Zoekfilters
› Robert Verhulst (7)
› M.S. Hoogland (3)
› Andrew Josey (2)
» Toon alle opties (26)
› Carolyn Chandler (2)
› Christophe Benoit (2)
› Conrad Chavez (2)
› Darius Blasband (2)
› David A. Patterson (2)
› David Wetherall (2)
› Erik Perjons (2)
› Jakob Svendsen (2)
› James Kurose (2)
› Jesse James Garrett (2)
› Joe Dockery (2)
› Keith Ross (2)
› Kerrie Meyler (2)
› Mark Scholman (2)
› Marlies van Steenberge... (2)
› Nick Feamster (2)
› Paul Johannesson (2)
› Ramez Elmasri (2)
› Russ Unger (2)
› Sander Hoogendoorn (2)
› Shamkant Navathe (2)
› Steve Buchanan (2)
› Steve Krug (2)
› Team VDM (2)
› William Stallings (2)
› Communication and Mult... (8)
› Creative Media and Gam... (7)
› HBO-ICT (3)
» Toon alle opties (2)
› Saxion (9)
› Hogeschool Rotterdam (8)
› Hogeschool Utrecht (5)
» Toon alle opties (2)
› Pearson (19)
› Taylor & Francis Group... (12)
› Brave New Books (11)
» Toon alle opties (22)
› Boom (8)
› O'Reilly (8)
› Wiley (8)
› Elsevier (7)
› Springer (6)
› Van Haren Publishing (6)
› Duuren Media, Van (4)
› Boekscout (3)
› Borgerhoff & Lamberigt... (3)
› MainPress B.V. (3)
› Amsterdam University P... (2)
› BBNC Uitgevers (2)
› Intertaal (2)
› New Riders Pub (2)
› No Starch Press,US (2)
› Packt Publishing Limit... (2)
› Pearson Benelux B.V. (2)
› Reality Bites Publishi... (2)
› SAGE (2)
› Syngress Media (2)
› Van Duuren Media (2)
Resultaten (160)
morgen verzonden
Geïntegreerde veiligheid in de 21° eeuw.
2022 || Paperback || Robert Verhulst || Brave New Books
Een nieuw of een modernisering van Uw elektronische beveiliging vraagt een studie van huidige risico’s en aanwending van hedendaagse technologie in de uitwerking. Nieuwe methodes en systeem architectuur maken het mogelijk schade te vermijden of te beperken en efficiëntie van veiligheidspersoneel drastisch te verhogen. Maak zelf Uw analyse vraag indien nodig consultatie maar laat Uw installateur niet installeren wat hij het liefst installeert. Gebruik een “Operating Technology” model e...
Security systems for the 21st century
2022 || Hardcover || Robert Verhulst || Brave New Books || met inkijkexemplaar
A new or a modernization of your electronic security requires a study of current risks and the use of contemporary technology in the elaboration. New methods and system architecture make it possible to avoid or limit damage and drastically increase the efficiency of safety personnel. Make your own analysis request if necessary consultation but do not let your installer install what he prefers to install. Use an “Operating Technology” model and distinguish it with your IT infrastructure. A...
morgen verzonden
The Rise and Fall of Software Recipes
2016 || Hardcover || Darius Blasband || Reality Bites Publishing B.V.
Usability Testing Essentials: Ready, Set ...Test!
2020 || Paperback || Carol M. Barnum || Elsevier
Usability Testing Essentials presents a practical, step-by-step approach to learning the entire process of planning and conducting a usability test. It explains how to analyze and apply the results and what to do when confronted with budgetary and time restrictions. This is the ideal book for anyone involved in usability or user-centered design-from students to seasoned professionals.
Filled with new examples and case studies, Usability Testing Essentials, Second Edition is completely updated...
A Project Guide to UX Design : For User Experience Designers in the Field or in the Making
2024 || Paperback || Russ Unger e.a. || New Riders Pub
USER EXPERIENCE DESIGN is the multifaceted discipline of shaping digital products and systems into tools that are both useful and usable. Success as a UX designer extends beyond just knowledge of the latest technologies; it also involves diplomacy, management insight, and a solid grasp of business dynamics. In this updated guide, you'll learn to: Understand various roles in UX design, identify stakeholders, and increase collaboration across teamsDefine your project's purpose and scope collabo...
Database Systems / 2nd Edition
Pearson New International Edition
2019 || Paperback || Hecter Garcia Molina e.a. || Pearson
For Database Systems and Database Design and Application courses offered at the junior, senior and graduate levels in Computer Science departments. Written by well-known computer scientists, this introduction to database systems offers a comprehensive approach, focusing on database design, database use, and implementation of database applications and database management systems. The first half of the book provides in-depth coverage of databases from the point of view of the database designer,...
Security Engineering / 3rd Edition
A Guide to Building Dependable Distributed Systems
2021 || Hardcover || Ross Anderson || Wiley
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of se...
The Art of Game Design / 3rd edition
A Book of Lenses
2019 || Paperback || USA) Pennsylvania Pittsburgh Jesse (Carnegie Mellon University and Schell Games Schell || Taylor & Francis
The Art of Game Design guides you through the design process step-by-step, helping you to develop new and innovative games that will be played again and again. It explains the fundamental principles of game design and demonstrates how tactics used in classic board, card and athletic games also work in top-quality video games. Good game design happens when you view your game from as many perspectives as possible, and award-winning author Jesse Schell presents over 100 sets of questions to ask ...
Official (ISC)2 Guide to the CISSP CBK / 4th edition
2015 || Hardcover || Adam Gordon || Apple Academic Press Inc.
As a result of a rigorous, methodical process that (ISC)(2) follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)(2) conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of ...
Designing Secure Software
A Guide for Developers
2021 || Paperback || Loren Kohnfelder || No Starch Press,US
Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building security into software design early and involving the entire team in the process. The book begins with a discussion of core concepts.
The second part, perhaps this book's most important contribution, covers the process of designing and reviewing a...