The topic of this book is very hot area of research and the editors of this book are anticipated to have a wide distribution of this book among undergraduate/postgraduate, researchers, scientists, and some industrial sectors working in Security Engineering for embedded and Cyber-Physical Systems. Meer
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in the industry. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of cloud computing, followed by critical aspects of cloud security. Meer
Computer vision is an effective solution in a range of real-life applications. With the advent of the machine and deep learning paradigms, this book adopts machine and deep learning algorithms to leverage digital image processing for designing accurate biometrical applications. Meer
In the 5G era, edge computing and new ecosystems of mobile microservices enable new business models, strategies, and competitive advantage. Focusing on microservices, this book introduces the essential concepts, technologies, and trade-offs in the edge computing architectural stack, providing for widespread adoption and dissemination. Meer
Discusses the legal, ethical, and societal implications of information technology.
Covers important topics including infringement of intellectual property, security risks, Internet crime, and social networking. Meer
Project Management for Healthcare, Second Edition covers the significant changes in both the direction of healthcare and the direction of project management. Meer
This co-edited volume examines the history, policies, economics and various regulations of digitalisation in Turkey. Covering all the relevant aspects of digitalisation, this book will be of interest to academics and students, particularly to those with an interest in innovation, economics of digitalization, policy and regulation. Meer
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. Meer
Mathematical Foundations of Computer Science introduces students to the discrete mathematics needed later in their Computer Science coursework with theory of computation topics interleaved throughout. Meer
Mathematical Foundations of Computer Science introduces students to the discrete mathematics needed later in their Computer Science coursework with theory of computation topics interleaved throughout. Meer
Written from a programmer’s point of view, this book covers the three key aspects of architecture: processors, physical and virtual memories, and input-output (I/O) systems. Meer
A key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as “Digital Forensics”. Meer
This book presents a fresh perspective on combating cybercrime, showcasing innovative solutions from experts across various fields. With the integration of artificial intelligence (AI), contemporary challenges are addressed with state-of-the-art strategies. Meer
This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses. Meer
"Secure Health confronts these challenges head-on, offering a comprehensive exploration of the latest advancements and best practices in securing digital health systems. Meer
In an era defined by rapid digital transformation, "Agile Security in the Digital Era: Challenges and Cybersecurity Trends" emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape. Meer
The core of this book is its ability to adapt to the evolving nature of web security threats. It prepares the reader not just for the challenges of today but also for the unforeseen complexities of the future. Meer
This volume explores changing notions of the archive in different areas, to trace the ways in which the archive has continued to be used in history. It examines how history, the historian, and the archive interact in many ways to look at the past and record it. Meer
Decision support systems are developed for integrated pest and disease management and nutrition management using open-source technologies as java, android, and low-cost hardware devices like Arduino micro controller. Meer
This book brings together the knowledge and perspectives of numerous games industry leaders and practitioners to show how leadership operates in a game development studio. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books