Door kunstmatige intelligentie te integreren in vertrouwde Microsoft 365-apps zoals Word, Excel, Outlook en Teams, wordt het eenvoudiger om processen te automatiseren en efficiënter te werken.
The Data Vault was invented by Dan Linstedt at the U.S. Department of Defense, and the standard has been successfully applied to data warehousing projects at organizations of different sizes, from small to large-size corporations. Meer
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual. Meer
Beginning Drupal 8 teaches you how to build, maintain, and manage Drupal 8-based web sites. The book covers using Drupal when building a new web site, what Drupal is, installing and configuring Drupal, creating and managing content, managing users, adding functionality to your web site through Drupal modules, and more advanced topics on using themes, panels, and views. Meer
Software is pervasive in our lives. We are accustomed to dealing with the failures of much of that software - restarting an application is a very familiar solution. Meer
If you are a programmer who wants to get started with data mining, then this book is for you. Previous experience with data mining libraries will help, but is not mandatory. Meer
Its clear, step-by-step instruction quickly gets you up to speed, enabling you to confidently use SPSS® to do homework problems and conduct statistical analyses for research projects. Meer
'Running Linux' covers basic communications such as mail, web surfing, and instant messaging, but also delves into the subtleties of network configuration--including dial-up, ADSL, and cable modems--in case you need to set up your network manually. Meer
The 3rd edition of 'Understanding the Linux Kernel' takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Meer
It′s not enough just to defend your network against attack. For truly effective security, you need both defensive and offensive strategies in a unified framework. Meer
This invaluable roadmap for startup engineers reveals how to successfully plan and implement a comprehensive web application scalability strategy to meet increasing product and traffic demands. Meer
Seven years after the publication of Graphic Design: The New Basics, coauthors Ellen Lupton and Jennifer Cole Phillips have updated the book with current content and extended key sections. Meer
31,59
18,95
Laatste exemplaar! Voor 21:00 uur besteld, morgen in huis
Beginning Python Games Development, Second Edition teaches you how to create compelling games using Python and the PyGame games development library. Meer
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Meer
With this practical book, you’ll learn how to design and implement a graph database that brings the power of graphs to bear on a broad range of problem domains. Meer
The second edition of 'Perl Cookbook' has been fully updated for Perl 5.8, with extensive changes for Unicode support, I/O layers, mod_perl, and new technologies that have emerged since the previous edition of the book. Meer