Van productiviteit en creatieve assistentie tot beeldbewerking, videobewerking, marketing en SEO – dit boek helpt je de juiste tools te vinden en direct in te zetten.
This book offers the first comprehensive philosophical account of digital technology. It provides a detailed explanation of how the internet and digital technology are transforming culture, politics, aesthetics, and human relationships. Meer
This edited volume explores how artificial intelligence (AI) is transforming international conflict in cyberspace.
Over the past three decades, cyberspace developed into a crucial frontier and issue of international conflict. Meer
Wild West to Agile: The evolution and revolution of software development, drawn from personal experience, from the Apollo moon mission to digital transformations. Meer
Applied machine learning with a solid foundation in theory. Revised and expanded for TensorFlow 2, GANs, and reinforcement learning. Purchase of the print or Kindle book includes a free eBook in the PDF format. Meer
In juni 2007 is de langverwachte update van ITIL aan de wereld gepresenteerd. IT-managers, trainers, consultants en andere gebruikers van de ITIL V2 zijn geconfronteerd met ingrijpende veranderingen. Meer
The TOGAF® Standard, a standard of The Open Group, is a proven Enterprise Architecture methodology and framework used by the world’s leading organizations to improve business efficiency. Meer
In Computational Leadership, renowned leadership researcher Dr. Brian R. Spisak delivers a paradigm-shifting exploration of the use of simulations, network analysis, AI, and other computational approaches to fundamentally improve all aspects of leadership. Meer
With the arrival of Agile, DevOps and Scrum, Test automation can no longer be ignored as a means of testing faster and better. Where manual software testing used to be the basis for the test professional, this is shifting. Meer
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devices. Meer
The author convincingly lays out the arguments for the absolute cybersecurity first principle and then discusses the strategies and tactics required to achieve it. Meer
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Meer