Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Nieuw in Computer en informatica

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-23%
Peter Flach
€ 67,44
€ 51,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
Op voorraad | Vandaag voor 21:00 besteld, morgen in huis | Gratis verzonden
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 53 van 50.284 resultaten
Alle producten
gebondenEngels9780412757402 31-3-1996
A wide range of modern computer applications require the performance and flexibility of parallel and distributed systems. Better software support is required if the technical advances in these systems are to be fully exploited by commerce and industry.  Meer
240,99
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780367447588 2-12-2019
The human face is perhaps the most familiar and easily recognized object in the world, yet both its three-dimensional shape and its two-dimensional images are complex and hard to characterize.  Meer
81,35
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780367447618 10-7-2020
55,97
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780367559250 30-5-2022
The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT.  Meer
70,07
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780367702175 4-10-2024
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.  Meer
74,60
Verwachte levertijd ongeveer 8 werkdagen
gebondenEngels9780387744803 11-11-2008
This book intends to inculcate the innovative ideas for the scheduling aspect in distributed computing systems. Although the models in this book have been designed for distributed systems, the same information is applicable for any type of system.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387779959 2-6-2008
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
GebondenEngels9780367710859 17-8-2022
Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography. Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the presentation emphasises the essential mathematical nature of the computations and arguments involved in cryptography.  Meer
118,01
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780367711504 9-5-2022
Represents a substantial research contribution to state-of-the-art solutions for addressing the threats to Confidentiality, Integrity, and Availability (CIA Triad) in high-performance computing (HPC) environments.  Meer
141,98
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780367764791 8-10-2024
Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach.  Meer
29,53
Verwachte levertijd ongeveer 16 werkdagen
gebondenEngels9780387848099 26-10-2009
Thistwo-volumebookisthepublishedproceedingsofthe17thInternationalConferenceonInformation SystemsDevelopment(ISD2008)thatwashostedbytheDepartmentofComputerScienceoftheU- versityofCyprusattheAnnabelleHotel,Paphos,Cyprus,from25–27August2008.  Meer
360,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387848174 17-11-2010
The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and efficiency.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387848181 28-4-2009
The European Computing Conference offers a unique forum for establishing new collaborations within present or upcoming research projects, exchanging useful ideas, presenting recent research results, participating in discussions and establishing new academic collaborations, linking university with the industry.  Meer
240,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387848211 13-8-2008
This book constitutes the proceedings of the 8th International Conference on Human Choice and Computers held in Pretoria, South Africa. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780367658540 30-9-2020
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants.  Meer
61,61
Verwachte levertijd ongeveer 11 werkdagen
gebondenEngels9780387876849 29-9-2008
Knowledge existing in modern information systems usually comes from many sources and is mapped in many ways. There is a real need for representing “knowledge pieces” as rather universal objects that should fit to multi-purpose a- ing systems.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387879680 4-12-2008
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387887340 28-4-2009
Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information.  Meer
186,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387887524 4-8-2009
From Combinatorics to Philosophy: The Legacy of G. -C. Rota provides an assessment of G. -C. Rota's legacy to current international research issues in mathematics, philosophy and computer science.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387887548 28-4-2009
Access to Mobile Services focuses on methods for accessing broadcast based M-services from multiple wireless channels. This book presents a novel infrastructure that provides a multi-channel broadcast framework for mobile users to effectively discover and access composite M-services.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden