Mathematical optimization is used in nearly all computer graphics applications, from computer vision to animation. This book teaches readers the core set of techniques that every computer graphics professional should understand in order to envision and expand the boundaries of what is possible in their work. Meer
Heterogeneous Computing with OpenCL 2.0 teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs). Meer
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today’s high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Meer
Emerging Trends in Image Processing, Computer Vision, and Pattern Recognition discusses the latest in trends in imaging science which at its core consists of three intertwined computer science fields, namely: Image Processing, Computer Vision, and Pattern Recognition. Meer
Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. Meer
Pervasive Computing: Next Generation Platforms for Intelligent Data Collection presents current advances and state-of-the-art work on methods, techniques, and algorithms designed to support pervasive collection of data under ubiquitous networks of devices able to intelligently collaborate towards common goals. Meer
Application Performance Management (APM) in the Digital Enterprise enables IT professionals to be more successful in managing their company’s applications. Meer
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. Meer
Topological UML Modeling: An Improved Approach for Domain Modeling and Software Development presents a specification for Topological UML® that combines the formalism of the Topological Functioning Model (TFM) mathematical topology with a specified software analysis and design method. Meer
The Physics of Computing gives a foundational view of the physical principles underlying computers. Performance, power, thermal behavior, and reliability are all harder and harder to achieve as transistors shrink to nanometer scales. Meer
OCUP 2 Certification Guide: Preparing for the OMG Certified UML 2.5 Professional 2 Foundation Exam both teaches UML® 2.5 and prepares candidates to become certified. Meer
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. Meer
Social Network Analytics: Computational Research Methods and Techniques focuses on various technical concepts and aspects of social network analysis. The book features the latest developments and findings in this emerging area of research. Meer
Understanding Virtual Reality: Interface, Application, and Design, Second Edition arrives at a time when the technologies behind virtual reality have advanced dramatically. Meer
Trends in Deep Learning Methodologies: Algorithms, Applications, and Systems covers deep learning approaches such as neural networks, deep belief networks, recurrent neural networks, convolutional neural networks, deep auto-encoder, and deep generative networks, which have emerged as powerful computational models. Meer
The ultimate, task-oriented guide to administering Windows 2000! Manage Windows 2000 for maximum performance, reliability, and efficiency! Task-oriented solutions from leading enterprise administrators Active Directory: planning, deployment, and management Secure your Windows 2000 networks, clients, and data Migrate DNS, DHCP, and WINS to Windows 2000 Save money! Meer
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. Meer
For an introductory, one-semester course in Usability Engineering.
Written in an accessible, conversational style, this comprehensive introduction is crafted to support a project-based course emphasizing the development process. Meer
Brilliant Office 2007
What you need to know and how to do it
When you're working on your PC and come up against a problem that you're unsure how to solve or want to accomplish something in application that you aren’t sure how to do, where do you look ? Meer
Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, Second Edition takes an interdisciplinary approach to applying principles for efficient implementation of network devices, offering solutions to the problem of network implementation bottlenecks. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books