This updated textbook introduces readers to assembly and its evolving role in computer programming and design. The author concentrates the revised edition on protected-mode Pentium programming, MIPS assembly language programming, and use of the NASM and SPIM assemblers for a Linux orientation. Meer
Master the complexities of the world's bestselling 2D and 3D software with Introduction to AutoCAD 2020. Ideally suited to new users, and relevant for both AutoCAD 2020 and AutoCAD 2021, this book will be a useful resource for drawing modules in both vocational and introductory undergraduate courses in engineering and construction. Meer
The crypto wars have raged for half a century.
In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. Meer
The crypto wars have raged for half a century.
In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. Meer
QoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its analysis involves such mathematical disciplines as probability, random variables, stochastic processes and queuing. Meer
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. Meer
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. Meer
Fuzzy Database Modeling with XML aims to provide a single record of current research and practical applications in the fuzzy databases. This volume is the outgrowth of research the author has conducted in recent years. Meer
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. Meer
Communication systems are now ubiquitous and making them more intelligent remains very challenging. The IFIP International Conference on Intelligence in Communication Systems is an effort to bring together researchers and practitioners who represent the latest developments in this area. Meer
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Meer
Process Assessment and ISO/IEC 15504: A Reference Book, Second Edition, provides the reader with guidance on the emerging ISO/IEC 15504 Process Assessment Standard. Meer
This comprehensive reference provides easy access to relevant information on all aspects of Computer Vision. An A-Z format of over 240 entries offers a diverse range of topics for those seeking entry into any aspect within the broad field of Computer Vision. Meer
The two-volume Advances in Information Systems Development: Bridging the Gap between Academia and Industry constitutes the collected proceedings of the Fourteenth International Conference on Information Systems Development: Methods and Tools, Theory and Practice – ISD’2005 Conference. Meer
Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. Meer
Hypercomputation is a relatively new theory of computation that is about computing methods and devices that transcend the so-called Church-Turing thesis. Meer
With the aim of simplifying relational database modeling, Database Modeling Step-by-Step presents the standard approach to database normalization and then adds its own approach, which is a more simplistic, intuitive way to building relational database models. Meer
This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. Meer
JavaScript is the native language of the Internet. Originally created to make web pages more dynamic, it is now used for software projects of all kinds, including scientific visualization and data services. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books