Door kunstmatige intelligentie te integreren in vertrouwde Microsoft 365-apps zoals Word, Excel, Outlook en Teams, wordt het eenvoudiger om processen te automatiseren en efficiënter te werken.
In ITIL these stages are known as: Service Strategy; Service Design; Service Transition; and Service Operation. Students will also appreciate the concept of continual service improvement and quality control. Meer
Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. Meer
From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. Meer
Electronic commerce is big business, and it is getting bigger: it now accounts for 7.5 percent of all retail sales in the US, and continues to expand at double-digit annual rates. Meer
TRIM is the accronym for: The Rational IT Model. This is a vendor neutral reference model that can be used to adopt IT Service Management as a practice. Meer
This book is your concise guide to Ansible, the simple way to automate apps and IT infrastructure. In less than 250 pages, this book takes you from knowing nothing about configuration management to understanding how to use Ansible in a professional setting. Meer
Enterprise modeling (EM) methods and techniques are indispensable for understanding the present situation of an enterprise and for preparing for its future – particularly in times of continuous organizational change, an increasing pace of innovation, new market challenges or technology advances. Meer
Information architecture has changed dramatically since the mid-1990s and earlier conceptions of the world and the internet being different and separate have given way to a much more complex scenario in the present day. Meer
Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. Meer
This book is aimed at developers with an advanced knowledge of Android and who want to test their skills and learn new techniques to increase the performance of their applications. Meer
Now in its fourth edition, this volume collates an array of material on using MATLAB and Octave in science computing, offering hundreds of examples, solved exercises, and programs that will greatly extend the range and abilities of the software’s users. Meer
This unique book on intelligence analysis covers several vital but often overlooked topics. It teaches the evidential and inferential issues involved in 'connecting the dots' to draw defensible and persuasive conclusions from masses of evidence: from observations we make, or questions we ask, we generate alternative hypotheses as explanations or answers; we make use of our hypotheses to generate new lines of inquiry and discover new evidence; and we test the hypotheses with the discovered evidence. Meer
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. Meer
This book provides guidelines for practicing design science in the fields of information systems and software engineering research. A design process usually iterates over two activities: first designing an artifact that improves something for stakeholders and subsequently empirically investigating the performance of that artifact in its context. Meer
This book is an introductory text on design science, intended to support both graduate students and researchers in structuring, undertaking and presenting design science work. Meer
Grounding its methodology in the well established principles of systems such as PRINCE2 and StageGate, this volume provides all the necessary background needed to direct cooperative product engineering projects in a micro- and nanotechnology setting. Meer