Door drukte zijn de levertijden van PostNL aangepast en kan uw pakket vertraging oplopen. Door de Brexit kan de levering van Engelse boeken vertraging oplopen.
Making a game can be an intensive process, and if not planned accurately can easily run over budget. The use of procedural generation in game design can help with the intricate and multifarious aspects of game development; thus facilitating cost reduction.<B> </B>This form of development enables games to create their play areas, objects and stories based on a set of rules, rather than relying on the developer to handcraft each element individually.<B> </B>Readers will learn to create randomized maps, weave accidental plotlines, and manage complex systems that are prone to unpredictable behavior. Tanya Short’s and Tarn Adams’<B> Procedural Generation in Game Design</B> offers a wide collection of chapters from various experts that cover the implementation and enactment of procedural generation in games. Designers from a variety of studios provide concrete examples from their games to illustrate the many facets of this emerging sub-discipline.
This textbook explains Deep Learning Architecture, with applications to various NLP Tasks, including Document Classification, Machine Translation, Language Modeling, and Speech Recognition. Meer
MS-500: Microsoft 365 Security Administration offers complete, up-to-date coverage of the MS-500 exam so you can take it with confidence, fully equipped to pass the first time. Meer
This book converts the concepts of a hexagonal architecture into actual code. It concentrates on one of the most common forms of application in use today - a web application with an underlying database. Meer
Mastering Distributed Tracing provides comprehensive coverage of the tracing field. Solve problems through code instrumentation with open standards, and learn how to profile complex systems. Meer
Take your PL/SQL programming skills to the next level and build robust database-centric PL/SQL applications quickly and effectively. Learn how to write and deploy Java libraries inside Oracle Database 12c, use the utl_file and DBMS_SCHEDULER packages, create external tables and external procedures, and more. Meer
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. Meer
Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. Meer
Gain the technical and business insight needed to plan, deploy, and manage the services provided by the Microsoft Azure cloud. This second edition focuses on improving operational decision tipping points for the professionals leading DevOps and security teams. Meer
Explore solutions, best practices, tips, and workarounds to plan, design, customize, implement, and manage Microsoft Teams in any environment.
The book starts with an overview of Microsoft Teams where you will go through the teams architecture, teams/channels, audio/video meetings, and the phone system. Meer
Comprehensive preparation for the final MCSA exam, updated for Windows Server 2016
MCSA Windows Server 2016 Study Guide: Exam 70–742 is the ultimate preparation resource for the third and final MCSA exam. Meer
Students who are beginning studies in technology need a strong foundation in the basics before moving on to more advanced technology courses and certification programs. Meer