This practical book introduces open-source intelligence (OSINT) and explores how it can be executed in different intelligence scenarios. It covers varying supporting topics, such as online tracking techniques, privacy best practices for OSINT researchers, and practical examples of OSINT investigations. Meer
This book provides an overview of the next generation Internet of Things (IoT), ranging from research, innovation, development priorities, to enabling technologies in a global context. Meer
There are numerous publications which introduce and discuss the Internet of Things (IoT). In the midst of these, this work has several unique characteristics which should change the reader’s perspective, and in particular, provide a more profound understanding of the impact of the IoT on society. Meer
To be effective, data-intensive systems require extensive ongoing customisation to reflect changing user requirements, organisational policies, and the structure and interpretation of the data they hold. Meer
The emergence of huge amounts of data which require analysis and in some cases real-time processing has forced exploration into fast algorithms for handling very lage data sizes. Meer
Cyber-physical systems are the natural extension of the so-called “Internet of Things”. They are “systems of collaborating computational elements controlling physical entities”. Meer
Text analytics consist of the statistics about a text element, which includes the word count, the word histogram, and the word frequency histogram. Most text documents of value are related to other—sometimes many other—documents, and so analytics describing the relative frequency of terms in a document compared to its peers are important for defining key words (tagging, labeling, indexing), search-responsive terms (query terms), and compressed versions of the documents (key words, summary, etc. Meer
Starting with the historical facts behind the concept of information, which led to the creation of computer networks, Internet of things and cryptocurrencies, the book then arrives at the main definitions of cryptography and network security, the protocols that keep the systems running and the cybercrimes that could disrupt the systems. Meer
Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. Meer
Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of security architecture a difficult proposition. Meer
While the JPEG image standard was developed more than 25 years ago, it is still dominant in terms of image formation, manipulation and transmission over the internet and other media. Meer
5G, the emerging technology in mobile communication, is expected to deliver an important and decisive impact on several of the UN’s Sustainable Development Goals where universal accessibility to ICTs remains a serious concern. Meer
The proclivity of today’s technology to think like humans may be seen in new developing disciplines such as neural computing, fuzzy logic, evolutionary computation, machine learning, and probabilistic reasoning. Meer
This book is devoted to a new branch of experimental design theory called simulation experimental design. There are many books devoted either to the theory of experimental design or to system simulation techniques, but in this book an approach to combine both fields is developed. Meer
Almost all the systems in our world, including technical, social, economic, and environmental systems, are becoming interconnected and increasingly complex, and as such they are vulnerable to various risks. Meer
A non-technical introduction to the question of modeling with time-varying parameters, using the beta coefficient from Financial Economics as the main example. Meer
Systems, cybernetics, control, and automation (SCCA)are four interrelated and overlapping scientific and technological fields that have contributed substantially to the development, growth, and progress of human society. Meer
Marcus Contextual Grammars is the first monograph to present a class of grammars introduced about three decades ago, based on the fundamental linguistic phenomenon of strings-contexts interplay (selection). Meer
Hypertext/hypermedia systems and user-model-based adaptive systems in the areas of learning and information retrieval have for a long time been considered as two mutually exclusive approaches to information access. Meer
One of the most natural representations for modelling spatial objects in computers is discrete representations in the form of a 2D square raster and a 3D cubic grid, since these are naturally obtained by segmenting sensor images. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books