Computer en informatica

Clemens Willemsen

Connectiviteit van consumentenapparaten door de jaren heen

Hoe zijn elektronische consumentenapparaten zoals de televisie en de personal computer de afgelopen (zeven) decennia fysiek aan elkaar gekoppeld?
24,95

Aanbiedingen in Computer en informatica

-55%
Ben Frain
€ 81,35
€ 36,95
-27%
Christine Alvarado
€ 80,20
€ 58,95
-24%
€ 58,79
€ 44,95
-23%
Peter Flach
€ 67,44
€ 51,95

TOP 5 Computer en informatica

Theory of Fun for Game Design
Raph Kostet
Theory of Fun for Game Design
50,91
1
Ik ben AI-geletterd!
Team VDM
Ik ben AI-geletterd!
24,99
Op voorraad | Vandaag voor 23:00 besteld, volgende dag in huis | Gratis verzonden
2
Prompten als een Pro
Bob van Duuren
Prompten als een Pro
34,99
Op voorraad | Vandaag voor 23:00 besteld, volgende dag in huis | Gratis verzonden
3
Geavanceerd ChatGPT, 3e editie
Bob van Duuren
Geavanceerd ChatGPT, 3e editie
34,99
Op voorraad | Vandaag voor 23:00 besteld, volgende dag in huis | Gratis verzonden
4
Exam Ref SC-300 Microsoft Identity and Access Administrator
Razi Rais
Exam Ref SC-300 Microsoft Identity and Access Administrator
50,14
5

Online magazine

Jan Pelzl, Tim Guneysu

Understanding Cryptography

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited <b>second edition</b> of <b><i>Understanding Cryptography </i></b>follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. <b>Topics and features:</b> -Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest -Helps develop a comprehensive understanding of modern applied cryptography -Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families -Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion -Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum -Supplies up-to-date security parameters for all cryptographic algorithms -Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
84,99
Bekijk resultaten in...
Alle producten Managementboeken Seminars + Trainingen Online magazine Sale

Filter de resultaten

Actieve filters 1

Computer en informatica

Managementrubriek

Toon meer

Aanbevolen

Producten

Taal

Toon meer

Serie

Toon meer

Ministerie

Trefwoorden

Toon meer

Prijs

-
Toon resultaten
Filteren 1
Sorteren
Pagina 153 van 50.278 resultaten
Alle producten
gebondenEngels9781402078897 14-7-2004
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library.  Meer
159,40
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402078941 11-6-2004
Automatic Quantum Computer Programming provides an introduction to quantum computing for non-physicists, as well as an introduction to genetic programming for non-computer-scientists.  Meer
156,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402079009 23-4-2004
The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402079283 14-7-2004
Design of System on a Chip is the first of two volumes addressing the design challenges associated with new generations of the semiconductor technology.  Meer
153,34
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402079450 30-4-2004
Systematic Design of Sigma-Delta Analog-to-Digital Converters describes the issues related to the sigma-delta analog-to-digital converters (ADCs) design in a systematic manner: from the top level of abstraction represented by the filters defining signal and noise transfer functions (STF, NTF), passing through the architecture level where topology-related performance is calculated and simulated, and finally down to parameters of circuit elements like resistors, capacitors, and amplifier transconductances used in individual integrators.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402079863 28-4-2004
Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402079900 15-12-1996
Contributions on UML address the application of UML in the specification of embedded HW/SW systems. C-Based System Design embraces the modeling of operating systems, modeling with different models of computation, generation of test patterns, and experiences from case studies with SystemC.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402079962 15-9-1991
The development of any Software (Industrial) Intensive System, e.g. critical embedded software, requires both different notations, and a strong devel- ment process.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080234 28-5-2004
I am glad to see this new book on the e language and on verification. I am especially glad to see a description of the e Reuse Methodology (eRM). The main goal of verification is, after all, finding more bugs quicker using given resources, and verification reuse (module-to-system, old-system-to-new-system etc.  Meer
240,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080425 19-5-2004
Flexible Neuro-Fuzzy Systems is the first professional literature about the new class of powerful, flexible fuzzy systems. The author incorporates various flexibility parameters to the construction of neuro-fuzzy systems.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080470 22-7-2004
3D Face Processing: Modeling, Analysis and Synthesis introduces the frontiers of 3D face processing techniques. It reviews existing 3D face processing techniques, including techniques for 3D face geometry modeling; 3D face motion modeling; and 3D face motion tracking and animation.  Meer
240,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080494 1-6-2004
The last decade has seen a tremendous growth in the usage of the World Wide Web. The Web has grown so fast that it seems to be becoming an unusable and slow behemoth.  Meer
96,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080517 1-10-2004
Perhaps nothing characterizes the inherent heterogeneity in embedded sys­ tems than the ability to choose between hardware and software implementations of a given system function.  Meer
192,94
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080579 30-6-2004
As information technologies become increasingly distributed and accessible to larger number of people and as commercial and government organizations are challenged to scale their applications and services to larger market shares, while reducing costs, there is demand for software methodologies and appli- tions to provide the following features: Richer application end-to-end functionality; Reduction of human involvement in the design and deployment of the software; Flexibility of software behaviour; and Reuse and composition of existing software applications and systems in novel or adaptive ways.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080678 30-6-2004
One of the grand challenges in the nano-scopic computing era is guarantees of robustness. Robust computing system design is confronted with quantum physical, probabilistic, and even biological phenomena, and guaranteeing high reliability is much more difficult than ever before.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080692 27-7-2004
Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080852 6-7-2004
JR is an extension of the Java programming language with additional concurrency mechanisms based on those in the SR (Synchronizing Resources) programming language.  Meer
60,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080890 1-9-2004
Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.  Meer
180,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402080968 15-6-2004
Palmprint Authentication is the first book to provide a comprehensive introduction to palmprint technologies. It reveals automatic biometric techniques for personal identification using palmprint, from the approach based on offline palmprint images, to the current state-of-the-art algorithm using online palmprint images.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen
gebondenEngels9781402081149 21-7-2004
Content-Based Analysis Of Digital Video focuses on fundamental issues underlying the development of content access mechanisms for digital video. It treats topics that are critical to successfully automating the video content extraction and retrieval processes, and includes coverage of: - Video parsing, - Video content indexing and representation, - Affective video content analysis.  Meer
120,99
Verwachte levertijd ongeveer 9 werkdagen

Rubrieken

    Personen

      Trefwoorden