Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Nieuw in Computer en informatica

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-23%
Peter Flach
€ 67,44
€ 51,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
Op voorraad | Vandaag voor 21:00 besteld, morgen in huis | Gratis verzonden
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 2394 van 50.285 resultaten
Alle producten
paperbackEngels9783642394782 15-7-2013
This book constitutes the refereed conference proceedings of the 9th International Conference on Intelligent Computing, ICIC 2013, held in Nanning, China, in July 2013.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642394812 15-7-2013
This book constitutes the refereed proceedings of the 9th International Conference on Intelligent Computing, ICIC 2013, held in Nanning, China, in July 2013.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenDuits9783642545009 10-7-2014
Das Buch gibt eine detaillierte Anleitung zur Erstellung von Bildvorlagen für die Personalisierung und zeigt eine Vielzahl kreativer Gestaltungsmöglichkeiten auf.  Meer
32,39
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642545245 4-3-2014
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642545672 2-4-2014
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013).  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenDuits9783642545788 29-7-2014
Die sechste Auflage dieses Standardwerks wurde vollständig überarbeitet und deutlich erweitert. Der gestiegene Umfang des Werkes machte eine Aufteilung in vier Bände erforderlich.  Meer
40,24
Verwachte levertijd ongeveer 9 werkdagen
gebondenDuits9783642545825 29-7-2014
Die sechste Auflage dieses Standardwerks wurde vollständig überarbeitet und deutlich erweitert. Der gestiegene Umfang des Werkes machte eine Aufteilung in vier Bände erforderlich.  Meer
40,24
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9783642546129 8-4-2014
“Autonomous manipulation” is a challenge in robotic technologies. It refers to the capability of a mobile robot system with one or more manipulators that performs intervention tasks requiring physical contacts in unstructured environments and without continuous human supervision.  Meer
144,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642267253 13-11-2014
The present book includes a set of selected extended papers from the first International Joint Conference on Computational Intelligence (IJCCI 2009), held in Madeira, Portugal, from 5 to 7 October 2009.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642546303 3-3-2014
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9783642546426 7-7-2014
Structures placed on hillsides often present a number of challenges and a limited number of economical choices for site design. An option sometimes employed is to use the building frame as a retaining element, comprising a Rigidly Framed Earth Retaining Structure (RFERS).  Meer
204,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642270413 29-11-2013
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642402340 8-8-2013
This book constitutes the refereed proceedings of the 13th International Symposium on Spatial and Temporal Databases, SSTD 2013, held in Munich, Germany, in August 2013.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642272004 29-11-2011
The two volume set, CCIS 265 and 266, constitutes the refereed proceedings of the International Conference, FGCN 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, Jeju Island, Korea, in December 2011.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9783642272806 12-1-2012
The three-volume set IFIP AICT 368-370 constitutes the refereed post-conference proceedings of the 5th IFIP TC 5, SIG 5.1 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2011, held in Beijing, China, in October 2011.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackDuits9783642625879 24-9-2012
Sicherheits-Methoden werden bei weltweit verbreiteten, vernetzten e-Commerce-Aktivitäten immer wichtiger. In diesem Buch werden die verfügbaren Methoden dargestellt, die es ermöglichen, Gefahren wie etwa Angriffen aus dem Netz vorzubeugen und die Technik zu einem effektiven Element einer sicheren, zuverlässigen elektronischen Infrastruktur zu machen.  Meer
51,46
Verwachte levertijd ongeveer 9 werkdagen
paperbackDuits9783642626272 15-4-2014
Dieses Buch bietet sowohl eine anwendungsorientierte Einführung in die Programmiersprache C als auch eine moderne, strukturierte Herangehensweise an die Softwareentwicklung.  Meer
57,06
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642275753 16-1-2012
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9783642276538 18-1-2012
This Festschrift volume has been published in honor of Cristian Calude on the occasion of his 60th birthday and contains contributions from invited speakers and regular papers presented at the International Workshop on Theoretical Computer Science, WTCS 2012, held in Auckland, New Zealand, in February 2012.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9783642276620 13-6-2012
Our increasingly smart environments will sense, track and model users and provide them with personalized services. We can already embed computers in everyday objects such as shirt buttons and pencils; objects of all sizes, from wristwatches to billboards, will soon incorporate high-quality flexible displays; we have improved access to wireless Internet communication; and we are now transitioning from traditional linear to targeted interactive media.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden