High Performance Deformable Image Registration Algorithms for Manycore Processors develops highly data-parallel image registration algorithms suitable for use on modern multi-core architectures, including graphics processing units (GPUs). Meer
This new and completely updated edition is a comprehensive, easy-to-read, "how-to" guide on user research methods. You'll learn about many distinct user research methods and also pre- and post-method considerations such as recruiting, facilitating activities or moderating, negotiating with product developments teams/customers, and getting your results incorporated into the product. Meer
Process Modeling Style focuses on other aspects of process modeling beyond notation that are very important to practitioners. Many people who model processes focus on the specific notation used to create their drawings. Meer
Systems Programming: Designing and Developing Distributed Applications explains how the development of distributed applications depends on a foundational understanding of the relationship among operating systems, networking, distributed systems, and programming. Meer
The emerging field of network science represents a new style of research that can unify such traditionally-diverse fields as sociology, economics, physics, biology, and computer science. Meer
Application Performance Management (APM) in the Digital Enterprise enables IT professionals to be more successful in managing their company’s applications. Meer
"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. Meer
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. Meer
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. Meer
Advances in Computers, an ongoing series since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. Meer
Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Meer
Topological UML Modeling: An Improved Approach for Domain Modeling and Software Development presents a specification for Topological UML® that combines the formalism of the Topological Functioning Model (TFM) mathematical topology with a specified software analysis and design method. Meer
Meta-Analytics: Consensus Approaches and System Patterns for Data Analysis presents an exhaustive set of patterns for data science to use on any machine learning based data analysis task. Meer
*Textbook and Academic Authors Association (TAA) Textbook Excellence Award Winner, 2024*
Measuring the User Experience: Collecting, Analyzing, and Presenting UX Metrics, Third Edition provides the quantitative analysis training that students and professionals need. Meer
Nature-inspired computation and swarm intelligence have become popular and effective tools for solving problems in optimization, computational intelligence, soft computing and data science. Meer
Intelligent Systems and Learning Data Analytics in Online Education provides novel artificial intelligence (AI) and analytics-based methods to improve online teaching and learning. Meer
Adversarial Robustness for Machine Learning summarizes the recent progress on this topic and introduces popular algorithms on adversarial attack, defense and verification. Meer
Designed for undergraduate/graduate-level parallel programming courses.
This nontheoretical, highly accessible text—which is linked to real parallel programming software—covers the techniques of parallel programming in a practical manner that enables students to write and evaluate their parallel programs. Meer
Much has changed since the first edition of human–computer interaction was published. Ubiquitous computing and rich sensor-filled environments are finding their way out of the laboratory, not just into movies but also into our workplaces and homes. Meer
Tony Gaddis’s accessible, step-by-step presentation helps beginning students understand the important details necessary to become skilled programmers at an introductory level. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books