In 'Word een Webdesign Master' lees je hoe je een succes maakt van elk webdesignproject, van de eerste kennismaking tot de lancering én daarna. Niet door harder te werken maar slimmer.
Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. Meer
Dive into the world of MVVM, learn how to build modern Windows applications, and prepare for cross-platform development. This book introduces you to the right mindset and demonstrates suitable methodologies that allow for quick understanding of the MVVM paradigm. Meer
From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. Meer
Electronic commerce is big business, and it is getting bigger: it now accounts for 7.5 percent of all retail sales in the US, and continues to expand at double-digit annual rates. Meer
Enterprise modeling (EM) methods and techniques are indispensable for understanding the present situation of an enterprise and for preparing for its future – particularly in times of continuous organizational change, an increasing pace of innovation, new market challenges or technology advances. Meer
This book is your concise guide to Ansible, the simple way to automate apps and IT infrastructure. In less than 250 pages, this book takes you from knowing nothing about configuration management to understanding how to use Ansible in a professional setting. Meer
Information architecture has changed dramatically since the mid-1990s and earlier conceptions of the world and the internet being different and separate have given way to a much more complex scenario in the present day. Meer
Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. Meer
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. Meer
Design has become the key link between users and todays complex and rapidly evolving digital experiences, and designers are starting to be included in strategic conversations about the products and services that enterprises ultimately deliver. Meer
This book provides guidelines for practicing design science in the fields of information systems and software engineering research. A design process usually iterates over two activities: first designing an artifact that improves something for stakeholders and subsequently empirically investigating the performance of that artifact in its context. Meer
This book explains the most important concepts, standards, implementations, and applications of public key infrastructures (PKIs). All chapters contain exercises, with solutions provided in an appendix. Meer
Now in its fourth edition, this volume collates an array of material on using MATLAB and Octave in science computing, offering hundreds of examples, solved exercises, and programs that will greatly extend the range and abilities of the software’s users. Meer
Grounding its methodology in the well established principles of systems such as PRINCE2 and StageGate, this volume provides all the necessary background needed to direct cooperative product engineering projects in a micro- and nanotechnology setting. Meer
In its revised edition, this book examines the history and current developments in knowledge visualization from an interdisciplinary perspective, from theories of invisible colleges and competing paradigms to practical applications of visualization techniques. Meer
This unique book on intelligence analysis covers several vital but often overlooked topics. It teaches the evidential and inferential issues involved in 'connecting the dots' to draw defensible and persuasive conclusions from masses of evidence: from observations we make, or questions we ask, we generate alternative hypotheses as explanations or answers; we make use of our hypotheses to generate new lines of inquiry and discover new evidence; and we test the hypotheses with the discovered evidence. Meer
This book is aimed at developers with an advanced knowledge of Android and who want to test their skills and learn new techniques to increase the performance of their applications. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.