Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book provides a line of communication between academia and end users/practitioners to advance forensic science and boost its contribution to crim...Lees meer
In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobi...Lees meer
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of cr...Lees meer
The current policing landscape has seen the rise in serious and organized crime across the globe. Criminals are innovating in real-time leveraging cyb...Lees meer
Nigeria has become one of the hotbeds of cybercrime since the liberalization of the telecommunication industry began in 1996. The scale and magnitude ...Lees meer
Since the end of bipolarism, the concept of asymmetric warfare, and of asymmetric conflict in general, has been increasingly applied with regard to ar...Lees meer
This edited compilation was written in the latter part of the Coronavirus pandemic of 2020, a watershed event in world history that illustrated wide-r...Lees meer
This book explores and analyzes the rapid pace of technological evolution in diplomatic, information, military, and economic sectors, which has contri...Lees meer
In a world of globalization and technological change, terrorism continues to pose grave threats not only to more traditional targets such as civilians...Lees meer
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terror...Lees meer
This book explains Europol's online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, and...Lees meer
The COVID-19 pandemic is not only a threat to our health and economy, but also has strong implications for defence and security. Indeed, defence leade...Lees meer
This book is intended to be used as a textbook and research reference for the field of nuclear nonproliferation. The book is primarily technical and f...Lees meer
What does it take to disrupt security? How does one disrupt the invisibility of insecurity? How does one make the invisible factors that define and im...Lees meer
What does it take to disrupt security? How does one disrupt the invisibility of insecurity? How does one make the invisible factors that define and im...Lees meer
This edited book examines the contemporary regional security concerns in the Asia-Pacific recognizing the 'Butterfly effect', the concept that small c...Lees meer
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first t...Lees meer
This book offers comprehensive coverage of biomarker/biosensor interactions for the rapid detection of weapons of bioterrorism, as well as current res...Lees meer
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing bu...Lees meer
The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applicati...Lees meer
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective ...Lees meer
One aspect of homeland security issues with wide-ranging implications is information security. This book presents leading-edge methods to secure, veri...Lees meer
The Physics of Automatic Target Recognition is part of a series focusing on Advanced Sciences and Technologies for Security Applications. This book wi...Lees meer
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of ...Lees meer