Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Information Science and Applications (eBook)

Kuinam J. Kim (Herausgeber)

eBook Download: PDF
2015 | 2015
XVIII, 1112 Seiten
Springer Berlin (Verlag)
978-3-662-46578-3 (ISBN)

Lese- und Medienproben

Information Science and Applications -
Systemvoraussetzungen
213,99 inkl. MwSt
(CHF 208,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This proceedings volume provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology.  It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology.   The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques.  Through this volume, readers will gain an understanding of the current state-of-the-art in information strategies and technologies of convergence security.

The intended readership are researchers in academia, industry, and other research institutes focusing on information science and technology. 



Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association.

His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance,  information and convergence security. He has published extensively in these areas and  received several Journals and conferences best paper awards. 

He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is  Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE).

Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Convergence IT Security. He is currently on the advisory editorial board of the Convergence Security Journal. He is President of Korea Industry Security Forum and Korea Convergence Security Association.His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance,  information and convergence security. He has published extensively in these areas and  received several Journals and conferences best paper awards. He received B.S in Mathematics from the University of Kansas www.ku.edu. His Ph.D in Industrial Engineering from Colorado State University was earned in 1994. He is  Executive General Chair of the Institute of Creative and Advanced Technology, Science, Engineering (ICATSE).

Part 1.QoS-aware Mapping and Scheduling for Integrated CWDM-PON and WiMAX Network; Siti Hasunah Mohammad, Nadiatulhuda Zulkifli, Sevia Mahdaliza Idrus.Resource Management Scheme Based on Position and Direction for Handoff Control in Micro/Pico -Cellular Networks; Dong Chun Lee, Kuinam J. Kim, Jong Chan Lee.A Pilot Study of Embedding Android Apps with Arduino for Monitoring Rehabilitation Process; Safyzan Salim, Wan Nurshazwani Wan Zakaria, Muhammad Mahadi Abdul Jamil.A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network; NDIBANJE Bruce, Young Jin Kang, Hyeong Rag Kim, Su Hyun Park, Hoon Jae Lee.A Noninvasive Sensor System for Discriminating Mobility Pattern on a Bed; Seung Ho Cho, Seokhyang Cho.A Fault-Tolerant Multi-Path Multi-Channel Routing Protocol for Cognitive Radio Ad Hoc Networks; Zamree Che-aron, Aisha Hassan Abdalla, Khaizuran Abdullah, Wan Haslina Hassan, Md. Arafatur Rahman.Study of Sound and Haptic Feedback in Smart Wearable Devices to Improve Driving Performance of Elders; Chularas Natpratan, Nagul Cooharojananone.Indoor WIFI localization on embedded systems; Anya Apavatjrut, Ekkawit Boonyasiwapong.Bacterial Foraging-based Power Allocation for Cooperative Wireless Sensor Networks; Mohammad Abdul Azim, Zeyar Aung, Mario E. Rivero-Angeles.Part 2.Maintaining a trajectory data warehouse under schema changes with the mobile agent view adaptation technique; Wided Oueslati, Jalel akaichi.Traffic Analysis in Concurrent Multi-Channel Viewing on P2PTV; Koki Mizutani, Takumi Miyoshi, Olivier Fourmaux.Evaluation Method of MANET over Next Generation Optical Wireless Access Network; Muhammad Adam Wong, Nadiatulhuda Zulkifli, Sevia Idrus, Mohamed Elshaikh SAID AHMED.A Feedback Mechanism Based on Randomly Suppressed Timer for ForCES Protocol; Lijie Cen, Chuanhuang Li, Weiming Wang.Operational Analysis of Arrival Rate-based Queuing Management Mechanism for High-speed Networks; Mohammed M. Kadhum, Selvakumar Manickam.E-Government project enquiry framework for a continuous improvement process, A case study in Malaysia and Comoros; Said Abdou Mfoihaya, Mokhtar Mohd Yusof.Objective Non-intrusive Conversational VoIP Quality Prediction using Data mining methods; Sake Valaisathien, Vajirasak Vanijja.A Hybrid Incentive-based Peer Selection Scheme for Unstructured Peer-to-peer Media Streaming Systems; Victor II Romero, Cedric Angelo Festin.A transmission method to improve quality of multimedia in Hybrid Broadcast/ Mobile Networks; Hyung-Yoon Seo, Byungjun Bae, Jong-Deok Kim.HyunJin Kim.Revised P2P Data Sharing Scheme over Distributed Cloud Networks; Wonhyuk Lee, TaeYeon Kim, Seungae Kang, HyunCheol Kim.LQDV Routing Protocol Implementation Design in Arduino Platform and Xbee module; SY KHANH HO, Myung Kyun Kim.A Virtualization and Management Architecture of Micro-Datacenter; Byungyeon Park, Wonhyuk Lee, TaeYeon Kim, HyunCheol Kim.Multi-disjoint Routes Mechanism for Source Routing in Mobile Ad-hoc Networks; Baidaa Hamza Khudayer, Mohammed M Kadhum, Tat Chee Wan.Passive Network Monitoring using REAMS;  Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel.Low Latency Video Transmission Device; Chanho Park, Hagyoung Kim.Part 3.Comparative Investigation of Biomedical Contents using Desktop and Tabletop Technologies; Tahir Mustafa Madni Ikram, Yunus B Nayan, Suziah Bt Sulaiman, Muhammad Tahir.Dynamic-Time-Warping Analysis of Feature-Vector Reliability for Cognitive Stimulation Therapy Assessment; Tuan Pham.An Algorithm for Rock Pore Image Segmentation; Zhang Jiqun, Hu Chungjin, Liu Xin, He Dongmei, Li Hua.Action Recognition by Extracting Pyramidal Motion Features from Skeleton Sequences; Guoliang LU, Yiqi ZHOU, Xueyong LI, Chen LV.P-PCC: Parallel Pearson Correlation Condition for Robust Cosmetic Makeup Face Recognitions; Kanokmon Rujirakul, Chakchai So-In.Flight Simulator for Serious Gaming; Aruni Nisansala, Maheshya Weerasinghe, Kapila Dias, Damitha Sandaruwan, Chamath Keppitiyagama, Nihal Kodikara, Chamal Perera, Prabhath Samarasinghe.Potential Z-Fighting Conflict Detection System in 3D Level Design Tools; Pisal Setthawong.Efficient Motion Vector Algorithms for Faster Implementation of HEVC/H.265 Video Coding; Edward Jaja, Zaid Omar, Ab Al-Hadi  Ab Rahman, Mun'im Zabidi.A Synthesis of 2D Mammographic Image Using Super-Resolution Technique: A Phantom Study; Surangkana Kantharak, Thanarat H. Chalidabhongse, Jenjeera Prueksadee.Using complex events to represent domain concepts in graphs; Riley Tipton Perry, Cat Kutay, Fethi Rabhi.Unequal Loss Protection Mechanism for Wi-Fi based Broadcasting system using a Video Quality Prediction Model; Dong Hyun Kim, Hyeong Yun Seo, Byungjun Bae, Jong Deok Kim.An Approximate Matching Preprocessing for Efficient Phase-Only Correlation-Based Image Retrieval; Honghang Wang, Masayoshi Aritsugi.Pixel Art Color Palette Synthesis; Ming-Rong Huang, Ruen-Rone Lee.Introducing a New Radiation Detecting Device Calibration Method and Estimating 3D Distance to Radiation Sources; Pathum Rathnayaka, Seung-Hae Baek, Soon-Yong Park.Integrating Feature Descriptors to Scanpath-based Decoding of Deformed Barcode Images; Poonna Yospanya, Yachai Limpiyakorn.Detecting and extracting text in video via sparse representation based classification method; Bo Sun, Yang Wu, Yongkang Xiao, Jun. Part 4.A Cost Model for Client-Side CaaS; Chaturong Sriwiroj, Thepparit Banditwattanawong.A Reliability Analysis of Cascaded TMR Systems; Hyun Joo Yi, Tae-Sun Chung, Sungsoo Kim.Availability Analysis for A Data Center Cooling System with (n,k)-way CRACs; Sohyun Koo, Tae-Sun Chung, Sungsoo Kim.A Recovery Model for Improving Reliability of PCM WL-Reviver System; Taehoon Roh, Tae-Sun Chung, Sungsoo Kim.Real-time Sitting Posture Monitoring System for Functional Scoliosis Patients; Ji-Yong Jung, Soo-Kyung Bok, Bong-Ok Kim, Yonggwan Won, Jung-Ja Kim.Part 5.Decreasing Size of Parameter for Computing Greatest Common Divisor to Speed up New Factorization Algorithm Based on Pollard Rho; Kritsanapong Somsuk.Network Security Situation Assessment: A Review and Discussion; Yu Beng Leau, Selvakumar Manickam.Protecting Binary Files from Stack-Based Buffer Overflow; Sahel Alouneh, Heba Bsoul, Mazen Kharbutli.Meet-in-the-middle Attack with Splice-and-Cut Technique on the 19-round Variant of Block Cipher HIGHT; Yasutaka Igarashi, Ryutaro Sueyoshi, Toshinobu Kaneko, Takayasu Fuchida.Nonintrusive SSL/TLS Proxy with JSON-Based Policy; Suhairi Mohd Jawi, Fakariah Hani Mohd Ali , Nurul Huda Nik Zulkipli.Secure Problem Solving Scheme by Encrypted Computing; Hiroshi Yamaguchi, Phillip Sheu, Shigeo Tsujii.Anomaly Detection from Log Files Using Data Mining Techniques; Jakub Breier, Jana Branisova.Improved Remote User Trust Evaluation Scheme to apply to Social Network Services; Youngwoong Kim, Younsung Choi, Dongho Won.Threat assessment model for mobile malware; Thanh van Do, Fredrik B. Lyche, Jørgen Lytskjod, Van Thuan Do.Performance Evaluation of System Resources Utilization with Sandboxing Applications; Tarek Helmy, Ismail Keshta, Abdallah Rashed.Fault Attacks by using Voltage and Temperature Variations: An Investigation and Analysis of Experimental Environment; Young Sil Lee, Non Thiranant, HyeongRag Kim, JungBok Jo, HoonJae Lee.Pseudoinverse Matrix over Finite Field and Its Applications; Van Dang, Thuc Nguyen.Multi-Agent based Framework for Time-correlated Alert Detection of Volume Attacks; Abimbola Olabelurin, Georgios Kallos, Suresh Veluru, Muttukrishnan Rajarajan.Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis; HyunHo Kim, Bruce Ndibanje, HoonJae Lee, YongJe Choi, Dooho Choi.Exploring Bad Behaviors from Email Logs; Supachai Kanchanapokin, Sirapat Boonkrong.Using PKI to Provide Credential Delegation in non-Web-based Federations; Daniel Kouril, Marcel Poul, Michal Prochazka.Modeling and Simulation of Identification Protocol for Wireless Medical Devices in Healthcare System Communication; Hyun Ho Kim, Bruce Ndibanje, Hyun Su Park, JungBok Jo, Hoon Jae Lee.A Method for Web Security Context Patterns Development from User Interface Guidelines based on Structural and Textual Analysis; Pattariya Singpant, Nakornthip Prompoon.A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography; Mohammed Salem Atoum.Review of Digital Investigation Frameworks; Ritu Agarwal, Suvarna Kothari.Part 6.Knowledge Discovery in Dynamic Data Using Neural Networks; Data Mining for Industrial System Identification: A Turning Process; Karin Kandananond.Investigating the Effectiveness of E-mail Spam Image Data for Phone Spam Image Detection using Scale Invariant Feature Transform Image Descriptor; So Yeon Kim, Kyung-Ah Sohn.Features extraction for classification of focal and non-focal EEG signals; Khushnandan Rai, Varun Bajaj, Anil Kumar.Relations on Intuitionistic Fuzzy Soft Multi Sets; Anjan Mukherjee, Ajoy Das.Towards Automatically Retrieving Discoveries and Generating Ontologies; Kenneth Cosh.Improving process models discovery using AXOR Clustering Algorithm; Hanane Ariouat, Kamel Barkaoui, Jacky Akoka.Simple approaches of sentiment analysis via ensemble learning; Tawunrat Chalothorn, Jeremy Ellman.Effective Trajectory Similarity Measure for Moving Objects in Real-world Scene; Moonsoo Ra, Chiawei Lim, Yong Ho Song, Jechang Jung, Whoi-Yul Kim.A Prediction of Engineering Students Performance from Core Engineering Course using Classification; Nachirat Rachburee, Wattana Punlumjeak, Sitti Rugtanom, Deachrut Jaithavil, Manoch Pracha.Evolutionary Circular-ELM for the reduced-reference assessment of perceived image quality; Sarutte Atsawaraungsuk, Punyaphol Horata.Enhanced Web page Cleaning for Constructing Social Media Text Corpora; Melanie Neunerdt, Eva Reimer, Michael Reyer, Rudolf Mathar.Finding Knee Solutions in Multi-objective Optimization using Extended Angle Dominance Approach; Sufian Sudeng, Naruemon Wattanapongsakorn.Affective Learning Analysis of Children in a Card Sorting Game; Marini Othman, Abdul Wahab Abdul Rahman, Abdul Qayoom Hamal, Mohd Syarqawy Hamzah, Muhamad Sadry Abu Seman.Application of Mean and Median Frequency Methods for Identification of Human Joint Angles Using EMG Signal; Sirinee Thongpanja, Angkoon Phinyomark, Chusak Limsakul, Pornchai Phukpattaranont.A study of Big Data solution using Hadoop to process Connected vehicle's Diagnostics data; Lionel Nkenyereye, Jong-Wook Jang.Wiki SaGa: an Interactive Timeline to Visualize Historical Documents; Daniel Tan, Balisoamanandray Ranaivo-Malancon, Narayanan Kulathuramaiyer.Discovering genomic associations on cancer datasets by applying sparse regression methods; Reddy Rani Vangimalla, KyungAh Sohn.The Adaptive Dynamic Clustering of Neuro-Fuzzy System for Classification; Phichit Napook, Narissara Eiamkanitchat.A Hybrid Approach of Neural Network and Level-2 Fuzzy set; Jirawat Teyakome, Narissara Eiamkanitchat.Developing Term Weighting Scheme based on  Term Occurrence Ratio for Sentiment Analysis; Nivet Chirawichitchai.A Comparison of Artificial Neural Network and Regression Model for Predicting the Rice Production in Lower Northern Thailand; Anamai Na-udom, Jaratsri Rungrattanaubol.Study on Local Path Planning for Collision Avoidance in Vehicle-to-Vehicle Communication Environment; Gyoung-eun Kim, Byeong-woo Kim.Vehicle Position Estimation using Tire Model; Jae-woo Yoon, Byeong-woo Kim.I know when you are happy - Emotion Detection; Abhishek Singh Kilak, Namita Mittal.Interconnection Learning between Economic Indicators in Indonesia Optimized by Genetic Algorithm; Siti Saadah, Gia Septiana Wulandari.Classification Prediction of the Foot Disease Pattern Using Decision Tree Model; Jung-Kyu Choi, Yonggwan Won, Jung-Ja Kim.Non-Preference Based Pruning Algorithm for Multi-Objective Redundancy Allocation Problem; Tipwimol Sooktip, Naruemon Wattanapongsakorn, Sanan Srakaew.A Combined AdaBoost and NEWFM Technique for Medical Data Classification; Khaled A. Abuhasel, Abdullah M. Iliyasu, Chastine Fatichah.On sentence length distribution as an authorship attribute; Miro Lehtonen.Learning models for activity recognition in smart homes; Labiba Gillani Fahad, Arshad Ali, Muttukrishnan Rajarajan.Tackling Class Imbalance Problem in Binary Classification using Augmented Neighborhood Cleaning Algorithm; Nadyah Obaid Al Abdouli, Zeyar Aung, Wei Lee Woon, Davor Svetinovic.Part 7.Software Effective Risk Management: An Evaluation of Risk Management Process Models and Standards; Jafreezal Jaafar, Uzair Iqbal Janjua, Fong Woon Lai.Validating Reusability of Software Projects using Object-Oriented Design Metrics; Zhamri Che Ani, Shuib Basri, Aliza Sarlan.Plasticine Scrum: An Alternative Solution for Simulating Scrum Software Development; Sakgasit Ramingwong , Lachana Ramingwong.Understanding of Agile Project Manager Competencies; Kamalrufadillah  Sutling, Zulkefli Mansor, Setyawan Widyarto, Sukumar Lecthmunan, Noor Habibah Arshad.Design IP Camera for Android-Based system using the Around-View; Gyu-Hyun Kim, Jong-Wook Jang.Identification of Opportunities for Move Method Refactoring Using Decision Theory; Siriwan Boonkwan, Pornsiri Muenchaisri.Requirements Engineering for Cloud Computing in University Using iStar Hierarchy Method; Sandfreni Sandfreni, Nabila Rizky Oktadini, Kridanto Surendro.Power Consumption Profiling Method based on Android Application Usage; Hiroki Furusho, Kenji Hisazumi, Takeshi Kamiyama, Hiroshi Inamura, Tsuneo Nakanishi, Akira Fukuda.Evergreen Software Preservation: The Conceptual Framework of Anti-Ageing Model; Jamaiah Yahaya, Aziz Deraman, Zuriani Hayati Abdullah.A Framework Analysis for Distributed Interactive Multimedia System on Location-based Service; Shan Liu, Jianping Chai.An Empirical Validation of Coupling and Cohesion Metrics as Testability Indicators; Amos Orenyi Bajeh, Shuib Basri, Low Tan Jung.Software Defect Prediction in Imbalanced Data Sets Using Unbiased Support Vector Machine; Teerawit Choeikiwong, Peerapon Vateekul.Evaluation of Separated Concerns in Web-based Delivery of User Interfaces; Tomas Cerny, Lubos Matl, Karel Cemus, Michael Donahoo.Separating out Platform-independent Particles of User Interface; Tomas Cerny, Michael Donahoo.Implementing Personal Software Process in Undergraduate Course to Improve  Model-View-Controller Software Construction; Wacharapong Nachiengmai, Sakgasit Ramingwong.Part 8.Personalized Care Recommendation Approach for Diabetes patients Using Ontology and SWRL; Benjamas Hempho, Ngamnij Arch-int, Somjit Arch-int, Cherdpan Pattarapongsin.An Experimental Study for Neighbor Selection in Collaborative Filtering; Soojung Lee.Transforming e-Procurement Platforms for PEPPOL and WCAG 2.0 Compliance - The anoGov-PEPPOL Project; Jose Martins, Joao Barroso, Ramiro Goncalves, Andre Sousa, Miguel Bacelar, Hugo Paredes.Analzying Developer Behevior and Community Structure In Software Crowdsourcing; Hui Zhang, Wu Yuchuan, Wu Wenjun.A Semantic Similarity Assessment Tool for Computer Science Subjects Using Extended Wu & Palmer's Algorithm and Ontology; Chayan Nuntawong, Chakkrit Snae Namahoot, Michael Bruckner.Comparison of Architecture-Centric Model-Driven Web Engineering and Abstract Behavioural Specification in Constructing Software Product Line for Web Application; Daya Adianto, Maya Retno Ayu Setyautami, Salman El Farisi.Prediction of Query Satisfaction Based on CQA-Oriented Browsing Behaviors; Junxia Guo, Hao Han, Cheng Gao, Takashi Nakayama, Keizo Oyama.The Competition-based Information Propagation in Online Social Networks; Liyuan Sun, Yadong Zhou, Xiaohong Guan.e-Learning Recommender System for Teachers using Opinion Mining; Anand Shanker Tewari, Anita Saroj, Asim Gopal Barman.Part 9: ICWCIA.Evaluating Heuristic Optimization, Bio-Inspired and Graph-Theoretic Algorithms for the Generation of Fault-Tolerant Graphs with Minimal Costs; Matthias Becker, Markus Kromker, Helena Szczerbicka.Part 10: IWICT.Real-time Night Visibility Enhancement Algorithm Using the Similarity of Inverted Night Image and Fog Image; Jae-Won Lee, Bae-Ho Lee, Yongkwan Won, Cheol-Hong Kim, Sung-Hoon Hong.Service Protection mechanism Using VPN GW Hiding Techniques; PyungKoo Park, GyungTae Hong, SeongMin Yoo, HoYong Ryu, Jaehyung Park, JaeCheol Ryou.Networking Service Availability Analysis of 2N Redundancy Model with Non-Stop Forwarding; Dong-Hyun Kim, Jae-Chan Shim, Ho-Yong Ryu, Jaehyung Park, Yutae Lee.Property Analysis of Classifiers for Sleep Snoring Detection; Tan Loc Nguyen, Young Y Lee, Su-il Choi , Yonggwan Won.An Innovative Detection Method Integrating Hybrid Sensors for Motorized Wheelchairs; Sanghyun Park, Hyunyoung Kim, Jinsul Kim, Taeksoo Ji, Myoung Jin Lee.Part 11: IWSATA.Road Weather Information transmission method for digital multimedia broadcasting; SangWoon Lee.Color Overlapping Method of Projection System on LEDs; Yongseok Chi, Youngseop Kim, Je-Ho Park, Kyoungro Yoon, Cheong-Ghil Kim, Yong-Hwan Lee.A System Design for Audio Level Measurement based on ITU-R BS.1770-3; Sang Woon Lee, Hyun Woo Lee, Cheong Ghil Kim.A Prototype Implementation of Contents Sharing System on Networked Heterogeneous Devices; Cheong Ghil Kim, Dae Seung Park.

Erscheint lt. Verlag 17.2.2015
Reihe/Serie Lecture Notes in Electrical Engineering
Lecture Notes in Electrical Engineering
Zusatzinfo XVIII, 1112 p. 559 illus.
Verlagsort Berlin
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Mathematik / Informatik Informatik Web / Internet
Technik
Schlagworte Application Convergence • artificial immune system • Artificial Intelligence • Cloud Computing • Convergence Technology • Data Mining and Artificial Intelligence • Digital Convergence • Information Systems Security and Privacy • Multimedia and Visualization • Networks and Information Systems • Software engineering • ubiquitous computing
ISBN-10 3-662-46578-7 / 3662465787
ISBN-13 978-3-662-46578-3 / 9783662465783
Haben Sie eine Frage zum Produkt?
PDFPDF (Ohne DRM)

Digital Rights Management: ohne DRM
Dieses eBook enthält kein DRM oder Kopier­schutz. Eine Weiter­gabe an Dritte ist jedoch rechtlich nicht zulässig, weil Sie beim Kauf nur die Rechte an der persön­lichen Nutzung erwerben.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Wie du KI richtig nutzt - schreiben, recherchieren, Bilder erstellen, …

von Rainer Hattenhauer

eBook Download (2023)
Rheinwerk Computing (Verlag)
CHF 24,30
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
CHF 37,95