in Computing and Applications explores smart data computing techniques to provide intelligent decision making and prediction services support for business, science, and engineering. Meer
Wolfgang Engel’s GPU Pro 360 Guide to Geometry Manipulation gathers all the cutting-edge information from his previous seven GPU Pro volumes into a convenient single source anthology that covers geometry manipulation in computer graphics. Meer
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Meer
This book discusses advanced topics such as R core programing, object oriented R programing, parallel computing with R, and spatial data types. The author leads readers to merge mature and effective methdologies in traditional programing to R programing. Meer
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Meer
As the title suggests, this book explores the concepts of drawing, graphics and animation in the context of coding. In this endeavour, in addition to initiating the process with some historical perspectives on programming languages, it prides itself by presenting complex concepts in an easy-to-understand fashion for students, artists, hobbyists as well as those interested in computer science, computer graphics, digital media, or interdisciplinary studies. Meer
"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D’Alessandro, and Roger Bradbury have produced a book that … shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity — what it is, why it matters, and how to do it. Meer
Introducing Autodesk Maya is your perfect hands-on guide to start animating quickly. Using approachable, real-world exercises, you'll master the fundamentals of this animation software by following full-color screen shots step by step. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books