We staan aan de vooravond van grote veranderingen op de werkvloer door AI Agents—software die zelfstandig het kantoorwerk kan uitvoeren. Daarmee gaan computers écht voor jou aan de slag.
Koppel technologie aan strategie met boeken die je helpen IT effectief te managen. Van datagedreven werken tot informatieveiligheid en agile ontwikkelmethoden: leer hoe je IT inzet als motor voor innovatie en groei binnen je organisatie.
Bekijk resultaten in...
Alle productenManagementboekenSeminars + TrainingenOnline magazineSale
This book explains what frameworks are and how they fit into applications, and reveals many of the fundamental object-oriented techniques used in creating them. Meer
This book sets out to redress the unjust criticism leveled at PL/SQL in years gone by. It gives you the tools and techniques to ensure that, whatever your needs are, the PL/SQL you build will run as efficiently as possible. Meer
'SQL Server Distilled, Second Edition' is a very carefully researched, clearly explained book on securing SQL Server, by an author who knows SQL Server inside and out. Meer
In 'Perl Template Toolkit' you'll find detailed coverage of this increasingly popular technology. Written by core members of the technology's development team, the book guides you through the entire process of installing, configuring, using, and extending the Template Toolkit. Meer
Covers PEAR, PHP 5 and MySQL 4.1
'Web Database Applications with PHP and MySQL, Second Edition' thoroughly reflects the needs of real-world applications. Meer
'Java Servlet and JSP Cookbook' presents real-world problems, and provides concise, practical solutions to each. Finding even one tested code "recipe" that solves a gnarly problem in this comprehensive collection of solutions and best practices will save hours of frustration-easily justifying the cost of this invaluable book. Meer
What's the worst an attacker can do to you? You'd better find out, right? That's what 'Security Warrior' teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Meer
Produce winning presentations and reports with expert advice from this definitive guide. Discover vital tips on how to best utilize Crystal Reports' features to analyze data, and build professional, complex, and effective reports. Meer
This practical, DBA-centric resource explains how to leverage Oracle's built-in technologies to achieve integrated, cost-effective high availability solutions with the reliability of a utility. Meer
Beginning with a review of the fundamental concepts, you get a complete guide to the audio production and post-production process with specific recipes for the most common challenges including getting rid of background noise, breaking large files into smaller chunks, and mixing music and voice together. Meer
'OpenVMS System Management Guide, Second Edition', the most complete book on the topic, details for system administrators the tools, technologies, and techniques by which they can configure, maintain, and tune computers running Hewlett-Packard's high-performance OpenVMS operating system. Meer
As a learning tool or a handy reference - this guide is packed with useful, accessible information for novice and experienced users alike; from technical information not found in the manual, to creative suggestions for authoring better projects faster. Meer
'Mastering Oracle SQL, 2nd Edition' fills the gap between the sometimes spotty vendor documentation, and other books on SQL that just don't explore the full depth of what is possible with Oracle-specific SQL. Meer
The book provides a complete introduction to all the wireless technologies supported by Linux. You'll learn how to install and configure a variety of wireless technologies to fit different scenarios, including an office or home network and for use on the road. Meer
This book is a must have for GIS vendors, system integrators and data providers; local/state/provincial and national government agencies; utilities and telecommunication companies; location-based services companies; data distributors; software developers and technical managers. Meer
'.NET & XML' starts by introducing XML and the .NET Framework, and then teaches you how to read and write XML before moving on to complex methods for manipulating, navigating, transforming, and constraining it. Meer
RELAX NG is a grammar-based schema language that's both easy to learn for schema creators and easy to implement for software developers In RELAX NG, developers are introduced to this unique language and will learn a no-nonsense method for creating XML schemas. Meer
'Hardcore Java' takes this language and breaks it apart, piece by piece, revealing the important secrets and tricks that will take you from a junior-level programmer to a seasoned and expert developer. Meer
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network.
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Meer
'JavaServer Faces' is a complete guide to the crucial new JSF technology. If you develop web applications, JSF belongs in your toolkit, and this book belongs in your library. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books