Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
We gebruiken cookies om:
De website vlot te laten werken, de beveiliging te verbeteren en fraude te voorkomen
Inzicht te krijgen in het gebruik van de website, om zo de inhoud en functionaliteiten ervan te verbeteren
Je op externe platformen de meest relevante advertenties te kunnen tonen
Je cookievoorkeuren
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book surveys current methods used to create real-looking objects in the computer. The text provides a solid foundational math introduction to cur...Lees meer
This is a book for those wishing to understand how today's computer graphics create such realistic objects and animations. It emphasizes the mathemati...Lees meer
Compression is an option naturally selected when faced with problems of high costs or restricted space. This book offers readers a succinct and reader...Lees meer
An invaluable reference and guide for all computer scientists, software engineers, and professional programmers needing a concise collection of compre...Lees meer
"Why is 'lEX so hard to use?" is the most frequent comment/complaint made by (frustrated) 'lEX users. The answer: Because it is programmable (has many...Lees meer
A comprehensive textbook on Computer Security for advanced undergraduates and non-experts. This reader-friendly introduction to the subject requires n...Lees meer
Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD-ROMs, and from coding theory to image a...Lees meer
Coding is a highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of...Lees meer
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer u...Lees meer
Penguin lovers and young nonfiction fans will enjoy following one penguin couple through their efforts to raise a family of chicks in this engaging St...Lees meer
This book presents a broad overview of computer graphics (CG), its history, and the hardware tools it employs. Covering a substantial number of concep...Lees meer
This book surveys current methods used to create real-looking objects in the computer. The text provides a solid foundational math introduction to cur...Lees meer
Coding is a highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of...Lees meer
A comprehensive textbook on Computer Security for advanced undergraduates and non-experts. This reader-friendly introduction to the subject requires n...Lees meer
Penguin lovers and young nonfiction fans will enjoy following one penguin couple through their efforts to raise a family of chicks in this engaging St...Lees meer
Panda lovers will love following a giant panda and her cub in this engaging Science Reader from Step into Reading. Full of incredible photos and panda...Lees meer
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-kn...Lees meer
Computer graphics are part of everyone's lives via feature films, advertisements, computers, PDAs, mobile phones, digital photography and more. This b...Lees meer
An essential resource and monograph for all security researchers and practitioners who want to understand and effectively use 'both' information hidin...Lees meer
Imperialismus definieren die Autoren als eine 'offene oder latente Gewaltpolitik zur externen Absicherung eines internen Regimes' und als zentralen Be...Lees meer