Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
We gebruiken cookies om:
De website vlot te laten werken, de beveiliging te verbeteren en fraude te voorkomen
Inzicht te krijgen in het gebruik van de website, om zo de inhoud en functionaliteiten ervan te verbeteren
Je op externe platformen de meest relevante advertenties te kunnen tonen
Je cookievoorkeuren
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Wil je zeker zijn dat je cadeautjes op tijd onder de kerstboom liggen? Onze winkels ontvangen jou met open armen. Nu met extra openingsuren op zondag!
Afhalen na 1 uur in een winkel met voorraad
Gratis thuislevering in België vanaf € 30
Ruim aanbod met 7 miljoen producten
Wil je zeker zijn dat je cadeautjes op tijd onder de kerstboom liggen? Onze winkels ontvangen jou met open armen. Nu met extra openingsuren op zondag!
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how ...Lees meer
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquia...Lees meer
Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how ...Lees meer
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environmen...Lees meer
This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deploying e...Lees meer
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or ...Lees meer
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database...Lees meer
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptog...Lees meer
This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical ...Lees meer
Digital forensic science , or digital forensics , is the application of scientific tools and methods to identify, collect, and analyze digital (data) ...Lees meer
The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published dat...Lees meer
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or ...Lees meer
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conduc...Lees meer
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of th...Lees meer
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at a...Lees meer
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authenticatio...Lees meer
Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, pow...Lees meer
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database...Lees meer
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis a...Lees meer
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that u...Lees meer
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myri...Lees meer
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The cur...Lees meer
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis a...Lees meer
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conduc...Lees meer