Warning: Undefined array key "computer en informatica" in /data/bigmomma/var-code/master/MGT/m4-deploy-1756480124-2dabcca/classes/rubriek.inc on line 88
Computer en informatica - Managementboek.nl

Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,21
€ 36,95
-27%
Christine Alvarado
€ 80,06
€ 58,95
-24%
€ 58,69
€ 44,95
-25%
Peter Flach
€ 67,32
€ 50,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,83
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Redefining Hacking
Omar Santos
Redefining Hacking
59,74
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 121 van 50.278 resultaten
Alle producten
PaperbackEngels9780367672515 4-10-2024
This book focuses on artificial intelligence and deep learning approaches, with case studies to solve problems associated with biometric security such as authentication, spoofing attack detection, and object detection.  Meer
87,97
Verwachte levertijd ongeveer 16 werkdagen
PaperbackEngels9780367779344 31-3-2021
This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.  Meer
67,14
Verwachte levertijd ongeveer 11 werkdagen
gebondenEngels9780387885223 16-10-2008
Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780367780647 31-3-2021
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience.  Meer
64,32
Verwachte levertijd ongeveer 11 werkdagen
gebondenEngels9780387895574 13-4-2009
This book contains extended and revised versions of the best papers that were presented during the fifteenth edition of the IFIP/IEEE WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387904337 28-2-1984
This book explains how to formally describe programming languages using the techniques of denotational semantics. The presentation is designed primarily for computer science students rather than for (say) mathematicians.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387904450 23-9-1980
This book is based on a seminar given at the University of California at Los Angeles in the Spring of 1975. The choice of topics reflects my interests at the time and the needs of the students taking the course.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387904559 18-3-1980
Shortly after the end of World War II high-speed digital computing machines were being developed. It was clear that the mathematical aspects of com­ putation needed to be reexamined in order to make efficient use of high-speed digital computers for mathematical computations.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780412011214 7-8-1986
The Apple / / series of computers represents one of the most versatile and powerful home computers available. If you've used your computer for a while, you've probably become quite familiar with Applesoft BASIC.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387003108 31-10-2003
The State of Memory Technology Over the past decade there has been rapid growth in the speed of micropro­ cessors. CPU speeds are approximately doubling every eighteen months, while main memory speed doubles about every ten years.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387003115 20-5-2003
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms.  Meer
98,59
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387941646 17-12-1993
State of the Art in Computer Graphics Aspects of Visualization This is the fourth volume derived from a State of . . . the Art in Computer Graphics Summer Institute.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387941943 11-3-1994
This book provides a broad coverage of fundamental and advanced con­ cepts of data structures and algorithms. The material presented includes a treatment of elementary data structures such as arrays, lists, stacks, and trees, as well as newer structures that have emerged to support the process­ ing of multidimensional or spatial data files.  Meer
96,99
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780367691097 29-1-2024
This book provides future research directions in energy, industry, and healthcare domain, and explores the different applications of IoT and its associated technologies.  Meer
75,98
Verwachte levertijd ongeveer 16 werkdagen
PaperbackEngels9780367780272 31-3-2021
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc.  Meer
69,95
Verwachte levertijd ongeveer 11 werkdagen
paperbackEngels9780387901015 26-7-1974
This text was developed over a three year period of time (1971- 1973) from a variety of notes and references used in the presentation of a senior/first year graduate level course in the Division of En­ gineering at Brown University titled Linear System Theory.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387001630 12-5-2003
There are many distinct pleasures associated with computer programming. Craftsmanship has its quiet rewards, the satisfaction that comes from building a useful object and making it work.  Meer
84,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387004457 9-12-2005
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387096834 17-7-2008
We are very pleased to introduce Open Source Development, Communities and Quality. The International Conference on Open Source Systems has come to its fourth edition – OSS 2008.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387096940 23-7-2008
The papers in this volume comprise the refereed proceedings of the conference ‘ Artificial Intelligence in Theory and Practice’ (IFIP AI 2008), which formed part of the 20th World Computer Congress of IFIP, the International Federation for Information Processing (WCC-2008), in Milan, Italy in September 2008.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden