Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Nieuw in Computer en informatica

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-23%
Peter Flach
€ 67,44
€ 51,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
Op voorraad | Vandaag voor 21:00 besteld, morgen in huis | Gratis verzonden
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 32 van 50.284 resultaten
Alle producten
PaperbackEngels9780415197724 3-9-1998
The Soft Edge is a one-of-a-kind history of the information revolution. In his lucid and direct style, Paul Levinson, historian and philosopher of media and communications, gives us more than just a history of information technologies.  Meer
53,15
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780415198837 27-10-2000
Mapping Cyberspace is a ground-breaking geographic exploration and critical reading of cyberspace, and information and communication technologies. The book: * provides an understanding of what cyberspace looks like and the social interactions that occur there * explores the impacts of cyberspace, and information and communication technologies, on cultural, political and economic relations * charts the spatial forms of virutal spaces * details empirical research and examines a wide variety of maps and spatialisations of cyberspace and the information society * has a related website at http://www.  Meer
253,81
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780415198844 27-10-2000
Mapping Cyberspace is a ground-breaking geographic exploration and critical reading of cyberspace, and information and communication technologies. The book: * provides an understanding of what cyberspace looks like and the social interactions that occur there * explores the impacts of cyberspace, and information and communication technologies, on cultural, political and economic relations * charts the spatial forms of virutal spaces * details empirical research and examines a wide variety of maps and spatialisations of cyberspace and the information society * has a related website at http://www.  Meer
77,55
Verwachte levertijd ongeveer 11 werkdagen
gebondenEngels9780387976648 18-12-1991
Reactive systems are computing systems which are interactive, such as real-time systems, operating systems, concurrent systems, control systems, etc. They are among the most difficult computing systems to program.  Meer
135,19
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387976877 3-12-1991
These are my lecture notes from CS681: Design and Analysis of Algo­ rithms, a one-semester graduate course I taught at Cornell for three consec­ utive fall semesters from '88 to '90.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387977065 29-4-1992
John Sculley In the short history of personal computing, the task of the software programmer has been one of the least recognized-but one of the most significant-in the industry.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780367685027 1-8-2022
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network.  Meer
70,07
Verwachte levertijd ongeveer 11 werkdagen
gebondenEngels9780387245683 29-7-2005
Multi-Agent Programming is an essential reference for anyone interested in the most up-to-date developments in MAS programming. While previous research has focused on the development of formal and informal approaches to analyze and specify Multi-Agent Systems, this book focuses on the development of programming languages and tools which not only support MAS programming, but also implement key concepts of MAS in a unified framework.  Meer
216,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387245898 10-3-2005
Architecture Description Languages is an essential reference for both academic and professional researchers in the field of system engineering and design.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387981963 13-7-2009
Argumentation is all around us. Letters to the Editor often make points of cons- tency, and “Why” is one of the most frequent questions in language, asking for r- sons behind behaviour.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
86,62
Verwachte levertijd ongeveer 8 werkdagen
gebondenEngels9780387256580 19-5-2005
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387258867 29-11-2005
Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387258904 6-7-2005
Motion-Free Super-Resolution is a compilation of very recent work on various methods of generating super-resolution (SR) images from a set of low-resolution images.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
156,99
Verwachte levertijd ongeveer 9 werkdagen
GebondenEngels9780367687779 12-12-2022
127,88
Verwachte levertijd ongeveer 11 werkdagen
gebondenEngels9780387261027 15-3-2006
Continuous System Simulation describes systematically and methodically how mathematical models of dynamic systems, usually described by sets of either ordinary or partial differential equations possibly coupled with algebraic equations, can be simulated on a digital computer.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780367566005 9-11-2020
This easy-to-use, classroom-tested textbook covers the C programming language for computer science and IT students. Designed for a compulsory fundamental course, it presents the theory and principles of C.  Meer
53,15
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780367710361 26-5-2021
This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain.  Meer
240,69
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780367656430 30-9-2020
This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography.  Meer
70,07
Verwachte levertijd ongeveer 11 werkdagen

Rubrieken

    Personen

      Trefwoorden