Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-23%
Peter Flach
€ 67,44
€ 51,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 63 van 50.278 resultaten
Alle producten
paperbackEngels9780387966434 8-12-1987
Presents the results of an investigation into the issues raised by the development of a compiler for APL, a very high level computer programming language.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387966519 11-12-1989
This unique and valuable source of information describes the protocol suite according to the International Organization for StandardsISO) seven-level (OSI) reference model.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387967653 22-7-1988
122,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387281100 9-12-2005
Genetic Programming Theory and Practice III provides both researchers and industry professionals with the most recent developments in GP theory and practice by exploring the emerging interaction between theory and practice in the cutting-edge, machine learning method of Genetic Programming (GP).  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780367780074 31-3-2021
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of the software involved, etc.  Meer
64,43
Verwachte levertijd ongeveer 11 werkdagen
paperbackEngels9780387973746 17-12-1990
Knowledge-Based Simulation: Methodology and Application represents a recent compilation of research material that reviews fundamental concepts of simulation methodology and knowledge-based simulation applications.  Meer
122,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387973821 2-10-1990
Programming is a fascinating and challenging subject. Unfortunately, it is rarely presented as such. Most often it is taught by "induction": features of some famous programming languages are given operational meaning (e.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387973852 16-11-1990
The goal of the Asilomar Workshop on Fault-Tolerant Distributed Computing, held March 17-19, 1986, was to facilitate interaction between theoreticians and practitioners by inviting speakers and choosing topics so as to present a broad overview of the field.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387973975 26-11-1990
As part of the NSF's EXPRES project, the authors investigated ways to interchange multi-media documents among diverse systems. Their investigations led to an analysis and implementation of multi-media document format translation in general, and of the ODA standard in particular.  Meer
126,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387974002 8-4-1991
Recently there has been considerable interest in qualitative methods in simulation and mathematical model- ing. Qualitative Simulation Modeling and Analysis is the first book to thoroughly review fundamental concepts in the field of qualitative simulation.  Meer
122,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387974538 13-2-1991
UR Reader consists of a set of essays written by international authors many 0 of whom are acknowledged experts in one or more aspects of information technology (IT) and its implications for society.  Meer
61,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387295510 17-11-2005
Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387298139 20-3-2007
Visual languages have long been lit pursuitofeffective communication 00­ tween human and machine. Today, they are suecessfully employed for e:nd~user progmmming, modeliog, rapid prototypmg, and design activities by people ofmany disciplines including arehitects, artists, children,engi~ neers, and scientists.  Meer
132,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387298153 26-5-2006
Canadian Semantic Web is an edited volume based on the first Canadian Web Working Symposium, June 2006, in Quebec, Canada. This volume includes but is not limited to the following popular topics: "Trust, Privacy, Security on the Semantic Web," "Semantic Grid and Semantic Grid Services" and "Semantic Web Mining.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387298269 29-11-2005
This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387308579 12-3-2007
Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures.  Meer
216,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387308869 5-9-2008
Hypercomputation is a relatively new theory of computation that is about computing methods and devices that transcend the so-called Church-Turing thesis.  Meer
132,99
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780367571856 30-6-2020
Feature engineering plays a vital role in big data analytics. Machine learning and data mining algorithms cannot work without data. Little can be achieved if there are few features to represent the underlying data objects, and the quality of results of those algorithms largely depends on the quality of the available features.  Meer
64,43
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780367571931 30-6-2020
Fully updated and expanded from the previous edition, A Practical Guide to Database Design, Second Edition is intended for those involved in the design or development of a database system or application.  Meer
64,43
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780367571955 30-6-2020
Present anti-virus technologies do not have the symmetrical weaponry to defeat massive DDoS attacks on smart cities. Smart cities require a new set of holistic and AI-centric cognitive technology, such as autonomic components that replicate the human immune system, and a smart grid that connects all IoT devices.  Meer
64,43
Verwachte levertijd ongeveer 11 werkdagen

Rubrieken

    Personen

      Trefwoorden