Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Nieuw in Computer en informatica

Aanbiedingen in Computer en informatica

-54%
Ben Frain
€ 81,19
€ 37,95
-26%
Christine Alvarado
€ 80,04
€ 59,95
-22%
€ 58,67
€ 45,95
-26%
Luciano Floridi
€ 46,71
€ 34,95

TOP 5 Computer en informatica

Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Gratis verzonden | Op voorraad | Vandaag voor 23:00 besteld, morgen in huis
1
Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,81
Gratis verzonden | Op voorraad | Vandaag voor 21:00 besteld, morgen in huis
2
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Gratis verzonden | Op voorraad | Vandaag voor 23:00 besteld, morgen in huis
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Gratis verzonden | Op voorraad | Vandaag voor 23:00 besteld, morgen in huis
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 2464 van 50.234 resultaten
Alle producten
paperbackEngels9783642340048 14-9-2012
This book constitutes the thoroughly refereed post-workshop proceedings of the 9th International Workshop on Rewriting Logic and its Applications, WRLA 2012, held as a satellite event of ETAPS 2012, in Tallinn, Estonia, in March 2012.  Meer
56,20
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642340253 11-9-2012
The two-volume set LNCS 7609 and 7610 constitutes the thoroughly refereed proceedings of the 5th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, held in Heraklion, Crete, Greece, in October 2012.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642423321 11-10-2014
Due to inherent limitations in human sensing organs, most data collected for various purposes contain uncertainties. Even at the rare occasions when accurate data are available, the truthful predictions derived on the data tend to create chaotic consequences.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642348617 21-10-2012
This book constitutes the refereed proceedings of the First Mediterranean Conference on Algorithms, MedAlg 2012, held in Kibbutz Ein Gedi, Israel, in December 2012.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642348822 13-10-2012
This book constitutes the refereed proceedings of the 5th International Conference on Internet and Distributed Computing Systems, IDCS 2012, held in Wuyishan, Fujian, China, in November 2012.  Meer
56,20
Verwachte levertijd ongeveer 9 werkdagen
paperbackDuits9783658125363 29-2-2016
Auf dem Gebiet der Petri-Netze und Vektoradditionssysteme sind viele Entscheidungsfragen ungeklärt, die Uli Schlachter in seiner Masterarbeit motiviert haben, Spiele auf sogenannten Spielstrukturen mit einer ähnlichen Semantik zu untersuchen.  Meer
57,06
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642351693 23-11-2012
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 13th International Middleware Conference, held in Montreal, Canada, in December 2012.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642351785 9-11-2012
These Transactions publish archival papers in the broad area of Petri nets and other models of concurrency, ranging from theoretical work to tool support and industrial applications.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642351969 28-10-2012
This book constitutes the proceedings of the First International Conference on Intelligent Robotics and Manufacturing, IRAM 2012, held in Kuala Lumpur, Malaysia, in November 2012.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9783642352072 20-12-2012
Information and communication technology, in particular artificial intelligence, can be used to support economy and commerce using digital means. This book is about agents and multi-agent distributed systems applied to digital economy and e-commerce to meet, improve, and overcome challenges in the digital economy and e-commerce sphere.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackDuits9783658126094 16-2-2016
Jürgen Hölsch erarbeitet einen neuen Ansatz zur Optimierung von verschachtelten SQL-Anfragen (Nested Queries), einem wichtigen Teilgebiet der Datenbankforschung.  Meer
57,06
Verwachte levertijd ongeveer 9 werkdagen
paperbackDuits9783658126117 22-2-2016
Das primäre Ziel von Peter Gewald ist die Erkennung und Visualisierung diverser Angriffsszenarien im Mobilfunkbereich, wie z. B. die Kontrolle über den Datenverkehr, Man-in-the-Middle-Angriffe sowie die Ausführung von Programmcodes über SMS.  Meer
57,06
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642352638 29-10-2012
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642353130 14-12-2012
The volume contains the papers presented at FICTA 2012: International Conference on Frontiers in Intelligent Computing: Theory and Applications held on December 22-23, 2012 in Bhubaneswar engineering College, Bhubaneswar, Odissa, India.  Meer
240,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackDuits9783642625060 29-10-2012
Know-how zur Abwehr von Hacker-Angriffen Mehr Sicherheit für Netze, Systeme und Anwendungen Praxis-Leitfaden mit konzeptionellem Ansatz Anschaulich durch zeitlose Beispiele Ein Wettbewerb der Hacker?  Meer
45,84
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642625138 5-11-2012
An overview of recent developments in high performance computing and simulation, with special emphasis on the industrial relevance of the presented results and methods.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackDuits9783642625596 21-10-2012
Dieses Buch bietet allen, die mit Lehrmaterialien für selbstgesteuerte Lernprozesse betraut sind, ein didaktisches Rahmenkonzept und praktische Hinweise.  Meer
62,67
Verwachte levertijd ongeveer 9 werkdagen
paperbackDuits9783642625879 24-9-2012
Sicherheits-Methoden werden bei weltweit verbreiteten, vernetzten e-Commerce-Aktivitäten immer wichtiger. In diesem Buch werden die verfügbaren Methoden dargestellt, die es ermöglichen, Gefahren wie etwa Angriffen aus dem Netz vorzubeugen und die Technik zu einem effektiven Element einer sicheren, zuverlässigen elektronischen Infrastruktur zu machen.  Meer
51,46
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642437373 28-11-2014
An active robot system can change its visual parameters in an intentional manner and perform its sensing actions purposefully. A general vision task thus can be performed in an efficient way by means of strategic control of the perception process.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642437380 9-11-2014
Products of modern artificial intelligence (AI) have mostly been formed by the views, opinions and goals of the “insiders”, i.e. people usually with engineering background who are driven by the force that can be metaphorically described as the pursuit of the craft of Hephaestus.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden