Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
By covering a wide range of algebraic, analytic, combinatorial, cryptographic, and geometric aspects of number theory, this text provides the most up-...Lees meer
Although sequent calculi constitute an important category of proof systems, they are not as well known as axiomatic and natural deduction systems. Add...Lees meer
This comprehensive handbook presents hundreds of classical theorems and proofs that span many areas, including basic equalities and inequalities, comb...Lees meer
Unlike most elementary books on matrices, A Combinatorial Approach to Matrix Theory and Its Applications employs combinatorial and graph-theoretical t...Lees meer
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that feature...Lees meer
Presents a study of frames and their application to this construction. This work introduces basic combinatorial structures and construction techniques...Lees meer
This handbook examines the dichotomy between the structure of products and their subgraphs. It also features the design of efficient algorithms that r...Lees meer
The origins of computation group theory (CGT) date back to the late 19th and early 20th centuries. Since then, the field has flourished, particularly ...Lees meer
By covering a wide range of algebraic, analytic, combinatorial, cryptographic, and geometric aspects of number theory, this text provides the most up-...Lees meer
Books on information theory and coding have proliferated over the last few years, but few succeed in covering the fundamentals without losing students...Lees meer
Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus on either mathematics or history. B...Lees meer
This book is the very first one in the English language dedicated to the Lambert W function, its generalizations, and its applications. One goal is to...Lees meer
The purpose of the book is to give a comprehensive and detailed introduction to the computational complexity of counting and sampling. The book consis...Lees meer
The Art of Proving Binomial Identities accomplishes two goals: (1) It provides a unified treatment of the binomial coefficients, and (2) Brings togeth...Lees meer
This book presents methods for the summation of infinite and finite series and the related identities and inversion relations. The summation includes ...Lees meer
The first thing readers will notice about this book is that it is fun to read. It is meant for browsers, for students, and for specialists wanting to ...Lees meer
On the surface, matrix theory and graph theory seem like very different branches of mathematics. However, adjacency, Laplacian, and incidence matrices...Lees meer
Covers the constructions of designs, existence results, properties of designs, and applications of designs. This book contains chapters on the history...Lees meer
Design Theory, Second Edition presents some of the most important techniques used for constructing combinatorial designs. It augments the descriptions...Lees meer
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Softwar...Lees meer
This text examines two interconnected topics: computational methods for computing bounds on three measures of network reliability; and a symbolic alge...Lees meer
Because of its portability and platform-independence, Java is the ideal computer programming language to use when working on graph algorithms and othe...Lees meer
The first thing readers will notice about this book is that it is fun to read. It is meant for browsers, for students, and for specialists wanting to ...Lees meer