Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. ...Lees meer
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has...Lees meer
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data...Lees meer
Efficient access to data, sharing data, extracting information from data, and making use of the information have become urgent needs for today's corpo...Lees meer
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provide...Lees meer
As the information contained in databases has become a critical resource in organizations, efficient access to that information and the ability to sha...Lees meer
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical di...Lees meer
Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial pro...Lees meer
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has...Lees meer
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defens...Lees meer
Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial pro...Lees meer
Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for ...Lees meer
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defens...Lees meer
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provena...Lees meer
There is now so much data on the Web that managing it with conventional tools is becoming almost impossible. To manage this data, provide interoperabi...Lees meer
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mini...Lees meer
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications,...Lees meer