When you invest in expensive technology and systems, you want to get the most out of them. Process improvement has been used for years as an effective strategy to reduce costs, shorten cycle times, improve quality, and increase user satisfaction in other areas of business such as Quality, Manufacturing, and Engineering. Meer
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Meer
Artificial Intelligence (AI), when incorporated with machine learning and deep learning algorithms, has a wide variety of applications today. This book focuses on the implementation of various elementary and advanced approaches in AI that can be used in various domains to solve real-time decision-making problems. Meer
A Thorough Overview of the Next Generation in Computing
Poised to follow in the footsteps of the Internet, grid computing is on the verge of becoming more robust and accessible to the public in the near future. Meer
The product of many years of practical experience and research in the software measurement business, this technical reference helps you select what metrics to collect, how to convert measurement data to management information, and provides the statistics necessary to perform these conversions. Meer
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Meer
This comprehensive volume covers a wide range of duality topics ranging from simple ideas in network flows to complex issues in non-convex optimization and multicriteria problems. Meer
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. Meer
Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. Meer
This book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area. Meer
How can we recruit out of your program? We have a project – how do we reach out to your students? If we do research together who owns it? We have employees who need to "upskill" in analytics – can you help me with that? Meer
The agile transformation is an act of transforming an organization’s form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment. Meer
Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R. Meer
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. Meer
Practical Time Series Analysis for Data Science is an accessible guide that doesn’t require a background in calculus to be engaging but does not shy away from deeper explanations of the techniques discussed. Meer
Fueled by ubiquitous computing ambitions, the edge is at the center of confluence of many emergent technological trends such as hardware-rooted trust and code integrity, 5G, data privacy and sovereignty, blockchains and distributed ledgers, ubiquitous sensors and drones, autonomous systems and real-time stream processing. Meer
Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. Meer
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. Meer
This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Meer
This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books