A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Meer
SD-WAN is an advanced networking approach that creates hybrid networks to integrate broadband or other network services into the corporate WAN, not only just handling general business workloads and traffic, but also being capable of maintaining the performance and security of real-time and sensitive applications. Meer
Performance Analysis of Queuing and Computer Networks develops simple models and analytical methods from first principles to evaluate performance metrics of various configurations of computer systems and networks. Meer
Project Management for Healthcare, Second Edition covers the significant changes in both the direction of healthcare and the direction of project management. Meer
Uses a modular structure, oriented to solve several small-sized cybersecurity problems, each workable in about two weeks with a hands-on approach Evolves from the experience of educating students for more than ten years, following the same principle Includes tutorial work that guides students through a development model aiming to stimulate specific education for non-functional requirements implementation Integrates well-known multimedia resources aiming to explain background concepts and to familiarize students with technological tools. Meer
IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. Meer
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. Meer
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. Meer
Digital technology plays an important role in the everyday lives of people. New types of ‘digital sports’, (sport) gaming, exergaming, cybersport and eSports increase in popularity all over the world and are even challenging the modern and hegemonic concept of sport. Meer
"The unique thing about Fit for Developing Software is the way it addresses the interface between customers/testers/analysts and programmers. All will find something in the book about how others wish to be effectively communicated with. Meer
"A superb summary of the main Web technologies. It is broad and deep, giving you enough detail to get real work done. Eminently readable with excellent examples and touches of humour. Meer
Post-Quantum Cryptography Algorithms and Approaches for IoT and Blockchain Security, Volume 138 the latest release in the Advances in Computers series, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books