Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,21
€ 36,95
-27%
Christine Alvarado
€ 80,06
€ 58,95
-24%
€ 58,69
€ 44,95
-25%
Peter Flach
€ 67,32
€ 50,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,83
1
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
2
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, morgen in huis | Gratis verzonden
4
Engineering Secure Devices
Dominik Merli
Engineering Secure Devices
81,21
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 135 van 50.494 resultaten
Alle producten
gebondenEngels9780387232539 26-10-2004
The work described in this book was first presented at the Second Workshop on Genetic Programming, Theory and Practice, organized by the Center for the Study of Complex Systems at the University of Michigan, Ann Arbor, 13-15 May 2004.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387232645 24-10-2005
As we were at pains to point out in the companion volume to this mo- graph, entitled Complexity in Chemistry: Introduction and Fundamentals, complexity is to be encountered just about everywhere.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387234021 4-11-2004
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387236810 30-3-2005
This text is a light technical introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking), compressive encoding of digital media, and Internet protocol and services.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387243412 6-7-2005
As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387243436 27-7-2005
This study investigates the impacts and risk assessment of technology-ena­ bled information (TET), v^hich are engaged in the process of discovering the opportunities and challenges presented by TEI to the new form of small medi­ um enterprises (SME) business transactions: Technology Enable Information Small Medium Enterprises (TEISME).  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387243634 16-8-2006
It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech­ niques.  Meer
126,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387243863 11-7-2006
Evolvable hardware (EHW) refers to hardware whose architecture/structure and functions change dynamically and autonomously in order to improve its performance in carrying out tasks.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387954257 30-5-2006
1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387955049 6-5-2005
Computer graphics games and animations have been popular for over a decade, and personal computers have now evolved to support real-time, realistic-looking interactive games.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
GebondenEngels9780412246203 1-4-1986
Although there has been a surge of interest in density estimation in recent years, much of the published research has been concerned with purely technical matters with insufficient emphasis given to the technique's practical value.  Meer
183,98
Verwachte levertijd ongeveer 11 werkdagen
gebondenEngels9780387261027 15-3-2006
Continuous System Simulation describes systematically and methodically how mathematical models of dynamic systems, usually described by sets of either ordinary or partial differential equations possibly coupled with algebraic equations, can be simulated on a digital computer.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387261096 1-7-2005
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780412377709 1-1-1991
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387295510 17-11-2005
Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387308159 27-1-2006
This book is a collection of selected proceedings from the EUNICE Summer School which took place in Colmenarejo in July of 2005. The book explores the theme of Networked Applications in depth.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387972992 23-4-1990
More than anything else, this book is a tribute to Edsger W. Dijkstra, on the occasion of his sixtieth birthday, by just a few of those fortunate enough to be influenced by him and his work and to be called his friend or relation, his master, colleague, or pupil.  Meer
241,-
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387973432 26-6-1990
Making a diagnosis when something goes wrong with a natural or m- made system can be difficult. In many fields, such as medicine or electr- ics, a long training period and apprenticeship are required to become a skilled diagnostician.  Meer
122,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9780387973500 26-6-1990
In 1965 Juris Hartmanis and Richard E. Stearns published a paper "On the Computational Complexity of Algorithms". The field of complexity theory takes its name from this seminal paper and many of the major concepts and issues of complexity theory were introduced by Hartmanis in subsequent work.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
paperbackEngels9780387973869 21-12-1990
In this book a global shape model is developed and applied to the analysis of real pictures acquired with a visible light camera under varying conditions of optical degradation.  Meer
122,99
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden