Door kunstmatige intelligentie te integreren in vertrouwde Microsoft 365-apps zoals Word, Excel, Outlook en Teams, wordt het eenvoudiger om processen te automatiseren en efficiënter te werken.
With this practical book, you’ll learn how to design and implement a graph database that brings the power of graphs to bear on a broad range of problem domains. Meer
Its clear, step-by-step instruction quickly gets you up to speed, enabling you to confidently use SPSS® to do homework problems and conduct statistical analyses for research projects. Meer
The second edition of 'Perl Cookbook' has been fully updated for Perl 5.8, with extensive changes for Unicode support, I/O layers, mod_perl, and new technologies that have emerged since the previous edition of the book. Meer
The Definitive Guide to the ARM (R) Cortex (R)-M0 and Cortex-M0+ Processors, Second Edition explains the architectures underneath ARM's Cortex-M0 and Cortex-M0+ processors and their programming techniques. Meer
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Meer
Beginning Python Games Development, Second Edition teaches you how to create compelling games using Python and the PyGame games development library. Meer
With the decreasing cost of prototyping, it’s now more feasible for professional Makers and first-time entrepreneurs to develop a hardware startup. But how exactly do you go about it This book provides the roadmap and best practices you need for turning a product idea into a full-fledged business. Meer
Learn to deploy and support Hyper-V, building on what you know about VMware's vSphere. Whether you're looking to run both hypervisors in parallel or migrate completely, Hyper-V for VMware Administrators has everything you need to get started. Meer
Met het boek 'Access 2007: The Missing Manual' leert u hoe u een complete database kunt ontwerpen, een database moet onderhouden, hoe u moet zoeken naar waardevolle informatie en hoe u aantrekkelijke formulieren kunt bouwen voor snelle en eenvoudige gegevensinvoer. Meer
Wanneer u inzicht wilt verkrijgen in het praktijk van VMware ESX en ESXi systemen, vindt u in het boek 'VMware Cookbook' stap-voor-stap oplossingen voor het werken met deze producten binnen een groot aantal netwerkomgevingen. Meer
SAP ERP modules are notoriously hard to configure and use effectively without a lot of practice and experience. But as SAP ERP Financial Accounting and Controlling Illustrated: Configuration and Use Management shows, it doesn’t have to be so difficult. Meer
Master VBA automation quickly and easily to get more out of Excel
Excel VBA 24–Hour Trainer, 2nd Edition is the quick–start guide to getting more out of Excel, using Visual Basic for Applications. Meer
An essential anti–phishing desk reference for anyone with an email address
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Meer
Maak gebruik van de kennis en ervaring van experts om te leren wat elke programmeur moet weten voor de programmeertaal die u gebruikt. Met 97 korte en zeer bruikbare tips voor de programmeur breidt u uw vaardigheden uit door gebruik te maken van nieuwe benaderingen voor oude problemen. Meer
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. Meer
This third edition covers Java 1.4 and contains 193 complete, practical examples: over 21,900 lines of densely commented, professionally written Java code, covering 20 distinct client-side and server-side APIs. Meer
Featuring the proven Hacking Exposed method, this new edition of this bestseller reveals how to defend against the latest wireless network attacks by getting inside the mind of the hacker. Meer