Door kunstmatige intelligentie te integreren in vertrouwde Microsoft 365-apps zoals Word, Excel, Outlook en Teams, wordt het eenvoudiger om processen te automatiseren en efficiënter te werken.
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Meer
This book describes the new Java portlet API, including security, portlet life cycles, and portlet interaction with servlets and JSP. The examples will work on any portal that complies with the JSR-168 portlet API. Meer
'The Definitive Guide to Linux Network Programming' offers a clear, concise treatment of creating clients and servers under the Linux operating system. Meer
This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. Meer
'Mastering Oracle SQL, 2nd Edition' fills the gap between the sometimes spotty vendor documentation, and other books on SQL that just don't explore the full depth of what is possible with Oracle-specific SQL. Meer
As a learning tool or a handy reference - this guide is packed with useful, accessible information for novice and experienced users alike; from technical information not found in the manual, to creative suggestions for authoring better projects faster. Meer
'Oracle Application Server 10g: J2EE Deployment and Administration' focuses on the latest version of Oracle's fully J2EE-certified application server (previously called Oracle9iAS). Meer
In addition to covering Microsoft's Active Directory implementation, 'Kerberos: The Definitive Guide' covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. Meer
Crawford and Kaplan's 'J2EE Design Patterns' approaches the subject in a unique, highly practical and pragmatic way. Rather than simply present another catalog of design patterns, the authors broaden the scope by discussing ways to choose design patterns when building an enterprise application from scratch, looking closely at the real world tradeoffs that Java developers must weigh when architecting their applications. Meer
This little book provides a quick and convenient path to mastery of the Perl debugger and its commands. Written by a core member of the Perl debugger development team, it's an ideal quick reference to debugger commands, as well as a detailed tutorial on how to get started. Meer
'Hardcore Java' takes this language and breaks it apart, piece by piece, revealing the important secrets and tricks that will take you from a junior-level programmer to a seasoned and expert developer. Meer
The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Meer
As a programmer, you need to be able to recognize and improve problematic code, so the program remains in a working state throughout the software lifecycle. Meer
Utilizing years of practical experience, seasoned experts Gregor Hohpe and Bobby Woolf show how asynchronous messaging has proven to be the best strategy for enterprise integration success. Meer
What's the worst an attacker can do to you? You'd better find out, right? That's what 'Security Warrior' teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Meer
'Java Servlet and JSP Cookbook' presents real-world problems, and provides concise, practical solutions to each. Finding even one tested code "recipe" that solves a gnarly problem in this comprehensive collection of solutions and best practices will save hours of frustration-easily justifying the cost of this invaluable book. Meer
The 'STL Pocket Reference' describes the functions, classes, and templates in that part of the C++ standard library often referred to as the Standard Template Library (STL). Meer
Deze uitgave is veel meer dan een wake-up-call. Het is ook een eye-opener. Zelfs voor diegenen die al weten van de problemen met Web server security, is dit boek een serieuze waarschuwing voor wat te doen en wat niet te doen. Meer
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network.
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Meer
This book describes a practical methodology for creating an effective VUI design. The methodology is scientifically based on principles in linguistics, psychology, and language technology, and is illustrated here by examples drawn from the authors' work at Nuance Communications, the market leader in ASR development and deployment. Meer