Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
"Hacker Mindset: Psychological Tactics and Strategies for Mastering Social Engineering" is an authoritative and comprehensive guide that delves deep i...Lees meer
In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications syst...Lees meer
Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on the...Lees meer
Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by...Lees meer
Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Secu...Lees meer
Improving State Voter Registration Databases outlines several actions that are needed to help make voter registration databases capable of sharing inf...Lees meer
Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implicat...Lees meer
In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigoro...Lees meer
Many election officials look to electronic voting systems as a means for improving their ability to more effectively conduct and administer elections....Lees meer
The focus of Software for Dependable Systems is a set of fundamental principles that underlie software system dependability and that suggest a differe...Lees meer
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompass...Lees meer
Cyber-physical systems (CPS) are "engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and ph...Lees meer
We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in ...Lees meer
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help ...Lees meer
Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cybersp...Lees meer
The Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Recoverability as a First-Class ...Lees meer
Critical Code contemplates Department of Defense (DoD) needs and priorities for software research and suggests a research agenda and related actions. ...Lees meer
Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making considers approaches to increasing the professionalization of the...Lees meer
Vulnerabilities abound in U.S. society. The openness and efficiency of our key infrastructures -- transportation, information and telecommunications s...Lees meer
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other natio...Lees meer
Attaining meaningful cybersecurity presents a broad societal challenge. Its complexity and the range of systems and sectors in which it is needed mean...Lees meer