Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
Nigeria has become one of the hotbeds of cybercrime since the liberalization of the telecommunication industry began in 1996. The scale and magnitude ...Lees meer
The current policing landscape has seen the rise in serious and organized crime across the globe. Criminals are innovating in real-time leveraging cyb...Lees meer
This book provides a line of communication between academia and end users/practitioners to advance forensic science and boost its contribution to crim...Lees meer
This book is the first comprehensive, book-length analysis of Israel and securitization processes. It develops an original analytical framework to ame...Lees meer
What does it take to disrupt security? How does one disrupt the invisibility of insecurity? How does one make the invisible factors that define and im...Lees meer
The COVID-19 pandemic is not only a threat to our health and economy, but also has strong implications for defence and security. Indeed, defence leade...Lees meer
1. About the Book.- 2. Cybercrime, Public-Private Partnership and Europol.- 3. The Sharing Economy for a Public-Private Partnership.- 4. Mitigating Ra...Lees meer
In a world of globalization and technological change, terrorism continues to pose grave threats not only to more traditional targets such as civilians...Lees meer
This book explores and analyzes the rapid pace of technological evolution in diplomatic, information, military, and economic sectors, which has contri...Lees meer
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terror...Lees meer
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first t...Lees meer
Deals with collaborative security, a newly developing and promising field. Describes generic techniques as well as their applications in several domai...Lees meer
This edited book examines the contemporary regional security concerns in the Asia-Pacific recognizing the 'Butterfly effect', the concept that small c...Lees meer
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing bu...Lees meer
The Physics of Automatic Target Recognition is part of a series focusing on Advanced Sciences and Technologies for Security Applications. This book wi...Lees meer
One aspect of homeland security issues with wide-ranging implications is information security. This book presents leading-edge methods to secure, veri...Lees meer
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of ...Lees meer
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart ci...Lees meer
This book shares essential insights into how the social sciences and technology could foster new advances in managing the complexity inherent to the c...Lees meer
This book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber de...Lees meer
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart ci...Lees meer
This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given ...Lees meer
This book explores and analyzes emerging innovations within today's most cutting-edge science and technology (S&T) areas, which are cited as carrying ...Lees meer