Warning: Undefined array key "computer en informatica" in /data/bigmomma/var-code/master/MGT/m4-deploy-1756284837-9d8ea48/classes/rubriek.inc on line 88 Computer en informatica - Managementboek.nl
Op werkdagen voor 23:00 besteld, morgen in huisGratis verzending vanaf €20
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Meer
For a one-semester undergraduate-level course in Cryptology, Mathematics, or Computer Science.
Designed for either the intelligent freshman (good at math) or for a low-level junior year first course, Cryptology introduces a wide range of up-to-date cryptological concepts along with the mathematical ideas that are behind them. Meer
First impressions are important.
To introduce your Assembly Language programming students to the fundamental concepts of contemporary computer architecture, start with a Reduced Instruction Set Computer (RISC). Meer
"Reading this book has filled a gap in my education. I feel a sense of completion, understand that UNIX is really a style of community. Now I get it, at least I get it one level deeper than I ever did before. Meer
For an introductory, one-semester course in Usability Engineering.
Written in an accessible, conversational style, this comprehensive introduction is crafted to support a project-based course emphasizing the development process. Meer
Much has changed since the first edition of human–computer interaction was published. Ubiquitous computing and rich sensor-filled environments are finding their way out of the laboratory, not just into movies but also into our workplaces and homes. Meer
Graphics and game developers must learn to program for mobility. This book will teach you how. "This book - written by some of the key technical experts. Meer
Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. Meer
Software Quality Assurance in Large Scale and Complex Software-intensive Systems presents novel and high-quality research related approaches that relate the quality of software architecture to system requirements, system architecture and enterprise-architecture, or software testing. Meer
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Meer
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. Meer
User interface design is a challenging, multi-disciplinary activity that requires understanding a wide range of concepts and techniques that are often subjective and even conflicting. Meer
Search is not just a box and ten blue links. Search is a journey: an exploration where what we encounter along the way changes what we seek. But in order to guide people along this journey, designers must understand both the art and science of search. Meer
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. Meer
Spatial Regression Analysis Using Eigenvector Spatial Filtering provides theoretical foundations and guides practical implementation of the Moran eigenvector spatial filtering (MESF) technique. Meer
Feature Extraction for Image Processing and Computer Vision is an essential guide to the implementation of image processing and computer vision techniques, with tutorial introductions and sample code in MATLAB and Python. Meer
Social Network Analytics: Computational Research Methods and Techniques focuses on various technical concepts and aspects of social network analysis. The book features the latest developments and findings in this emerging area of research. Meer
Understanding Virtual Reality: Interface, Application, and Design, Second Edition arrives at a time when the technologies behind virtual reality have advanced dramatically. Meer
High Performance Parallelism Pearls shows how to leverage parallelism on processors and coprocessors with the same programming – illustrating the most effective ways to better tap the computational potential of systems with Intel Xeon Phi coprocessors and Intel Xeon processors or other multicore processors. Meer
Network Function Virtualization provides an architectural, vendor-neutral level overview of the issues surrounding the large levels of data storage and transmission requirements needed for today's companies, also enumerating the benefits of NFV for the enterprise. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books