Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
The burnout rate of a Chief Information Security Officer (CISO) is pegged at about 16 months. In other words, that is what the average tenure of a CIS...Lees meer
Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the ...Lees meer
Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all...Lees meer
The burnout rate of a Chief Information Security Officer (CISO) is pegged at about 16 months. In other words, that is what the average tenure of a CIS...Lees meer
Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back ...Lees meer
Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, inc...Lees meer
Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, inc...Lees meer
Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all...Lees meer
The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched...Lees meer
The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with...Lees meer
The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with...Lees meer
This book is a second edition. The last one reviewed the evolution of the Cloud, important Cloud concepts and terminology, and the threats that are po...Lees meer
The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched...Lees meer