Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-23%
Peter Flach
€ 67,44
€ 51,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 95 van 50.278 resultaten
Alle producten
paperbackEngels9780470196113 27-1-2009
If you ve dreamed about having a customized multimedia PC or one tricked out for your favorite games, build your own and make your dreams come true!  Meer
30,11
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780470212844 28-4-2010
This is an excellent resource for programmers who need to learn Java but aren′t interested in just reading about concepts. Introduction to Java Programming with Games follows a spiral approach to introduce concepts and enable them to write game programs as soon as they start.  Meer
229,34
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780443140365 11-12-2024
A Practical Introduction to Virtual Reality: From Concepts to Executables is written for the undergraduate computer science student taking a course in virtual reality.  Meer
84,94
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780443140846 22-2-2024
Engineering Simulation and its Applications: Algorithms and Numerical Methods covers the essential quantitative methods needed for engineering simulations, introducing optimization techniques that can be used in the design of systems to minimize cost and maximize efficiency.  Meer
187,-
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780443190353 16-2-2023
Hamiltonian Monte Carlo Methods in Machine Learning introduces methods for optimal tuning of HMC parameters, along with an introduction of Shadow and Non-canonical HMC methods with improvements and speedup.  Meer
193,-
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780443190377 15-2-2024
Federated Learning: Theory and Practi ce provides a holisti c treatment to federated learning as a distributed learning system with various forms of decentralized data and features.  Meer
131,80
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780443154416 18-3-2024
Machine Learning and Noisy Labels: Definitions, Theory, Techniques and Solutions provides an ideal introduction to machine learning with noisy labels that is suitable for senior undergraduates, post graduate students, researchers and practitioners using, and researching, machine learning methods.  Meer
116,14
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387952505 12-4-2002
Term rewriting techniques are applicable in various fields of computer sci­ ence: in software engineering (e.g., equationally specified abstract data types), in programming languages (e.  Meer
61,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387952611 10-7-2002
The explosive growth of the Internet has spawned a new era of security concerns. This dictionary provides reliable definitions and descriptions of Internet security terms in clear and precise English.  Meer
61,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387256276 6-9-2006
Multimedia Database Retrieval: A Human-Centered Approach presents the latest development in user-centered methods and the state-of-the-art in visual media retrieval.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387964805 21-4-1989
Describes basic programming principles and their step-by- step applications.Numerous examples are included.  Meer
102,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387258867 29-11-2005
Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387258904 6-7-2005
Motion-Free Super-Resolution is a compilation of very recent work on various methods of generating super-resolution (SR) images from a set of low-resolution images.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
156,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387964898 28-3-1988
Well suited to medium-scale general purpose computing, the Unix time­ sharing operating system is deservedly popular with academic institutions, research laboratories, and commercial establishments alike.  Meer
122,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387261935 17-10-2005
Challenges arise when the size of a group of cooperating agents is scaled to hundreds or thousands of members. In domains such as space exploration, military and disaster response, groups of this size (or larger) are required to achieve extremely complex, distributed goals.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387261942 6-9-2005
Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
GebondenEngels9780367626174 18-10-2021
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges.  Meer
110,96
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780367780272 31-3-2021
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc.  Meer
70,07
Verwachte levertijd ongeveer 11 werkdagen
gebondenEngels9780387300443 25-6-2007
Process Assessment and Improvement: A Practical Guide, 2nd ed. provides a powerful and practical approach to improving organizations through process assessment, combined with people factors such as organizational culture and team-based improvement.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden