Zoekfilters
Studieboeken (27)
Network Programmability and Automation Fundamentals
2025 || Paperback || Khaled Abuelenain e.a. || Pearson Education Limited
Network Programmability and Automation, Volume 1, covers designing, implementing, monitoring and operating networks using programmable interfaces on network devices versus the legacy (and soon-to-be obsolete) methods and protocols such as the Command Line Interface (CLI) and Simple Network Management Protocol (SNMP). It discusses the protocols, tools, techniques and technologies upon which Network Programmability is based.
Covering the fundamentals that a network engineer needs to transition ...
Cisco Data Center Fundamentals
2025 || Paperback || Somit Maloo e.a. || Pearson Education Limited
CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide
2025 || Paperback || Somit Maloo e.a. || Pearson Education Limited
TCP/IP Illustrated
The Protocols, Volume 1
2025 || Hardcover || Kevin Fall e.a. || Pearson Education Limited
Stevens' name appears first on the earlier edition.
Strategic Monoliths and Microservices
Driving Innovation Using Purposeful Architecture
2025 || Paperback || Vaughn Vernon e.a. || Pearson Education Limited
Strategic Monoliths and Microservices helps business decision-makers and technical team members collaborate to clearly understand their strategic problems, and identify their optimal architectural approaches, whether those turn out to be distributed microservices, well-modularized monoliths, or coarse-grained services partway between the two. Writing for MBA and IT students alike, leading software architecture expert Vaughn Vernon and Tomasz Jasku+éa guide you through making balanced archite...
morgen verzonden
Microsoft Visual C# Step by Step
2025 || Paperback || John Sharp || Pearson Benelux B.V.
morgen verzonden
Automating Governance in China?
Data-Driven Systems in the Scoring Society
2025 || Hardcover || Haiqing Yu e.a. || Leiden University Press
This book considers the interplay between the affordances of technologies, the experiences and processes of technological systems, and the process of learning and adaptation by state actors as part of governance reform in China. It offers detailed studies of specific projects and applications that are automated or quasi-automated in organising and governing social, economic, and cultural lives in the world’s largest techno-authoritarian regime. Written by scholars from six countries across ...
dinsdag verzonden
Symfony 5
The Fast Track
2020 || Paperback || Fabien Potencier || Symfony SAS
Is it possible to quickly build a modern web application and love the process? With Symfony 5, you can. This book - written by Symfony's creator - lays out a pragmatic approach to developing web applications with Symfony 5: from scratch to production. Whether you are discovering Symfony for the first time or refreshing your knowledge, this practical guide provides the definitive introduction to modern Symfony applications.
dinsdag verzonden
Digital Image Processing / 4th Global Edition
2017 || Paperback || Rafael Gonzalez e.a. || Pearson
For courses in Image Processing and Computer Vision. Introduce your students to image processing with the industry's most prized text For 40 years, Image Processing has been the foundational text for the study of digital image processing. The book is suited for students at the college senior and first-year graduate level with prior background in mathematical analysis, vectors, matrices, probability, statistics, linear systems, and computer programming.
As in all earlier editions, the focus of...
Digital Forensics, Investigation, and Response / 4th Edition
2023 || Paperback || Chuck Easttom || Jones and Bartlett Publishers
Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email.
It also discusses ho...