Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
In today's rapidly evolving information technology landscape, cyber-attacks on company assets and IT systems are becoming increasingly frequent and va...Lees meer
Supply chains are significant in improving business efficiency. Sustainable supply chains help industries enhance their ecological, monetary, and soci...Lees meer
This book provides application of multi criteria decision making techniques for managerial discretion. With this book, a concerted platform has been p...Lees meer
This book aims to include various significant research topics of mathematical fluid mechanics having relevance or applications in engineering and appl...Lees meer
This work presents the guiding principles of Integral Transforms needed for many applications when solving engineering and science problems. As a mode...Lees meer
This book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach providing cryptographic and mat...Lees meer
This book offers a thorough overview of the most popular and researched meta-heuristic optimization techniques and nature-inspired algorithms. Their w...Lees meer
This book focuses on artifi cial intelligence in the field of digital signal processing and wireless communication. The implementation of machine lear...Lees meer
This book presents the state-of-the-art methods in Linear Integer Programming, including some new algorithms and heuristic methods developed by the au...Lees meer
The distributed transfer function method (DTFM) is an analytical method for modeling, analysis, and control of a class of distributed parameter system...Lees meer
Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences of instructions used to accomplish ...Lees meer
Reliability is a fundamental criterium in engineering systems. This book shows innovative concepts and applications of mathematics in solving reliabil...Lees meer
"Digital Blockchain- Big Data, Artificial Intelligence and Virtual Reality in Healthcare Ecosystem" is a book that explores the revolutionary impact o...Lees meer
Computational intelligence (CI) lies at the interface between engineering and computer science; control engineering, where problems are solved using c...Lees meer
This book describes methods to improve software performance and safety using advanced mathematical and computational analytics. The main focus is laid...Lees meer
The book Artificial Intelligence for Healthcare: Machine Learning and Diagnostics explores how AI and machine learning are reshaping healthcare, focus...Lees meer
Reliability is one of the fundamental criteria in engineering systems. Design and maintenance serve to support it throughout the systems life. As such...Lees meer
Soft computing is used where a complex problem is not adequately specified for the use of conventional math and computer techniques. Soft computing ha...Lees meer
This book explains how to perform data de-noising, in large scale, with a satisfactory level of accuracy. Three main issues are considered. Firstly, h...Lees meer
This book provides insights into contemporary issues and challenges concerning operational research and related mathematical modeling fundamentals, su...Lees meer
This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well ...Lees meer