Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,21
€ 36,95
-27%
Christine Alvarado
€ 80,06
€ 58,95
-24%
€ 58,69
€ 44,95
-25%
Peter Flach
€ 67,32
€ 50,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,83
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Redefining Hacking
Omar Santos
Redefining Hacking
59,74
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 115 van 50.278 resultaten
Alle producten
gebondenEngels9780387228518 30-8-2004
Mobility is perhaps the most important market and technological trend within information and communication technology. With the advent of new mobile infrastructures providing higher bandwidth and constant connection to the network from virtually everywhere, the way people use information resources is predicted to be radically transformed.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387231518 28-10-2004
Data Mining is the process of posing queries and extracting useful information, patterns and trends previously unknown from large quantities of data [Thu, 00].  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387231976 28-10-2004
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con'2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387232270 19-11-2004
There are two groups of researchers who are interested in designing network protocols and who cannot (yet) effectively communicate with one another c- cerning these protocols.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387232539 26-10-2004
The work described in this book was first presented at the Second Workshop on Genetic Programming, Theory and Practice, organized by the Center for the Study of Complex Systems at the University of Michigan, Ann Arbor, 13-15 May 2004.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387233895 21-10-2004
QoS is an important subject which occupies a central place in overall packet network technologies.  A complex subject, its analysis involves such mathematical disciplines as probability, random variables, stochastic processes and queuing.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387233987 12-11-2004
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387951058 9-11-2001
Close this book for a moment and look around you. You scan the scene by directing your attention, and gaze, at certain specific objects. Despite the background, you discern them.  Meer
61,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387951065 26-6-2001
This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387951096 14-12-2001
This book contains both relevant real-world research, as well as reviews of different areas of interest in the software engineering literature, such as clone identification.  Meer
72,94
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387951133 10-1-2001
An essential reader containing the 25 most important papers in the development of modern operating systems for computer science and software engineering.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387239163 10-12-2004
How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial efforts have advanced the notion of a "trusted computing platform" as a building block.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387242484 10-2-2005
Fuzzy Database Modeling with XML aims to provide a single record of current research and practical applications in the fuzzy databases. This volume is the outgrowth of research the author has conducted in recent years.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387952505 12-4-2002
Term rewriting techniques are applicable in various fields of computer sci­ ence: in software engineering (e.g., equationally specified abstract data types), in programming languages (e.  Meer
61,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387952611 10-7-2002
The explosive growth of the Internet has spawned a new era of security concerns. This dictionary provides reliable definitions and descriptions of Internet security terms in clear and precise English.  Meer
61,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387952727 31-7-2002
This Handbook fills the gaps of Open Geometry by explaining new methods, techniques and various examples. One its main strengths is that it enables the reader to learn about Open Geometry by working through examples.  Meer
204,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387952734 8-1-2004
After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.  Meer
220,59
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387953212 13-6-2002
A brief but comprehensive introduction to the field and pragmatic guidance on the implementation of a sound quality system in the organization. It provides an enhanced knowledge of software inspections, metrics, process involvement, assessment of organization, problem solving, customer satisfaction surveys, the CMM, SPICE, and formal methods.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387955681 30-4-2003
This book is intended for students, researchers, and professionals interested in evolutionary algorithms at graduate and postgraduate level. No mathematics beyond basic algebra and Cartesian graphs methods is required, as the aim is to encourage applying the JAVA toolkit to develop an appreciation of the power of these techniques.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387960715 1-12-1985
In wntmg this monograph my aim has been to present a "geometric" approach to the structural synthesis of multivariable control systems that are linear, time-invariant and of finite dynamic order.  Meer
204,99
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden