Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-23%
Peter Flach
€ 67,44
€ 51,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 50 van 50.278 resultaten
Alle producten
GebondenEngels9780123742148 21-1-2009
Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server.  Meer
78,94
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780124201255 30-9-2014
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).  Meer
64,54
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780124202313 26-8-2014
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity.  Meer
53,74
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780128003862 2-12-2015
Heterogeneous Systems Architecture - a new compute platform infrastructure presents a next-generation hardware platform, and associated software, that allows processors of different types to work efficiently and cooperatively in shared memory from a single source program.  Meer
52,54
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780128005347 27-4-2014
The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method.  Meer
26,14
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780128008430 7-7-2014
How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand?  Meer
24,94
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780128012901 2-6-2015
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands.  Meer
46,54
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780128035849 9-3-2016
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure.  Meer
56,14
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780128038635 13-10-2016
Network Storage: Tools and Technologies for Storing Your Company’s Data explains the changes occurring in storage, what they mean, and how to negotiate the minefields of conflicting technologies that litter the storage arena, all in an effort to help IT managers create a solid foundation for coming decades.  Meer
56,14
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780135264201 29-12-2020
Through this guide's carefully constructed explanations and examples, you will develop an understanding of Swift grammar and the elements of effective Swift style - all thoroughly revised for Swift 5.  Meer
50,14
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780135292723 13-12-1997
Reliable Object-Oriented Software presents the underlying principles associated with object-orientation and its practical application. More than just another text on methodology, this 1998 book focuses on the fundamental concepts related to the process of software development and architectural design in order to lay the basis necessary for the development of robust, maintainable, and evolvable software.  Meer
89,11
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780128146231 13-3-2019
Meta-Analytics: Consensus Approaches and System Patterns for Data Analysis presents an exhaustive set of patterns for data science to use on any machine learning based data analysis task.  Meer
75,34
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780128200247 28-5-2020
Advances in Computational Techniques for Biomedical Image Analysis: Methods and Applications focuses on post-acquisition challenges such as image enhancement, detection of edges and objects, analysis of shape, quantification of texture and sharpness, and pattern analysis.  Meer
159,40
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780136502142 25-8-2020
Today, JavaScript is radically different and more powerful than ever. In an environment where user interfaces are increasingly web-based, it’s become the “lingua franca” of the web browser.  Meer
50,14
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780136733720 7-3-2022
This is Cisco's official, comprehensive self-study resource for Ciscos CLCEI 300-820 exam (Implementing Cisco Collaboration Cloud and Edge Solutions), one of the most popular concentration exams required for the Cisco Certified Network Professional (CCNP) Collaboration certification.  Meer
76,54
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780128228449 5-8-2021
The field of computational intelligence has grown tremendously over that past five years, thanks to evolving soft computing and artificial intelligent methodologies, tools and techniques for envisaging the essence of intelligence embedded in real life observations.  Meer
185,80
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780128226889 24-1-2022
The Optimum-Path Forest (OPF) classifier was first published in 2008 in its supervised and unsupervised versions with applications in medicine and image classification.  Meer
163,-
Verwachte levertijd ongeveer 9 werkdagen
GebondenEngels9780123704795 1-6-2007
IPv6 Advanced Protocols Implementation is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not specific to IPv6 but are extended to support IPv6.  Meer
93,34
Verwachte levertijd ongeveer 9 werkdagen
GebondenEngels9780123725127 28-7-2011
Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems.  Meer
88,54
Verwachte levertijd ongeveer 9 werkdagen
GebondenEngels9780124114746 28-1-2014
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments.  Meer
119,74
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden