This book provides a comprehensive approach to manage PostgreSQL cluster databases on Amazon Web Services and Azure Web Services on the cloud, as well as in Docker and container environments on a Red Hat operating system. Meer
This comprehensive guide, featuring hand-picked examples of daily use cases, will walk you through the end-to-end predictive model-building cycle using the latest techniques and industry tricks. Meer
This book reviews how to safeguard digital network infrastructures, emphasizing on the latest trends in cybersecurity. It addresses the evolution of network systems, AI-driven threat detection, and defense mechanisms, while also preparing readers for future technological impacts on security. Meer
Build working implementations of hash tables, written in the C programming language. The new and revised Second Edition has been enhanced with simplified code and more comprehensive explanations, aimed at improving clarity and comprehension while exploiting the latest features in C programming. Meer
Examine the complexities of detecting ransomware and the potential rocky road to recover after it has infected a system environment. This book addresses the topic of Disaster and Ransomware Recovery in the VMware Cloud. Meer
Delve into the nuances of photo and video editing with Metal, a framework from Next Generation GPU APIs. Right now, the demand for media editors is growing exponentially, with multiple applications needing some form of image processing, including messengers, social networks, marketplace, and banking applications. Meer
This book simplifies the process of formalizing your cybersecurity program into something you can easily understand. Breaking down complex concepts into clear, manageable steps, the concepts are accessible even to those without a deep technical background. Meer
This book covers all topics and requirements of the CompTIA A+ certification exam. It will allow readers to easily understand the concepts, information, and skills needed to obtain the associated certification. Meer
In today's digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. Meer
Future-proof your programming career through practical projects designed to grasp the intricacies of LangChain’s components, from core chains to advanced conversational agents. Meer
Explore the world of Generative AI and understand why it matters. This book is divided into two parts, introducing tools such as ChatGPT, DALL-E, and will show you how to use them to build AI-powered web apps. Meer
Understand the full potential of Microsoft Power Platform with this comprehensive guide, designed to provide you with the knowledge and tools needed to create intelligent business applications, automate workflows, and drive data-driven insights for business growth. Meer
This book explores how to define, design, and maintain enterprise AI applications, exploring the impacts they will have on the teams who work with them. Meer
Learn how to protect PHP applications from potential vulnerabilities and attacks. As cyberattacks and data breaches continue to rise, it's crucial for developers and organizations to prioritize security in their PHP applications. Meer
Harness the capabilities of Python and gain the expertise need to master data science techniques. This step-by-step book guides you through using Python to achieve tasks related to data cleaning, statistics, and visualization. Meer
Explore Snowflake’s core concepts and unique features that differentiates it from industry competitors, such as, Azure Synapse and Google BigQuery. This book provides recipes for architecting and developing modern data pipelines on the Snowflake data platform by employing progressive techniques, agile practices, and repeatable strategies. Meer
Break the vicious circle of designs perpetuating the errors of the past and “just click next and accept the defaults” implementations preventing a secure and reliable future. Meer
This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three concepts. Meer
Learn the Julia programming language as quickly as possible. This book is a must-have reference guide that presents the essential Julia syntax in a well-organized format, updated with the latest features of Julia’s APIs, libraries, and packages. Meer
Access detailed content and examples on Azure SQL, a set of cloud services that allows for SQL Server to be deployed in the cloud. This book teaches the fundamentals of deployment, configuration, security, performance, and availability of Azure SQL from the perspective of these same tasks and capabilities in SQL Server. Meer
64,66
Op voorraad | Vandaag voor 23:00 besteld, volgende dag in huis
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books