Van productiviteit en creatieve assistentie tot beeldbewerking, videobewerking, marketing en SEO – dit boek helpt je de juiste tools te vinden en direct in te zetten.
Learn various commercial and open source products that perform SQL on Big Data platforms. You will understand the architectures of the various SQL engines being used and how the tools work internally in terms of execution, data movement, latency, scalability, performance, and system requirements. Meer
For many organizations, Hadoop is the first step for dealing with massive amounts of data. The next step? Processing and analyzing datasets with the Apache Pig scripting platform. Meer
Dive into the world of MVVM, learn how to build modern Windows applications, and prepare for cross-platform development. This book introduces you to the right mindset and demonstrates suitable methodologies that allow for quick understanding of the MVVM paradigm. Meer
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications. Meer
Learn to harness the power of Visual Basic for Applications (VBA) in Microsoft Excel to develop interesting, useful, and interactive Excel applications. Meer
In ITIL these stages are known as: Service Strategy; Service Design; Service Transition; and Service Operation. Students will also appreciate the concept of continual service improvement and quality control. Meer
Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. Meer
Electronic commerce is big business, and it is getting bigger: it now accounts for 7.5 percent of all retail sales in the US, and continues to expand at double-digit annual rates. Meer
From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. Meer
TRIM is the accronym for: The Rational IT Model. This is a vendor neutral reference model that can be used to adopt IT Service Management as a practice. Meer
Information architecture has changed dramatically since the mid-1990s and earlier conceptions of the world and the internet being different and separate have given way to a much more complex scenario in the present day. Meer
Enterprise modeling (EM) methods and techniques are indispensable for understanding the present situation of an enterprise and for preparing for its future – particularly in times of continuous organizational change, an increasing pace of innovation, new market challenges or technology advances. Meer
Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. Meer
This book is your concise guide to Ansible, the simple way to automate apps and IT infrastructure. In less than 250 pages, this book takes you from knowing nothing about configuration management to understanding how to use Ansible in a professional setting. Meer
This book is aimed at developers with an advanced knowledge of Android and who want to test their skills and learn new techniques to increase the performance of their applications. Meer
This book explains the most important concepts, standards, implementations, and applications of public key infrastructures (PKIs). All chapters contain exercises, with solutions provided in an appendix. Meer
Now in its fourth edition, this volume collates an array of material on using MATLAB and Octave in science computing, offering hundreds of examples, solved exercises, and programs that will greatly extend the range and abilities of the software’s users. Meer
Grounding its methodology in the well established principles of systems such as PRINCE2 and StageGate, this volume provides all the necessary background needed to direct cooperative product engineering projects in a micro- and nanotechnology setting. Meer