Door kunstmatige intelligentie te integreren in vertrouwde Microsoft 365-apps zoals Word, Excel, Outlook en Teams, wordt het eenvoudiger om processen te automatiseren en efficiënter te werken.
In this book, the broad range of technologies and techniques used by AAA game studios are each explained in detail, and their roles within a real industrial-strength game engine are illustrated. Meer
Discover how to leverage modern Unix even if you've never worked with Unix before. This book presents everything in conceptual terms that you can understand, rather than tips to be committed raw to memory. Meer
With this practical guide, application designers, data scientists, and system administrators will explore ways to create visualizations that bring context and a sense of time to streaming text data. Meer
Fulfilling the promise of the All-in-One series, this complete reference serves both as a study tool and a valuable on-the-job reference that will serve readers beyond the exam. Meer
Reading and storing data is a core part of any application, and .NET developers want database access to be easy and intuitive. Entity framework Core is a . Meer
This comprehensive guide provides a uniquely practical, application-focused introduction to medical image analysis. This fully updated new edition has been enhanced with material on the latest developments in the field, whilst retaining the original focus on segmentation, classification and registration. Meer
You'll learn how to use Pi with Arduino as well as Pi with Gertboard, an expansion board with an onboard ATmega microcontroller. 'Learn Raspberry Pi Programming with Python' has been fully updated in this new edition to cover the features of the new boards. Meer
Managing and maintaining iPhones and iPads in a corporate or other business environment inherently requires strict attention to security concerns. Meer
The study of networks, including computer networks, social networks, and biological networks, has attracted enormous interest in the last few years. The rise of the Internet and the wide availability of inexpensive computers have made it possible to gather and analyze network data on an unprecedented scale, and the development of new theoretical tools has allowed us to extract knowledge from networks of many different kinds. Meer
This book analyses various models of value creation in projects and businesses by applying different forms of Artificial Intelligence in their products and services. Meer
Deze uitgave is geschreven om u maximaal voor te bereiden op het examen 70-462, een van de drie examens nodig voor het behalen van de MCSA: SQL Server 2012 certificering. Meer
Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks. Meer
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Meer
Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. Meer
Gain industry best practices from planning to implementing Microsoft Teams and learn how to enable, configure, and integrate user provisioning, management, and monitoring. Meer
Learn the fundamentals of Python (3.7) and how to apply it to data science, programming, and web development. Fully updated to include hands-on tutorials and projects. Meer