Das Buch behandelt praxisbezogene Methoden zur Analyse und Steuerung operationaler IT-Risiken entsprechend der Anforderungen im Gesetz zur Kontrolle und Transparenz im Unternehmensbereich (KonTraG). Meer
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Meer
This monograph is devoted to theoretical and experimental study of partial reductsandpartialdecisionrulesonthebasisofthestudyofpartialcovers. The use of partial (approximate) reducts and decision rules instead of exact ones allowsustoobtainmorecompactdescriptionofknowledgecontainedindecision tables,andtodesignmorepreciseclassi? Meer
This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Critical Information Infrastructures Security, CRITIS 2006, held on Samos Island, Greece in August/September 2006 in conjunction with ISC 2006, the 9th International Information Security Conference. Meer
This book constitutes the reviewed proceedings of the Second International Workshop on Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2006, held in Venice, Italy in July 2006, in association with ICALP 2006. Meer
This book constitutes the thoroughly refereed extended post-proceedings of the 7th International Workshop on Membrane Computing, WMC 2006, held in Leiden, Netherlands in July 2006. Meer
The fourth edition of the European Conference on Model-Driven Architecture – Foundations and Applications (ECMDA-FA 2008) was dedicated to furthering the state of knowledge and fostering the industrialization of the model-driven architecture (MDA) methodology. Meer
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. Meer
A Step Towards Verified Software Worries about the reliability of software are as old as software itself; techniques for allaying these worries predate even James King’s 1969 thesis on “A program verifier. Meer
These two-volume books comprise the post-conference proceedings of the 14th International Conference on Neural Information Processing (ICONIP 2007) held in Kitakyushu, Japan, during November 13–16, 2007. Meer
The two volume set LNCS 4984 and LNCS 4985 constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Neural Information Processing, ICONIP 2007, held in Kitakyushu, Japan, in November 2007, jointly with BRAINIT 2007, the 4th International Conference on Brain-Inspired Information Technology. Meer
This book constitutes the refereed proceedings of the 15th International Symposium on Static Analysis, SAS 2008, held in Valencia, Spain in July 2008 - co-located with LOPSTR 2008, the International Symposium on Logic-based Program Synthesis and Transformation, PPDP 2008, the International ACM SIGPLAN Symposium on Principles and Practice of Declarative Programming, and PLID 2008, the International Workshop on Programming Language Interference and Dependence. Meer
The book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing in Sensor Systems, DCOSS 2008, held on Santorini Island, Greece, in June 2008. Meer
This book constitutes the thoroughly refereed post-proceedings of the Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2006, held in Hamburg, Germany in September 2006 in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). Meer
This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Implementation and Applications of Functional Languages, IFL 2005, held in Dublin, Ireland in September 2005. Meer
This book constitutes the major results of the EU COST (European Cooperation in the field of Scientific and Technical Research) Action 274: TARSKI - Theory and Applications of Relational Structures as Knowledge Instruments - running from July 2002 to June 2005. Meer
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held in San Francisco, CA, USA in February 2007. Meer
This book constitutes the thoroughly refereed post-proceedings of the 18th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2005, held in Hawthorne, NY, USA in October 2005. Meer
Ajax machte das Web zu einer Plattform für Anwendungssoftware und verfügt über ein eindrucksvolles Potenzial. Dieses Buch bietet einen gründlichen und verständlichen Einstieg in die Technologie. Meer
The Ada 2005 Reference Manual combines the International Standard ISO/IEC 8652/1995(E) for the programming language Ada with the corrections of the Technical Corrigendum 1 approved by ISO in February 2001 and with the Amendment 1 expected to be approved by ISO in late 2006 or early 2007. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books