Yogurt in Health and Disease Prevention examines the mechanisms by which yogurt, an important source of micro- and macronutrients, impacts human nutrition, overall health, and disease. Meer
The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Meer
Extreme Hydroclimatic Events and Multivariate Hazards in a Changing Environment: A Remote Sensing Approach reviews multivariate hazards in a non-stationary environment, covering both short and long-term predictions from earth observations, along with long-term climate dynamics and models. Meer
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Meer
€ 89,04
Levertijd ongeveer 11 werkdagen | Gratis verzonden
Digital Participation through Social Living Labs connects two largely separate debates: On the one hand, high speed internet access and associated technologies are often heralded as a means to bring about not only connectivity, but also innovation, economic development, new jobs, and regional prosperity. Meer
Managing the Multigenerational Librarian Workforce examines how libraries are undergoing a massive shift in their workforce. As baby boomers retire, an influx of Gen Y and millennials has taken their place. Meer
This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Meer
SQL is a solid guide and reference to the key elements of SQL and how to use it effectively. Developed by authors who needed a good resource for students in their database class, this is an ideal supplement for database courses — no matter what main text you use or what flavor of SQL is required. Meer
This comprehensive and state-of-the art approach to video processing gives engineers and students a comprehensive introduction and includes full coverage of key applications: wireless video, video networks, video indexing and retrieval and use of video in speech processing. Meer
The Intelligent Systems Series publishes reference works and handbooks in three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. Meer
Financial markets are witnessing an unprecedented explosion in the availability of data, and the firms that survive will be able to leverage this information to increase their profit and expand their opportunities in a global world. Meer
Global UX: Design and Research in a Connected World discusses how user experience (UX) practice is changing and how practitioners and teams around the world are creating great user experiences for a global context. Meer
This series, since its first volume in 1960 and now the oldest series still being published, covers new developments in computer technology. Each volume contains from 5 to 7 chapters and 3 volumes are produced annually. Meer
Software Quality Assurance in Large Scale and Complex Software-intensive Systems presents novel and high-quality research related approaches that relate the quality of software architecture to system requirements, system architecture and enterprise-architecture, or software testing. Meer
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. Meer
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. Meer
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. Meer
mmWave Massive MIMO: A Paradigm for 5G is the first book of its kind to hinge together related discussions on mmWave and Massive MIMO under the umbrella of 5G networks. Meer
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books