Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
The book's author has been in the IT world for over 20 years and worked for numerous companies in Corporate America. He has experienced CISO burn-out....Lees meer
Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the ...Lees meer
The cyber threat landscape is changing constantly and corporations are looking to measure their level of risk and deciding how to insure against it. T...Lees meer
The book's author has been in the IT world for over 20 years and worked for numerous companies in Corporate America. He has experienced CISO burn-out....Lees meer
This book is about how to test Web based applications so that customers know that they are very safe to access them, and that their information and da...Lees meer
The cyber threat landscape is changing constantly and corporations are looking to measure their level of risk and deciding how to insure against it. T...Lees meer
The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched...Lees meer
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just t...Lees meer
The COVID-19 Pandemic has changed the entire world to levels that were not even thought of before. This publication is intended to be a how-to book to...Lees meer
The COVID-19 Pandemic has changed the entire world to levels that were not even thought of before. This publication is intended to be a how-to book to...Lees meer
In this second edition, the concepts of Microsoft Azure are discussed. How Microsoft is playing a huge role in Artificial Intelligence and Machine Lea...Lees meer
The goal of this book is to explore the ways and methods as to how AI can be used in cybersecurity, with an emphasis upon its subcomponents of machine...Lees meer