Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Nieuw in Computer en informatica

Aanbiedingen in Computer en informatica

-54%
Ben Frain
€ 81,19
€ 37,95
-26%
Christine Alvarado
€ 80,04
€ 59,95
-22%
€ 58,67
€ 45,95
-26%
Luciano Floridi
€ 46,71
€ 34,95

TOP 5 Computer en informatica

Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Gratis verzonden | Op voorraad | Vandaag voor 23:00 besteld, morgen in huis
1
Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,81
Gratis verzonden | Op voorraad | Vandaag voor 21:00 besteld, morgen in huis
2
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Gratis verzonden | Op voorraad | Vandaag voor 23:00 besteld, morgen in huis
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Gratis verzonden | Op voorraad | Vandaag voor 23:00 besteld, morgen in huis
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Practical Ansible

Get ready to go from the basics of using Ansible to becoming proficient at implementing configuration management in your projects. This book begins with the basics of Ansible, providing you with details on how to install and configure your environment while working with different Ansible modules from the command line. Next, it introduces you to working with Ansible tasks and organizing configuration code into playbooks. You’ll then learn how to extend playbooks further, using roles and templates within the configuration code. Author Vincent Sesto then extends your knowledge further by covering custom Ansible modules using Python and Linux shell scripts and demonstrating how you can start to keep your secret values encrypted and secure using Ansible Vault. You’ll also develop Ansible roles with the use of Ansible Galaxy to reuse existing roles that others have created. This updated edition reflects changes added in the latest version of Ansible (2.9). It also includes an expanded chapter on testing Ansible using Molecule and managing large server environments using applications like Ansible Tower. <b>What Will You Learn</b> -Understand what Ansible is and how to install and run your first basic command line commands -Expand your configuration management using Ansible playbooks, roles and templates -Customize your code further using Ansible Vault and third-party roles in Ansible Galaxy. -Work with Ansible in managing cloud infrastructure, specifically in Amazon Web Services -Troubleshoot your Ansible code and use frameworks like Molecule and Testinfra to help test your code changes -Manage large server environments using real-world examples and extend your configurations using an application like Ansible Tower <b>Who This Book Is For</b> Systems Engineers, Developers, DevOps Engineers and Software Administrators.
54,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 50 van 50.236 resultaten
Alle producten
GebondenEngels9780849323102 9-9-2005
With a focus on strategy and implementation, James Chang discusses business management practices and the technology that enables them. He analyzes the history of process management practices and demonstrates that BPM practices are a synthesis of radical change and continuous change practices.  Meer
155,77
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849323232 25-5-2005
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards captures the current state of wireless LANs, and serves as the single comprehensive reference on the subject.  Meer
212,05
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849323416 29-9-2005
The Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge.  Meer
120,58
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849323577 24-3-2000
Throughout successive generations of information technology, the importance of the performance evaluation of software, computer architectures, and computer networks endures.  Meer
240,19
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849323669 21-4-2000
Software engineering is playing an increasingly significant role in computing and informatics, necessitated by the complexities inherent in large-scale software development.  Meer
183,91
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849324192 22-5-2002
Although C++ was developed as a superset of C language to include object oriented programming features, it can be used as a separate language. Many references require a prior knowledge of C for learning C++.  Meer
55,86
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780849324321 26-9-2003
Hard drives and disk management receive scant attention from the industry press, yet recent surveys have identified disk failure as the #1 source of server downtime.  Meer
169,84
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849324338 27-10-2003
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to.  Meer
134,65
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849324888 12-7-1994
Neural Network Modeling offers a cohesive approach to the statistical mechanics and principles of cybernetics as a basis for neural network modeling. It brings together neurobiologists and the engineers who design intelligent automata to understand the physics of collective behavior pertinent to neural elements and the self-control aspects of neurocybernetics.  Meer
324,62
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849325298 15-8-1995
The mathematics employed by genetic algorithms (GAs)are among the most exciting discoveries of the last few decades. But what exactly is a genetic algorithm?  Meer
212,05
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849325908 12-3-1997
Simulation is a multi-disciplinary field, and significant simulation research is dispersed across multiple fields of study. Distributed computer systems, software design methods, and new simulation techniques offer synergistic multipliers when joined together in a distributed simulation.  Meer
155,77
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849326509 17-6-2005
A developer's knowledge of a computing system's requirements is necessarily imperfect because organizations change. Many requirements lie in the future and are unknowable at the time the system is designed and built.  Meer
169,84
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849328008 26-5-2005
Grid Database Design investigates the origin, background, and components of this new computing model. This book presents new concepts and analyzes pre-existing ideas in the context of Grid, educating organizations as to how Grid can increase their computing power and strengthen their operations.  Meer
148,74
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849328480 23-5-2005
Software Requirements: Encapsulation, Quality, and Reuse describes how to make requirements easy to change by using encapsulation. It introduces the Freedom methodology that shows how to encapsulate requirements thereby promoting reuse and quality.  Meer
148,74
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849328541 18-2-2005
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network infrastructure.  Meer
162,81
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849328800 27-3-2009
Data flow analysis is used to discover information for a wide variety of useful applications, ranging from compiler optimizations to software engineering and verification.  Meer
183,91
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849328848 30-3-1999
This collection compiles the seminal contributions of Michio Sugeno on fuzzy systems and technologies. Fuzzy Modeling & Control: Selected Works of Sugeno serves as a singular resource that provides a clear, comprehensive treatment of fuzzy control systems.  Meer
155,77
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849329609 23-6-2005
Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends.  Meer
134,65
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849329975 28-11-2007
Grid computing is an emerging technology designed for high-powered applications. Grid Application Systems Design shows how to unleash the high performance of Grid technology.  Meer
148,74
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849330278 28-10-2004
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork.  Meer
148,74
Verwachte levertijd ongeveer 11 werkdagen

Rubrieken

    Personen

      Trefwoorden