The authors of Practical Network Design Techniques, Second Edition: A Complete Guide for WANs and LANs build upon the popular first edition by combining pre-existing network design fundamentals with new material on LAN devices and topologies, wireless local networks, and LAN internetworking issues. Meer
The author developed Lightweight Enterprise Architecture (LEA) to enable a quick alignment of technology to business strategy. LEA's simple and effective framework makes it useful to a wide audience of users throughout an enterprise, coordinating resources for business requirements and facilitating optimal adoption of technology. Meer
Software engineering and computer science students need a resource that explains how to apply design patterns at the enterprise level, allowing them to design and implement systems of high stability and quality. Meer
The popularity of serial communications demands that additional serial port interfaces be developed to meet the expanding requirements of users. The Windows Serial Port Programming Handbook illustrates the principles and methods of developing various serial port interfaces using multiple languages. Meer
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Meer
With low computational complexity and relatively short development time, Fuzzy Logic is an indispensable tool for engineering applications. The field is growing at an unprecedented rate, and there is a need for a book that describes essential tools, applications, examples, and perspectives in the field of fuzzy learning. Meer
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Meer
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single comprehensive reference on the subject. Meer
The Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. Meer
Throughout successive generations of information technology, the importance of the performance evaluation of software, computer architectures, and computer networks endures. Meer
Software engineering is playing an increasingly significant role in computing and informatics, necessitated by the complexities inherent in large-scale software development. Meer
Although C++ was developed as a superset of C language to include object oriented programming features, it can be used as a separate language. Many references require a prior knowledge of C for learning C++. Meer
Neural Network Modeling offers a cohesive approach to the statistical mechanics and principles of cybernetics as a basis for neural network modeling. It brings together neurobiologists and the engineers who design intelligent automata to understand the physics of collective behavior pertinent to neural elements and the self-control aspects of neurocybernetics. Meer
Provides comprehensive coverage of the most recent developments in the theory of non-Archimedean pseudo-differential equations and its application to stochastics and mathematical physics--offering current methods of construction for stochastic processes in the field of p-adic numbers and related structures. Meer
Data flow analysis is used to discover information for a wide variety of useful applications, ranging from compiler optimizations to software engineering and verification. Meer
This collection compiles the seminal contributions of Michio Sugeno on fuzzy systems and technologies. Fuzzy Modeling & Control: Selected Works of Sugeno serves as a singular resource that provides a clear, comprehensive treatment of fuzzy control systems. Meer
Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Meer
1. Introduction . 1 2. Areas and Angles . . 6 3. Tessellations and Symmetry 14 4. The Postulate of Closest Approach 28 5. The Coexistence of Rotocenters 36 6. Meer
This monograph is a slightly revised version of my PhD thesis [86], com pleted in the Department of Computer Science at the University of Edin burgh in June 1988, with an additional chapter summarising more recent developments. Meer
In 1994 Peter Shor [65] published a factoring algorithm for a quantum computer that finds the prime factors of a composite integer N more efficiently than is possible with the known algorithms for a classical com puter. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books