jQuery is een JavaScript-framework voor het programmeren van dynamische en interactieve websites. Dit boek legt precies uit hoe jQuery werkt, welke code u moet kennen en wat u met jQuery kunt bereiken..
Blijf bij in een wereld vol digitale innovatie met boeken over software, hardware, data en meer. Of je nu programmeert, onderzoekt of gewoon nieuwsgierig bent – hier ontdek je de kracht van technologie.
Zoek verder in Computer en informatica
Bekijk resultaten in...
Alle productenManagementboekenSeminars + TrainingenOnline magazineSale
Extracting content from text continues to be an important research problem for information processing and management. Approaches to capture the semantics of text-based document collections may be based on Bayesian models, probability theory, vector space models, statistical models, or even graph theory. Meer
Intuitively, a sequence such as 101010101010101010… does not seem random, whereas 101101011101010100…, obtained using coin tosses, does. How can we reconcile this intuition with the fact that both are statistically equally likely? Meer
This book is intended for students, researchers, and professionals interested in evolutionary algorithms at graduate and postgraduate level. No mathematics beyond basic algebra and Cartesian graphs methods is required, as the aim is to encourage applying the JAVA toolkit to develop an appreciation of the power of these techniques. Meer
This volume contains the papers presented at the Fourth International Workshop on Database Machines. The papers cover a wide spectrum of topics including descrip tions of database machine implementations. Meer
As the title suggests, this book explores the concepts of drawing, graphics and animation in the context of coding. In this endeavour, in addition to initiating the process with some historical perspectives on programming languages, it prides itself by presenting complex concepts in an easy-to-understand fashion for students, artists, hobbyists as well as those interested in computer science, computer graphics, digital media, or interdisciplinary studies. Meer
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. Meer
Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. Meer
This is an exciting time. The study of neural networks is enjoying a great renaissance, both in computational neuroscience - the development of information processing models of living brains - and in neural computing - the use of neurally inspired concepts in the construction of "intelligent" machines. Meer
For the Love of Cybernetics: Personal Narratives by Cyberneticians is a collection of personal accounts that offer unique insights into cybernetics via the personal journeys of nine individuals. Meer
Abstract Biological vision is a rather fascinating domain of research. Scientists of various origins like biology, medicine, neurophysiology, engineering, math ematics, etc. Meer
This book records one of the continuous attempts of the IFIP Working Group 8. 2, studying the interaction of information systems and the organization, to explore and understand the shifting boundaries and dependencies between organizational activities and their computer support. Meer
The CoreGRID Network of Excellence (NoE) project began in September 2004. Two months later, in November 2004, the first CoreGRID Integra tion Workshop was held within the framework of the prestigious international Dagstuhl seminars. Meer
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Meer
Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Meer
This book is a compilation of chapters written by leading researchers from all over the world. Those researchers’ common characteristic is that they have investigated issues at the intersection of the elds of information systems (IS) and evoluti- ary psychology (EP). Meer
Brings together innovative and scholarly research on the use of game-based design and technology in a variety of settings. This publication presents timely, research-based chapters on the development of games and the real-world applications of game-thinking and game dynamics, as well as digital development, game design, human resource processes, social change, and video game learning. Meer
Testing of Communicating Systems presents the latest international results in both the theory and industrial practice of the testing of communicating systems. Meer
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books