In 'Cruisecontrol' heeft Taco de ideeën, tips en tools uit zijn bestseller Schaamteloos delegeren aangevuld, uitgewerkt en volledig toegespitst op het werken met AI.
Koppel technologie aan strategie met boeken die je helpen IT effectief te managen. Van datagedreven werken tot informatieveiligheid en agile ontwikkelmethoden: leer hoe je IT inzet als motor voor innovatie en groei binnen je organisatie.
Bekijk resultaten in...
Alle productenManagementboekenSeminars + TrainingenOnline magazineSale
The 'Extreme Programming Pocket Guide' covers XP assumptions, principles, events, artifacts, roles, and resources, and more. It concisely explains the relationships between the XP practices. Meer
The 'STL Pocket Reference' describes the functions, classes, and templates in that part of the C++ standard library often referred to as the Standard Template Library (STL). Meer
As useful as XSLT is, its peculiar characteristics make it a difficult language in which to get started. In fact, newcomers are often a little dazed on first contact. Meer
'DNS on Windows Server 2003' is a special Windows-oriented edition of the classic DNS and BIND, newly updated to document the many changes to DNS, large and small, found in Windows Server 2003. Meer
'Optimizing Oracle Performance' eliminates the time-consuming, trial-and-error guesswork inherent in most conventional approaches to tuning. You can determine exactly where a system's performance problem is, and with equal importance, where it is not, in just a few minutes-even if the problem is several years old. Meer
'SQL Tuning' author Dan Tow outlines a timesaving method he's developed for finding the optimum execution plan--rapidly and systematically--regardless of the complexity of the SQL or the database platform being used. Meer
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network.
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Meer
As a programmer, you need to be able to recognize and improve problematic code, so the program remains in a working state throughout the software lifecycle. Meer
A practical, nuts-and-bolts guide to architectural solutions that describes step-by-step how to design robustness and flexibility into an Internet-based system. Meer
In addition to covering Microsoft's Active Directory implementation, 'Kerberos: The Definitive Guide' covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. Meer
Crawford and Kaplan's 'J2EE Design Patterns' approaches the subject in a unique, highly practical and pragmatic way. Rather than simply present another catalog of design patterns, the authors broaden the scope by discussing ways to choose design patterns when building an enterprise application from scratch, looking closely at the real world tradeoffs that Java developers must weigh when architecting their applications. Meer
'RTF Pocket Guide' is a concise and easy-to-use tutorial and quick-reference for anyone who occasionally ends up mired in RTF files. As the first published book to cover the RTF format in any detail, this small pocket guide explains the syntax of RTF with examples throughout, including special sections on Unicode RTF and MSHelp RTF, and several full programs that demonstrate how to work in RTF effectively. Meer
'PC Hardware in a Nutshell' is the practical guide to buying, building, upgrading, and repairing Intel-based PCs. A longtime favorite among PC users, the third edition of the book now contains useful information for people running either Windows or Linux operating systems. Meer
This little book provides a quick and convenient path to mastery of the Perl debugger and its commands. Written by a core member of the Perl debugger development team, it's an ideal quick reference to debugger commands, as well as a detailed tutorial on how to get started. Meer
What's the worst an attacker can do to you? You'd better find out, right? That's what 'Security Warrior' teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Meer
'Java Servlet and JSP Cookbook' presents real-world problems, and provides concise, practical solutions to each. Finding even one tested code "recipe" that solves a gnarly problem in this comprehensive collection of solutions and best practices will save hours of frustration-easily justifying the cost of this invaluable book. Meer
'OpenVMS System Management Guide, Second Edition', the most complete book on the topic, details for system administrators the tools, technologies, and techniques by which they can configure, maintain, and tune computers running Hewlett-Packard's high-performance OpenVMS operating system. Meer
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books