Zoekfilters
Studieboeken (24)
Network Programmability and Automation Fundamentals
2025 || Paperback || Khaled Abuelenain e.a. || Pearson Education Limited
Network Programmability and Automation, Volume 1, covers designing, implementing, monitoring and operating networks using programmable interfaces on network devices versus the legacy (and soon-to-be obsolete) methods and protocols such as the Command Line Interface (CLI) and Simple Network Management Protocol (SNMP). It discusses the protocols, tools, techniques and technologies upon which Network Programmability is based.
Covering the fundamentals that a network engineer needs to transition ...
CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram
2022 || Paperback || Donald Bacha || Pearson
CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram delivers expert coverage and practice questions for every exam topic, including implementation of core enterprise network technologies involving dual stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security and automation. It also offers comprehensive, proven preparation tools, including:
- Exam objective mapping to help students focus their study
- A self-assessment section for evaluating ...
Cisco Data Center Fundamentals
2025 || Paperback || Somit Maloo e.a. || Pearson Education Limited
CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide
2025 || Paperback || Somit Maloo e.a. || Pearson Education Limited
Effective Cybersecurity
A Guide to Using Best Practices and Standards
2018 || Paperback || William Stallings || Pearson Education (US)
This book is a comprehensive and unified explanation of the best practices and standards that provide proven, consensus techniques for implementing cybersecurity. The book assumes a basic understanding of the terminology of cryptography and a basic understanding of the application of cryptographic algorithms and protocols.
Strategic Monoliths and Microservices
Driving Innovation Using Purposeful Architecture
2025 || Paperback || Vaughn Vernon e.a. || Pearson Education Limited
Strategic Monoliths and Microservices helps business decision-makers and technical team members collaborate to clearly understand their strategic problems, and identify their optimal architectural approaches, whether those turn out to be distributed microservices, well-modularized monoliths, or coarse-grained services partway between the two. Writing for MBA and IT students alike, leading software architecture expert Vaughn Vernon and Tomasz Jasku+éa guide you through making balanced archite...
Zero Trust Architecture
2023 || Paperback || Cindy Green-Ortiz e.a. || Pearson Education (US)
Symfony 5
The Fast Track
2020 || Paperback || Fabien Potencier || Symfony SAS
Is it possible to quickly build a modern web application and love the process? With Symfony 5, you can. This book - written by Symfony's creator - lays out a pragmatic approach to developing web applications with Symfony 5: from scratch to production. Whether you are discovering Symfony for the first time or refreshing your knowledge, this practical guide provides the definitive introduction to modern Symfony applications.
Digital Image Processing / 4th Global Edition
2017 || Paperback || Rafael Gonzalez e.a. || Pearson
For courses in Image Processing and Computer Vision. Introduce your students to image processing with the industry's most prized text For 40 years, Image Processing has been the foundational text for the study of digital image processing. The book is suited for students at the college senior and first-year graduate level with prior background in mathematical analysis, vectors, matrices, probability, statistics, linear systems, and computer programming.
As in all earlier editions, the focus of...
Digital Forensics, Investigation, and Response / 4th Edition
2023 || Paperback || Chuck Easttom || Jones and Bartlett Publishers
Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email.
It also discusses ho...