Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-25%
Peter Flach
€ 67,44
€ 50,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Redefining Hacking
Omar Santos
Redefining Hacking
59,74
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 93 van 50.279 resultaten
Alle producten
gebondenEngels9780857299345 26-8-2011
The focus from most Virtual Reality (VR) systems lies mainly on the visual immersion of the user. But the emphasis only on the visual perception is insufficient for some applications as the user is limited in his interactions within the VR.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780857299581 21-8-2011
For nonlinear dynamical systems, which represent the majority of real devices, any study of stability requires the investigation of the domain of attraction of an equilibrium point, i.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
PaperbackEngels9780849313462 13-11-2003
This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines all of the relevant information available on the Internet along with a number of arguments treated in the various books that are available, and provides many examples of LDAP code.  Meer
120,83
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849316784 26-2-2003
The PC Graphics Handbook serves advanced C++ programmers dealing with the specifics of PC graphics hardware and software. Discussions address:2D and 3D graphics programming for Windows and DOS Device-independent graphics Mathematics for computer graphics Graphics algorithms and procedural operations PC video systems architecture, including its history and development High-end graphics systems and coprocessors Artificial life Virtual reality Animation techniques for simulations and video games VGA, SuperVGA, and VESA Device drivers Graphics and animation primitives The authors cover the spectrum of PC graphics programming, including theoretical and practical topics - creating a singularly comprehensive resource for programmers.  Meer
290,04
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849318078 25-6-1998
Databases and database system design are in the midst of a major transition to object-oriented databases. Moving from relational database architecture to an object-oriented technology is the next logical step in database design.  Meer
198,39
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780833044679 25-12-2008
25,54
Verwachte levertijd ongeveer 16 werkdagen
GebondenEngels9780849328008 26-5-2005
Grid Database Design investigates the origin, background, and components of this new computing model. This book presents new concepts and analyzes pre-existing ideas in the context of Grid, educating organizations as to how Grid can increase their computing power and strengthen their operations.  Meer
149,05
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849328541 18-2-2005
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network infrastructure.  Meer
163,14
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849329975 28-11-2007
Grid computing is an emerging technology designed for high-powered applications. Grid Application Systems Design shows how to unleash the high performance of Grid technology.  Meer
149,05
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849333781 16-12-2005
The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker.  Meer
198,39
Verwachte levertijd ongeveer 11 werkdagen
46,12
Verwachte levertijd ongeveer 16 werkdagen
PaperbackEngels9780833078063 17-1-2013
22,65
Verwachte levertijd ongeveer 16 werkdagen
63,04
Verwachte levertijd ongeveer 16 werkdagen
GebondenEngels9780866568715 7-4-1989
This valuable new book reviews past research on authority control, offers new findings, and documents important considerations for automating authority control.  Meer
29,19
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849310263 18-1-2001
With the new developments in computer architecture, fairly recent publications can quickly become outdated. Computer Architecture: Software Aspects, Coding, and Hardware takes a modern approach.  Meer
156,09
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849312533 10-12-2002
As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security.  Meer
184,29
Verwachte levertijd ongeveer 11 werkdagen
PaperbackEngels9780849312700 28-5-2003
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks.  Meer
113,78
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849314797 23-12-2002
Unfortunately, much of what has been written about software engineering comes from an academic perspective which does not always address the everyday concerns that software developers and managers face.  Meer
268,89
Verwachte levertijd ongeveer 11 werkdagen
423,99
Verwachte levertijd ongeveer 11 werkdagen
GebondenEngels9780849316289 27-10-2003
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts.  Meer
170,19
Verwachte levertijd ongeveer 11 werkdagen

Rubrieken

    Personen

      Trefwoorden