Warning: Undefined array key "computer en informatica" in /data/bigmomma/var-code/master/MGT/m4-deploy-1756382554-18569dc/classes/rubriek.inc on line 88 Computer en informatica - Managementboek.nl
Op werkdagen voor 23:00 besteld, morgen in huisGratis verzending vanaf €20
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. Meer
Access to Mobile Services focuses on methods for accessing broadcast based M-services from multiple wireless channels. This book presents a novel infrastructure that provides a multi-channel broadcast framework for mobile users to effectively discover and access composite M-services. Meer
Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Meer
Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. Meer
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. Meer
"Software engineering" is a term which was coined in the late 1960's as the theme for a workshop on the problems involved in producing software that could be developed economicaLly and would run reliably on real machines. Meer
Norbert Wiener, perhaps better than anyone else, understood the intimate and delicate relationship between control and communication: that messages intended as commands do not necessarily differ from those intended simply as facts. Meer
Shortly after the end of World War II high-speed digital computing machines were being developed. It was clear that the mathematical aspects of com putation needed to be reexamined in order to make efficient use of high-speed digital computers for mathematical computations. Meer
Paul Williams, a leading authority on modeling in integer programming, has written a concise, readable introduction to the science and art of using modeling in logic for integer programming. Meer
Preface Mathematica introduced two important innovations to computer graphics. The first was the close integration of high-quality graphics in a computational system. Meer
There are several theories of programming. The first usable theory, often called "Hoare's Logic", is still probably the most widely known. In it, a specification is a pair of predicates: a precondition and postcondition (these and all technical terms will be defined in due course). Meer
The announcement of the Clipper chip by the U.S. Government in April 1993 set off a frenzy of discussions about cryptography policy in the technological community. Meer
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. Meer
This book introduces a new theory in Computer Vision yielding elementary techniques to analyze digital images. These techniques are a mathematical formalization of the Gestalt theory. Meer
This collection of readings is designed to provide easy access to Communication Theory. Many of the essays in the Reader have previously been difficult to obtain and many have appeared in contexts where their relevance for communications, media and cultural studies was not immediately apparent. Meer
This book joins the multitude of Control Systems books now available, but is neither a textbook nor a monograph. Rather it may be described as a resource book or survey of the elements/essentials of feedback control systems. Meer
In this book about a hundred papers are presented. These were selected from over 450 papers submitted to WCCE95. The papers are of high quality and cover many aspects of computers in education. Meer
This book considers how the fundamental issues relating to the use of information technology in education, are being tackled across the world. Significantly it features international perspectives on the challenge that information and communications technology poses to teacher education; views of trainee teacher experiences with computers; insights into the ways in which communication technologies are being used to link teachers and students; consideration of the impact of change with information and communications technology; discussion of the roles of those involved in developing teacher education with information and communications techology at national, institutional and teacher levels. Meer
This book is for both specialist and generalist. For Information Technology (IT) and Educational Management (EM) researchers, it brings together the latest information and analysis of ITEM projects in eleven countries. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books