Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
We gebruiken cookies om:
De website vlot te laten werken, de beveiliging te verbeteren en fraude te voorkomen
Inzicht te krijgen in het gebruik van de website, om zo de inhoud en functionaliteiten ervan te verbeteren
Je op externe platformen de meest relevante advertenties te kunnen tonen
Je cookievoorkeuren
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Wil je zeker zijn dat je cadeautjes op tijd onder de kerstboom liggen? Onze winkels ontvangen jou met open armen. Nu met extra openingsuren op zondag!
Afhalen na 1 uur in een winkel met voorraad
Gratis thuislevering in België vanaf € 30
Ruim aanbod met 7 miljoen producten
Wil je zeker zijn dat je cadeautjes op tijd onder de kerstboom liggen? Onze winkels ontvangen jou met open armen. Nu met extra openingsuren op zondag!
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Sy...Lees meer
This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis...Lees meer
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize tha...Lees meer
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, ope...Lees meer
Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management to secure persona...Lees meer
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentraliz...Lees meer
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presen...Lees meer
Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. This boo...Lees meer
This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book...Lees meer
Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been ...Lees meer
While virus scanners and firewalls have visible benefits and remain virtually unnoticed during normal operations, the situation is different with intr...Lees meer
A number of issues combine to make network protocol development significantly more difficult than other areas of computer programming. The combination...Lees meer
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individ...Lees meer
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prev...Lees meer
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looki...Lees meer
Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Many malicious attacks on critical infrastructures ...Lees meer
Now that the internet is omnipresent, companies have increasingly put critical resources online, giving rise to the activities of cyber criminals. Thi...Lees meer
The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and inter...Lees meer
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support a...Lees meer
In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management -- including contingency planning, outl...Lees meer
This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and ...Lees meer
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastr...Lees meer
Impacts and Risk Assessment of Technology for Internet Security-Enabled Information Small-Medium Enterprises details the key impacts and risk assessme...Lees meer