Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Nieuw in Computer en informatica

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-23%
Peter Flach
€ 67,44
€ 51,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 51 van 50.284 resultaten
Alle producten
gebondenEngels9780387242262 14-6-2005
Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387242613 10-3-2005
This book brings together experts to discuss relevant results in software process modeling, and expresses their personal view of this field. It is designed for a professional audience of researchers and practitioners in industry, and graduate-level students.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387242958 19-10-2005
The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244181 2-6-2006
It takes more e?ort to verify that digital system designs are correct than it does to design them, and as systems get more complex the proportion of cost spent on veri?  Meer
111,34
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244242 29-11-2005
Human Identification Based on Gait is the first book to address gait as a biometric. Biometrics is now in a unique position where it affects most people's lives.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244259 18-11-2005
Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244266 17-11-2005
Hop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet.  If a message that is part of a denial-of-service attack is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244273 11-11-2008
This book presents research results on data dissemination in mobile networks and peer-to-peer systems for mobile devices. The main focus is a novel resource-sharing mechanism for mobile devices that introduces a new paradigm of information-sharing cooperation among mobile devices not necessarily connected to the internet.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387343464 12-10-2007
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387382661 19-9-2006
Collaborative Networks is a fast developing area, as shown by the already large number of diverse real-world implemented cases and the dynamism of its related involved research community.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387699387 1-10-2007
Challenges in complexity and variability of multimedia data have led to revolutions in machine learning techniques. Multimedia data, such as digital images, audio streams and motion video programs, exhibit richer structures than simple, isolated data items.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387707600 26-10-2007
Information Systems Development (ISD) progresses rapidly, continually creating new challenges for the professionals involved. New concepts, approaches and techniques of systems development emerge constantly in this field.  Meer
240,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387751634 4-3-2009
In this book I argue that a reason for the limited success of various studies under the general heading of cybernetics is failure to appreciate the importance of con- nuity, in a simple metrical sense of the term.  Meer
122,99
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780367706739 31-5-2023
With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly.  Meer
27,78
Verwachte levertijd ongeveer 11 werkdagen
gebondenEngels9780387777405 23-9-2010
Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387777795 7-3-2008
This book examines the newer and emerging models of telecommunications technology that play instrumental roles in providing international economic and societal interconnectivity.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
GebondenEngels9780367711412 15-3-2022
The diverse applications of IoT are achieved by a set of complex inter-related networks of things and communications. IoT applications are also concerned about an array of devices such as sensors, mobile devices, personal computers, the smart systems such as Alexa, Eco, etc, besides the whole range of communication network binding them together in a seamless manner.  Meer
110,96
Verwachte levertijd ongeveer 11 werkdagen
gebondenEngels9780387848136 28-4-2009
The European Computing Conference offers a unique forum for establishing new collaborations within present or upcoming research projects, exchanging useful ideas, presenting recent research results, participating in discussions and establishing new academic collaborations, linking university with the industry.  Meer
240,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780412087714 31-10-1996
This book initiates a new digital multimedia standards series. The purpose of the series is to make information about digital multimedia standards readilyavailable.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387904559 18-3-1980
Shortly after the end of World War II high-speed digital computing machines were being developed. It was clear that the mathematical aspects of com­ putation needed to be reexamined in order to make efficient use of high-speed digital computers for mathematical computations.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden