As an introduction to the basics of computer graphics, the approach here focusses on the four main concepts: modeling, rendering, animation, and image manipulation. Meer
Over recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of Asynchronous Transfer Mode (ATM) networks. Meer
A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. Meer
Data mining is a mature technology. The prediction problem, looking for predictive patterns in data, has been widely studied. Strong me- ods are available to the practitioner. Meer
Computer graphics games and animations have been popular for over a decade, and personal computers have now evolved to support real-time, realistic-looking interactive games. Meer
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. Meer
Image-Based Rendering examines the theory, practice, and applications associated with image-based rendering and modeling. As leading researchers in the field, the authors combine their unique experiences in computer graphics, computer vision, and signal processing to address the multidisciplinary nature of IBR research. Meer
Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Meer
As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvements of already existing functions, as well as the compliance with traffic regulations and customer requirements, have only become possible by the increasing use of electronic systems, especially in the fields of driving, safety, reliability, and functionality. Meer
This book examines the semiotic effects of protocols and algorithms at work in popular social media systems, bridging philosophical conversations in human-computer interaction (HCI) and information systems (IS) design with contemporary work in critical media, technology and software studies. Meer
This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Meer
There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. Meer
This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective internal controls. Meer
Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. Meer
Some of our day-to-day situations dealing with self-organization, mobility management, and energy efficient design directly relate to ad hoc wireless (mobile or static) network applications. Meer
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Meer
The digital humanities in academic institutions, and libraries in particular, have exploded in recent years. Librarians are constantly developing their management and technological skills and increasing their knowledge base. Meer
Proof techniques in cryptography are very difficult to understand, even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proofs of the cryptographic schemes, practical aspects of them have received comparatively less attention. Meer
Developing Performance Support for Computer Systems: A Strategy for Maximizing Usability and Learnability provides detailed planning, design, and development guidance for generating performance support for new or upgraded computer systems. Meer
Developments in Lisp technology have been accelerated by a number of factors, including the increased interest in Artificial Intelligence and the emergence of Common Lisp. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books