Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-23%
Peter Flach
€ 67,44
€ 51,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 62 van 50.278 resultaten
Alle producten
gebondenEngels9780387243528 19-4-2006
This book addresses the use of data mining for smarter, more efficient agents, as well as the challenge of generating intelligence from data while transferring it to a separate, possibly autonomous, software entity.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387243566 16-8-2005
The concept of content delivery (also known as content distribution) is be­ coming increasingly important due to rapidly growing demands for efficient distribution and fast access of information in the Internet.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387243634 16-8-2006
It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech­ niques.  Meer
126,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387243795 10-2-2006
Reflects a decade of leading-edge research on intelligence and security informatics. Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research.  Meer
240,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387243863 11-7-2006
Evolvable hardware (EHW) refers to hardware whose architecture/structure and functions change dynamically and autonomously in order to improve its performance in carrying out tasks.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387243931 14-4-2005
Researchers in data management have recently recognized the importance of a new class of data-intensive applications that requires managing data streams, i.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244181 2-6-2006
It takes more e?ort to verify that digital system designs are correct than it does to design them, and as systems get more complex the proportion of cost spent on veri?  Meer
111,34
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244242 29-11-2005
Human Identification Based on Gait is the first book to address gait as a biometric. Biometrics is now in a unique position where it affects most people's lives.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244259 18-11-2005
Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244266 17-11-2005
Hop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet.  If a message that is part of a denial-of-service attack is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244273 11-11-2008
This book presents research results on data dissemination in mobile networks and peer-to-peer systems for mobile devices. The main focus is a novel resource-sharing mechanism for mobile devices that introduces a new paradigm of information-sharing cooperation among mobile devices not necessarily connected to the internet.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244327 28-6-2005
A Software Process Model Handbook for Incorporating People's Capabilities offers the most advanced approach to date, empirically validated at software development organizations.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244341 28-9-2005
Parallel and distributed computing is one of the foremost technologies for shaping future research and development activities in academia and industry.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387244853 4-3-2005
Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387250878 12-4-2005
Certification and Security in Inter-Organizational E-Services presents the proceedings of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC in August 2004 in Toulouse, France.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387250915 21-6-2005
Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland.  Meer
240,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387260501 16-9-2005
Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387261027 15-3-2006
Continuous System Simulation describes systematically and methodically how mathematical models of dynamic systems, usually described by sets of either ordinary or partial differential equations possibly coupled with algebraic equations, can be simulated on a digital computer.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387261096 1-7-2005
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387966168 13-6-1988
Learning Issues for Intelligent Tutoring Systems arrays the most current and exciting research in this dynamic and growing area of cognitive science. The various contributions address the design and use of instructional systems as well as the important theoretical and practical questions involved in implementing knowledge-based systems.  Meer
122,99
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden