Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
Emerging and pivotal technologies such as artificial intelligence and deep learning, cloud computing, internet of things, blockchain, encryption, and ...Lees meer
Voice biometrics are being implemented globally in large scale applications such as remote banking, government e-services, transportation and building...Lees meer
With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new ap...Lees meer
Mobile biometrics - the use of physical and/or behavioral characteristics of humans to allow their recognition by mobile/smart phones - aims to achiev...Lees meer
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify ...Lees meer
As biometrics-based identification and identity authentication become increasingly widespread in their deployment, it becomes correspondingly importan...Lees meer
Internet of Things (IoTs) are now being integrated at a large scale in fast-developing applications such as healthcare, transportation, education, fin...Lees meer
Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing...Lees meer
The interplay of privacy, security and user-determination is an important consideration in the roll-out of biometric technologies. It brings into play...Lees meer
Iris recognition technologies for identity management are already deployed globally in several large-scale nationwide biometric projects and are curre...Lees meer
As AI technologies progress and influence more facets of our lives, the requirement for openness and interpretability becomes increasingly important. ...Lees meer
Hand-based biometrics identifies users by unique features in their hands, such as fingerprints, palmprints, hand geometry, and finger and palm vein pa...Lees meer
Wireless physical layer (PHY) secrecy has attracted much attention due to the broadcast nature of the wireless medium. To this end, researchers have b...Lees meer
The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processi...Lees meer
The Internet of Things (IoT) - the emerging global interconnection of billions of 'smart' devices - will be collecting increasing amounts of private a...Lees meer
Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guarantee...Lees meer