The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. Meer
This book addresses extensible and adaptable computing, a broad range of methods and techniques used to systematically tackle the future growth of systems and respond proactively and seamlessly to change. Meer
This book highlights new trends and challenges in research on agents and the new digital and knowledge economy. It includes papers on business- process management, agent-based modeling and simulation, and anthropic-oriented computing, which were originally presented at the 13th International KES Conference on Agents and Multi-Agent Systems – Technologies and Applications (KES-AMSTA 2019) held June 17–19, 2019 at St George’s Bay, St. Meer
The book gathers selected papers presented at the KES International Symposium on Smart Transportation Systems (KES-STS 2019). Modern transportation systems have undergone a rapid transformation in recent years. Meer
Die "Technische Informatik" - ein Teilgebiet der Informatik - beschreibt die Funktions weise von programmgesteuerten digitalen Rechnern (kurz: Computern) und von anderen datenverarbeitenden Maschinen. Meer
Studierende, die ein Informatikstudium aufnehmen, brauchen zu Beginn vor allem eines: mathematische Grundkenntnisse. Dieser Crashkurs soll Studierenden im ersten Semester helfen, möglichst rechtzeitig diese Fähigkeiten zu erwerben. Meer
Das Buch behandelt die wesentlichen Konzepte der parallelen Programmierung, d. h. der Entwicklung nebenläufiger Systeme. Es orientiert sich dabei am Thread-Konzept der Programmiersprache Java. Meer
Dieses reich bebilderte Sachbuch bietet Ihnen einen einfachen, aber fundierten Einstieg in das Gebiet der Informatik und erklärt Schritt für Schritt, wie Computer und Internet funktionieren. Meer
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021. Meer
Getting Started for Internet of Things with Launch Pad and ESP8266 provides a platform to get started with the Ti launch pad and IoT modules for Internet of Things applications. Meer
Almost all the systems in our world, including technical, social, economic, and environmental systems, are becoming interconnected and increasingly complex, and as such they are vulnerable to various risks. Meer
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Meer
The emergence of huge amounts of data which require analysis and in some cases real-time processing has forced exploration into fast algorithms for handling very lage data sizes. Meer
Cloud Computing and Big Data technologies have become the new descriptors of the digital age. The global amount of digital data has increased more than nine times in volume in just five years and by 2030 its volume may reach a staggering 65 trillion gigabytes. Meer
The book discusses the activities involved in developing an Enterprise Continuity Program (ECP) that will cover both Business Continuity Management (BCM) as well as Disaster Recovery Management (DRM). Meer
Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. Meer
Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of security architecture a difficult proposition. Meer
This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books