Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the ...Lees meer
This book provides a comprehensive guide to integrating Artificial Intelligence (AI), Large Language Models (LLMs), and quantum-safe security mechanis...Lees meer
This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contrib...Lees meer
This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different di...Lees meer
This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographi...Lees meer
This book focuses on security issues in the IoT environment. It analyzes the security problems of each layer separately and try to identity solutions....Lees meer
This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different di...Lees meer
This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contrib...Lees meer
This book provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the ...Lees meer
This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographi...Lees meer
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabil...Lees meer