Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting....Lees meer
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to m...Lees meer
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect in...Lees meer
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared...Lees meer
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including bo...Lees meer
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including bo...Lees meer
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile netw...Lees meer
Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting....Lees meer
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared...Lees meer
Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the...Lees meer
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile netw...Lees meer