The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. Meer
92,14
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Whether you are brand new to data mining or working on your tenth predictive analytics project, Commercial Data Mining will be there for you as an accessible reference outlining the entire process and related themes. Meer
53,74
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Meer
64,54
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
FTTX Networks: Technology Implementation and Operation provides an in-depth treatment of the technology and implementation of FTTX networks, discusses the environment that gave rise to FTTX, provides a survey of the available FTTX technologies, and gives users the state-of-the-art knowledge needed for successful deployment of FTTX. Meer
83,74
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Interaction Flow Modeling Language describes how to apply model-driven techniques to the problem of designing the front end of software applications, i. Meer
56,14
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset—its proprietary information—safe from cyber and physical compromise. Meer
52,54
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Improving the User Experience through Practical Data Analytics shows you how to make UX design decisions based on data—not hunches. Authors Fritz and Berger help the UX professional recognize the enormous potential of user data that is collected as a natural by-product of routine UX research methods, including moderated usability tests, unmoderated usability tests, surveys, and contextual inquiries. Meer
44,14
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Emotions, Technology, and Social Media discusses the ways the social media sphere uses emotion and technology, and how each of these has become part of the digital culture. Meer
56,14
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
In plain, uncomplicated language, and using detailed examples to explain the key concepts, models, and algorithms in vertical search ranking, Relevance Ranking for Vertical Search Engines teaches readers how to manipulate ranking algorithms to achieve better results in real-world applications. Meer
59,74
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Assuming no prior background in linear algebra or real analysis, An Introduction to MATLAB® Programming and Numerical Methods for Engineers enables you to develop good computational problem solving techniques through the use of numerical methods and the MATLAB® programming environment. Meer
84,94
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. Meer
29,74
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE explains how to apply the complex MARTE standard in practical situations. This approachable reference provides a handy user guide, illustrating with numerous examples how you can use MARTE to design and develop real-time and embedded systems and software. Meer
59,74
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. Meer
42,94
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker. Meer
56,14
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. Meer
53,74
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). Meer
56,14
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
The WWW era made billions of people dramatically dependent on the progress of data technologies, out of which Internet search and Big Data are arguably the most notable. Meer
29,74
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. Meer
46,54
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. Meer
95,74
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
This in-depth, detailed reference presents for the first time a comprehensive treatment of recent advances in optical performance monitoring. Written by leading experts in the field, the book provides an overview of recent developments in the area and the role of OPM in future optical systems and networks. Meer
142,60
Verwachte levertijd ongeveer 9 werkdagen | Gratis verzonden
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books