Norges billigste bøker

Data og IT

Her finner du spennende bøker om Data og IT. Nedenfor er et flott utvalg på over 89.058 bøker om emnet.
Vis mer
Filter
Filter
Sorter etterSorter Populære
  • Spar 20%
    av Bill Jelen
    337,99

    Learn how to use Excel 2019 pivot tables and pivot charts to produce powerful, dynamic reports in minutes instead of hours, to take control of your data and your business. Even if youGÇÖve never created a pivot table before, this book will help you leverage all their remarkable flexibility and analytical powerGÇöincluding valuable improvements in Excel 2019 and Excel in Office 365. Drawing on more than 45 combined years of Excel experience, Bill Jelen and Michael Alexander offer practical GÇ£recipesGÇ¥ for solving real business problems, help you avoid common mistakes, and present tips and tricks youGÇÖll find nowhere else.

  • av Giles Colborne
    394,-

    This book is the solution is to master the discipline of simplicity -- with humor, powerful examples, practical advice, and up-to-date case studies. Readers will learn how to strip away complexity by organizing, removing, hiding, and displacing -- creating focused, elegant user experiences that people will love. Simple and Usable Web, Mobile, and Interaction Design, Second Edition is unique: it contains simple, practical advice, presented elegantly, in a "one-page at a time" format that's both enjoyable and inspiring. This edition has been extensively updated to reflect new technologies and best practices, and to serve the needs of everyone who understands the value of user experience -- including growing numbers of product managers.

  • Spar 24%
    - End-to-End Editing and Debugging Tools for Web Developers
    av Bruce Johnson
    378,-

    Expert guidance on using Visual Studio Code for editing and debugging your web development projectsVisual Studio Code, a free, open source, cross-compatible source code editor, is one of the most popular choices for web developers. It is fast, lightweight, customizable, and contains built-in support for JavaScript, Typescript, and Node.js extensions for other languages, including C++, Python, and PHP. Features such as debugging capability, embedded Git control, syntax highlighting, code snippets, and IntelliSense intelligent code completion support--several of which set it apart from the competition--help make Visual Studio Code an impressive, out-of-the-box solution.Visual Studio Code: End-to-End Editing and Debugging Tools for Web Developers helps readers to become familiar with and productive in Visual Studio Code. This up-to-date guide covers all of the essential components of the software, including the editing features of the workspace, advanced functionality such as code refactoring and key binding, and integration with Grunt, Gulp, NPM, and other external tools. New users, experienced developers, and those considering moving from another developer tool will benefit from this book's detailed, yet easy-to-follow information on Visual Studio Code. This book:* Teaches readers how to use Visual Studio Code to do full-stack development* Explains the steps to install Visual Studio Code on Windows, Mac and Linux platforms* Provides a foundation for non-users considering moving to Visual Studio Code* Helps current users expand their knowledge of the tool and its available extensions* Describes how to open a .NET Core project and get end-to-end execution and debugging functionalityVisual Studio Code: End-to-End Editing and Debugging Tools for Web Developers is an invaluable guide for both professional and hobbyist web developers seeking immediately-useful information on Visual Studio Code.

  • Spar 20%
    - Theory and practical tools to help investors analyse businesses using Excel
    av Paul Lower
    509

    Paul Lower presents step-by-step instructions for seven spreadsheet models that will help the user to gain a better understanding of the financial data coming out of a business.

  • Spar 24%
    - Architecture, Protocols, and Tools
    av Dinesh G Dutt
    568,-

    Whether you're pursuing a multitenant private cloud, a network for running machine learning, or an enterprise data center, author Dinesh Dutt takes you through the steps necessary to design a data center that's affordable, high capacity, easy to manage, agile, and reliable.

  • Spar 19%
    - Exam 101-500 and Exam 102-500
    av Christine Bresnahan
    573,-

  • Spar 15%
    av Donald Thomas
    779,-

    This edition presents the new IEEE 1364-2001 standard of The Verilog Hardware Description Language. It offers updated examples that illustrated the new features of the language as well as a cross- referenced guide to the new and old features.

  • - Fundamental Techniques
    av Wilhelm Burger
    434

    This easy-to-follow textbook provides a modern, algorithmic introduction to digital image processing. It concentrates on practical applications and working implementations whilst also presenting important formal details and the necessary mathematics.

  • - How an Army of Crypto-hackers Is Building the Next Internet with Ethereum
    av Camila Russo
    324,-

    Written with the verve of such works as The Big Short, The History of the Future, and The Spider Network, here is the fascinating, true story of the rise of Ethereum, the second-biggest digital asset in the world, the growth of cryptocurrency, and the future of the internet as we know it.Everyone has heard of Bitcoin, but few know about the second largest cryptocurrency, Ethereum, which has been heralded as the "next internet."The story of Ethereum begins with Vitalik Buterin, a supremely gifted nineteen-year-old autodidact who saw the promise of blockchain when the technology was in its earliest stages. He convinced a crack group of coders to join him in his quest to make a super-charged, global computer.The Infinite Machine introduces Vitalik's ingenious idea and unfolds Ethereum's chaotic beginnings. It then explores the brilliant innovation and reckless greed the platform-an infinitely adaptable foundation for experimentation and new applications-has unleashed and the consequences that resulted as the frenzy surrounding it grew: increased regulatory scrutiny, incipient Wall Street interest, and the founding team's effort to get the Ethereum platform to scale so it can eventually be accessible to the masses.Financial journalist and cryptocurrency expert Camila Russo details the wild and often hapless adventures of a team of hippy-anarchists, reluctantly led by an ambivalent visionary, and lays out how this new foundation for the internet will spur both transformation and fraud-turning some into millionaires and others into felons-and revolutionize our ideas about money.

  • - Learn how to write efficient code to build scalable and robust applications in C++
    av Wisnu Anggoro
    536,-

    C++ is a general-purpose programming language which has evolved over the years and is used to develop software for many different sectors. This book will be your companion as it takes you through implementing classic data structures and algorithms to help you get up and running as a confident C++ programmer.

  • - For a Literate Living
    av Bittu Kumar
    173,-

  • - Infrastructure security with Red Team and Blue Team tactics
    av Yuri Diogenes & Dr. Erdal Ozkaya
    620,-

    With Cybercrime on a rise, Cybersecurity has become extremely vital to a large group of industries. Due to which, companies have started adopting the hard ways of preventing system breaches. This book will explore some Red Team and Blue Team tactics, where the Red Team tactics can be used in penetration for accessing sensitive data, and the ...

  • - Boost and optimize the performance of your C++17 code
    av Viktor Sehr & Bjoern Andrist
    536,-

    C++ is a highly portable language and can be used to write both large-scale applications and performance-critical code. It has evolved over the last few years to become a modern and expressive language. This book will guide you through optimizing the performance of your C++ apps by allowing them to run faster and consume fewer resources on the ...

  • av Tim Roughgarden
    210,-

    Algorithms are the heart and soul of computer science. Their applications range from network routing and computational genomics to public-key cryptography and machine learning. Studying algorithms can make you a better programmer, a clearer thinker, and a master of technical interviews. Algorithms Illuminated is an accessible introduction to the subject for anyone with at least a little programming experience. The exposition emphasizes the big picture and conceptual understanding over low-level implementation and mathematical details---like a transcript of what an expert algorithms tutor would say over a series of one-on-one lessons. Part 1 covers asymptotic analysis and big-O notation, divide-and-conquer algorithms and the master method, randomized algorithms, and several famous algorithms for sorting and selection.

  • - The Ultimate Guide to The Legend Of Zelda 2
    av Guy BlackNES Guy
    255

    Think you have mastered The Legend Of Zelda 2??? Think again! This unofficial guide has everything you need to know to become the hero that saves Hyrule again.... Find every heart piece, secret caves and detailed strategies on how to beat each boss in every dungeon. Legend Of Zelda 2 is one of the most underrated games ever published on the original NES. Thanks to the NES Classic new and old gamers are being able to see just how different and unique this game truly is.It doesn't matter if you play it on the NES Classic or the original NES, this game is a favorite on everybody's list.First time players or longtime masters will LOVE this guide! Inside get the best tips on: What items to collect before heading into the first dungeon Detailed maps for each dungeon and were all the special items are How to find hidden caves throughout Hyrule Multiple maps of the Overworld with hidden locations and items marked Maps for BOTH the first and second quest And More Don't delay, BUY THIS GUIDE today and discover some of the best secrets that The Legend Of Zelda 2 has to offer!

  • - The Ultimate Guide to The Legend Of Zelda
    av Blacknes Guy
    369,-

    Think you have mastered The Legend Of Zelda??? Think again!It's Dangerous to go alone. Take this.... This unofficial guide as over 150 pages of everything you need to know to become the hero that saves Hyrule.Find every heart piece, secret caves and detailed strategies on how to beat each boss in every dungeon. This is the game that started it all! Not only is this the first game in this legendary franchise but this game is the reason we can save our progress in video games today! Yes, it's all because of the original Legend Of Zelda. Take a look inside this guide and you will be getting a brief history on this game, what made it so popular and the impact it had on the gaming world. It doesn't matter if you play it on the NES Classic or the original NES, this game is a favorite on everybody's list. First time players or longtime masters will LOVE this guide!Inside get the best tips on: What items to collect before heading into the first dungeon Detailed maps for each dungeon and were all the special items are How to find hidden caves throughout Hyrule Multiple maps of the Overworld with hidden locations and items marked Maps for BOTH the first and second quest The best and fastest way to defeat all the bosses including Ganon! And MoreDon't delay, BUY THIS GUIDE today and discover some of the best secrets that The Legend Of Zelda has to offer!

  • av Nadean H. Tanner
    434

    A practical handbook to cybersecurity for both tech and non-tech professionalsAs reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise.Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Nexpose Community, Wireshark, Solarwinds Kiwi Syslog Server, Metasploit, Burp, Clonezilla and many more.Up-to-date and practical cybersecurity instruction, applicable to both management and technical positions* Straightforward explanations of the theory behind cybersecurity best practices* Designed to be an easily navigated tool for daily use* Includes training appendix on Linux, how to build a virtual lab and glossary of key termsThe Cybersecurity Blue Team Toolkit is an excellent resource for anyone working in digital policy as well as IT security professionals, technical analysts, program managers, and Chief Information and Technology Officers. This is one handbook that won't gather dust on the shelf, but remain a valuable reference at any career level, from student to executive.

  • Spar 30%
    av John Paul Mueller
    257,-

    Take a deep dive into deep learningDeep learning provides the means for discerning patterns in the data that drive online business and social media outlets. Deep Learning for Dummies gives you the information you need to take the mystery out of the topic--and all of the underlying technologies associated with it.In no time, you'll make sense of those increasingly confusing algorithms, and find a simple and safe environment to experiment with deep learning. The book develops a sense of precisely what deep learning can do at a high level and then provides examples of the major deep learning application types.* Includes sample code* Provides real-world examples within the approachable text* Offers hands-on activities to make learning easier* Shows you how to use Deep Learning more effectively with the right toolsThis book is perfect for those who want to better understand the basis of the underlying technologies that we use each and every day.

  • - A Practical Approach
    av Alexander G. Dean
    509

    Microcontrollers are embedded into larger systems to provide benefits such as better performance, more features, better efficiency, lower costs and better dependability. This textbook introduces students to creating microcontroller-based embedded systems featuring an ARM Cortex-M CPU core.Chapter 1 introduces students to the concepts of MCU-based embedded systems, and how they differ from general-purpose computers. It then introduces the ARM Cortex-M0+ CPU, the Kinetis KL25Z MCU, and the low cost FRDM-KL25Z MCU development board.Chapter 2 presents the general purpose I/O peripheral to provide an early, hands-on experience with reading switches and lighting LEDs using C code. It also introduces the CMSIS hardware abstraction layer, which simplifies software access to peripherals.Chapter 3 introduces multitasking on the CPU, with the goals of improving responsiveness and software modularity while reducing CPU overhead. The interplay of interrupts, peripherals and schedulers (both cooperative and preemptive) is examined.Chapter 4 presents the ARM Cortex-M0+ processor core, including organization, registers, memory, and instruction set. It then discusses interrupts and exceptions, including CPU response and hardware configuration. Designing software for a system with interrupts is discussed, including program design (including partitioning work), interrupt configuration, writing handlers in C, and sharing data safely given preemption.Chapter 5 first gives an overview of tool-chain which translates a program from C source code to executable object code. It then shows side-by-side the source code and the object code the tool-chain has generated to implement it. Topics covered include functions, arguments, return values, activation records, exception handlers, control flow constructs for loops and selection, memory allocation and use, and accessing data in memory.Chapter 6 presents analog interfacing, starting with theory and ending with practical implementations. Quantization and sampling are presented as a foundation for digital to analog conversion, and analog to digital conversion. The DAC, ADC and analog comparator peripherals are presented and used.Chapter 7 presents timer peripherals and their use for generating a periodic interrupt or a pulse-width modulated signal, or for measuring elapsed time or a signal’s frequency. Watchdog timers, used to detect and reset an out-of-control program, are also discussed. The SysTick, PIT, TPM and COP timers are examined.Chapter 8 discusses serial communications, starting with the fundamentals of data serialization, framing, error detection, media access control and addressing. Software queues are introduced to show how to buffer data between communication ISRs and other parts of the program. Three protocols and their supporting peripherals are investigated next: SPI, asynchronous serial (UART) and I2C. UART communication is demonstrated using the FRDM-KL25Z’s debug MCU as a serial port bridge over USB to the PC. I2C communication is demonstrated using the FRDM-KL25Z’s built-in 3 axis accelerometer with I2C interface.Chapter 9 introduces the direct memory access peripheral and its ability to transfer data autonomously, offloading work from the CPU and offering dramatically improved performance. Examples include using DMA for bulk data copying, and for DAC-based analog waveform generation with precise timing.An appendix covers how to measure the power and energy use on the FRDM-KL25Z board, including disconnecting the debug MCU to reduce power. Energy measurement using an ultracapacitor is also presented.For use in ECE, EE, and CS departments.

  • Spar 11%
    - A Client Centered Approach
    av Permanand Singh
    272,-

    A SAP SuccessFactors implementation can be a large project requiring significant cost, effort and time. A successful implementation results in an integrated human capital management (HCM) system that improves both business alignment and people performance. This can drive significant benefits and competitive advantage. As such, any guide or information that can increase the possibility of a successful implementation is beneficial to a project implementation team.This book is designed to share information about the best approach to implementing SAP SuccessFactors. It focuses on the areas of the overall implementation that are critical, but often overlooked to the detriment of the overall project success. It shares information that an implementer might wish they had when starting the project instead of learning it during the implementation when it will be too late for them to use to help ensure a successful project.First, it covers what is being implemented by describing the SAP SuccessFactors system. Then, it discusses the “why” aspect or the business benefits that the company is expecting to realize from the implementation. It then covers the actual implementation process, and finally discusses critical post go live support and upgrade options.

  • av Carsten Stech
    526,-

  • - Theory and Practice with Max 7 Vol1
    av Alessandro Cipriani & Maurizio Giri
    574,-

    (Third Edition updated for MAX 7) Structured for use in university courses, the book is an overview of the theory and practice of Max and MSP, with a glossary of terms and suggested tests that allow students to evaluate their progress. Comprehensive online support, running parallel to the explanations in the book, includes hundreds of sample patches, analyses, interactive sound-building exercises, and reverse engineering exercises. This book will provide a reader with skill and understanding in using Max/MSP for sound design and musical composition.

  • - A Coherent Methodology for Modeling Every Level of the Enterprise
    av David W Enstrom
    443

    A Simplified Approach to IT Architecture with BPMN: A Coherent Methodology for Modeling Every Level of the Enterprise distills the insights a seasoned IT professional gathered over the course of thirty-five years spent studying, designing, deploying, critiquing, and refining IT architectures. This approach, rooted in models, follows a logical process for creating architectures that can unify IT across every level of the enterprise.David Enstrom, a published author with education and extensive experience in the field, places the Business Process Model and Notation-the title's BPMN-at the heart of the Unified Architecture Method-UAM-that undergirds this work's method. The highly structured contents of A Simplified Approach to IT Architecture with BPMN cover an array of topics: the demystification of IT architecture; the description of UAM; how to architect-in IT security; the delineation of Business, Logical, and Technical Perspectives; and the depiction of architectural patterns.The additions of a bibliography, a glossary, several supplementary sections, and an index supplement the main presentation in A Simplified Approach to IT Architecture with BPMN, rendering it a comprehensive source for IT professionals charged with responsibilities for IT architecture at every level of the enterprise.

  • av Ray Bogman & Vladimir Kerkhoff
    536,-

  • - Building a Real-World Infrastructure with Windows Server
    av Johan Arwidmark
    794,-

    No way! Automating the deployment of the entire infrastructure? That can't be done! These are words we have heard many times, but the answer is: Yes, you can, with the step-by-step guides, sample scripts, and other resources found in this book. In the modern datacenter, everything is about automation, repeatable processes, and well-designed and documented infrastructure. This can be accomplished with PowerShell and MDT 2013. In this book, you learn how to install and configure the core infrastructure components in Windows Server 2012 R2. You start from absolutely nothing, and using the book and its sample scripts, build a complete real-world, production-ready infrastructure.

  • - Deploying Windows 10 Using Microsoft Deployment Toolkit
    av Johan Arwidmark
    794,-

    If your job is deploying Windows 10, this book is for you. In this book, you will find practical guidance based on our many years of real-world experience deploying Windows around the world. Deployment Fundamentals, Volume 6, provides you with detailed step-by-step instructions, as well as decision-making guidance and explanations that provide answers on the Whys and Hows around Windows 10 OS deployment using Microsoft Deployment Toolkit (MDT) 2013 Update 2. The book also include many real-word notes and troubleshooting tips and tricks.To get you going as quickly possible, the book sample scripts contains a fully automated build of the entire environment, the hydration kit. That includes a fully configured Active Directory environment, including DNS, DHCP, WSUS, PXE, DFS-R Replication, SQL Express, and more.With this book, you will learn how to: Install and configure MDT 2013 Update 2 for production deployments - Build the supporting infrastructure - Use the script repository included with this book in your own environment - Create production-ready reference images for Windows 10 - Build a real-world deployment solution for Windows 10 - Add and deploy applications - Perform real-world driver management - Apply advanced configurations for CustomSettings.ini and deployment automation - Extend MDT using application wrappers, userexit scripts, and PowerShell - Prestage deployment settings using the MDT databases - Perform advanced configuration using web services - Deploy Office 2016, including the Click-to-Run Office 365 version

  • av Matt Donley
    532 - 708,-

  • - How to Own a Continent
    av Ryan (Ryan Russell (aka Blue Boar) has worked in the IT field for over 16 years.) Russell
    746,-

    A work of fiction which provides an insight into the boundaries of hacking and cyber-terrorism. It is written by a team of the cyber-security specialists in the world.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.