Complex computer-integrated systems offer enormous benefits across a wide array of applications, including automated production, transportation, concurrent software, and computer operating systems, computer networks, distributed database systems, and many other automated systems. Meer
In light of the enormous interest in building intelligent systems, this volume blends theory, applications, and methodology of cybernetics taking it out of the realm of the abstract and explaining how cybernetics can contribute to an improved understanding of intelligence. Meer
If you are a typical Oracle professional, you don't have the luxury of time to keep up with new technology and read all the new manuals to understand each new feature of the latest release from Oracle. Meer
What is the business model for making money on the Internet and how does it function? The answer to this question will determine the shape of the Internet over the near term. Meer
Effective decision support systems (DSS) are quickly becoming key to businesses gaining a competitive advantage, and the effectiveness of these systems depends on the ability to construct, maintain, and extract information from data warehouses. Meer
Guide to Scientific Computing provides an introduction to the many problems of scientific computing, as well as the wide variety of methods used for their solution. Meer
As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. Meer
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. Meer
Written with the intention that users can learn CATIA V.5 R15 on their own with little or no outside help, this book provides step-by-step instructions along with numerous illustrations. Meer
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. Meer
The mathematical theory of control, essentially developed during the last decades, is used for solving many problems of practical importance. The efficiency of its applications has increased in connection with the refine ment of computer techniques and the corresponding mathematical soft ware. Meer
1.1. What This Book is About This book is a study of • subrecursive programming systems, • efficiency/program-size trade-offs between such systems, and • how these systems can serve as tools in complexity theory. Meer
Combinatory logic started as a programme in the foundation of mathematics and in an historical context at a time when such endeavours attracted the most gifted among the mathematicians. Meer
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books