Auswahl der wissenschaftlichen Literatur zum Thema „Sécurité de la CI“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Sécurité de la CI" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Sécurité de la CI"
Roy, Martin, Charles-Philippe David und Jean-Philippe Racicot. „Discours multilatéraliste, leadership réaliste : l'évolution de la conduite institutionnelle de sécurité des États-Unis sous Clinton“. Études internationales 30, Nr. 2 (12.04.2005): 233–56. http://dx.doi.org/10.7202/704027ar.
Der volle Inhalt der QuelleMulone1, Massimiliano. „Directeurs de sécurité en entreprise et consommation de la sécurité. Étude exploratoire canadienne“. Criminologie 46, Nr. 2 (13.12.2013): 149–70. http://dx.doi.org/10.7202/1020991ar.
Der volle Inhalt der QuelleChauvenet, Antoinette, Georges Benguigui und Françoise Orlic. „Sécurité, insécurité et prisons“. IV. Ceux qui contrôlent, Nr. 30 (16.10.2015): 135–43. http://dx.doi.org/10.7202/1033672ar.
Der volle Inhalt der QuelleMayens, Paul. „Assurer le développement ou développer l’assurance : les discours experts sur la sécurité sociale dans les pays du Sud (1950-1975)“. Monde(s) N° 25, Nr. 1 (28.05.2024): 69–90. http://dx.doi.org/10.3917/mond1.225.0069.
Der volle Inhalt der QuelleRoberge, Marie-Claude. „Compétence des Tribunaux ad hoc pour l'ex-Yougoslavie et le Rwanda concernant les crimes contre l'humanité et le crime de génocide“. Revue Internationale de la Croix-Rouge 79, Nr. 828 (Dezember 1997): 695–710. http://dx.doi.org/10.1017/s0035336100057191.
Der volle Inhalt der QuelleKempa, Michael. „Conceptualisation et réforme des processus policiers à l’ère de la mondialisation : l’économie politique de la sécurité humaine1“. Criminologie 41, Nr. 1 (10.07.2008): 153–75. http://dx.doi.org/10.7202/018423ar.
Der volle Inhalt der QuelleDavid, Charles-Philippe, und Sébastien Barthe. „Les entrepreneurs de la prise de décision : l'exemple des politiques de sécurité nationale de l'administration G. W. Bush (2001–2004)“. Canadian Journal of Political Science 46, Nr. 3 (September 2013): 549–74. http://dx.doi.org/10.1017/s0008423913000851.
Der volle Inhalt der QuelleDelalande, Perrine, und Geert Wasteels. „Vivre avec une ventilation mécanique au quotidien : ergonomie et sécurité au domicile et à l’extérieur“. Les Cahiers de Myologie, Nr. 19 (Juni 2019): 21–24. http://dx.doi.org/10.1051/myolog/201919006.
Der volle Inhalt der QuelleKrüger, Dieter. „Plus de soldats et moins de sécurité ?“ Revue Historique des Armées 262, Nr. 1 (01.01.2011): 20–34. http://dx.doi.org/10.3917/rha.262.0020.
Der volle Inhalt der QuellePaul, Laetitia. „La course aux terres rares, une compétition pour la sécurité énergétique“. Revue Défense Nationale N° 864, Nr. 9 (31.10.2023): 54–59. http://dx.doi.org/10.3917/rdna.864.0054.
Der volle Inhalt der QuelleDissertationen zum Thema "Sécurité de la CI"
Moriconi, Florent. „Amélioration du cycle de développement logiciel via des approches basées sur les données“. Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS164.
Der volle Inhalt der QuelleThis thesis explores data-driven approaches for automated root cause analysis of CI/CD build failures, focusing on identifying non-deterministic failures, locating root cause messages in build logs, and characterizing CI/CD systems' performance and security. Grounded on public and industrial datasets, we explore CI/CD workflow properties, such as execution times and failure patterns. The research introduces the use of Natural Language Processing (NLP) and Knowledge Graphs Embeddings (KGE) for classifying build failures with a 94% accuracy. Additionally, we introduce ChangeMyMind, a new method based on Recurrent Neural Networks (RNNs) to accurately locate root cause messages in build logs without prior labeling of root cause messages. We propose X-Ray-TLS, a generic and transparent approach for inspecting TLS-encrypted network traffic in CI/CD environments. Finally, the thesis also revisits security vulnerabilities in CI/CD systems, demonstrating the potential for undetectable long-term compromises. This work has resulted in three publications and two under-review submissions, contributing significantly to CI/CD system analysis and optimization
Yeh, Selvia Chui. „Chen Zilong ci ji ci lun yan jiu /“. access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-ctl-b19887620a.pdf.
Der volle Inhalt der Quelle"Submitted to Department of Chinese, Translation and Linguistics in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references.
Fontes, Carlos Henrique Lisboa. „Ci?ncia como montagem, montagem como ci?ncia“. Universidade Federal do Rio Grande do Norte, 2006. http://repositorio.ufrn.br:8080/jspui/handle/123456789/13752.
Der volle Inhalt der QuelleCoordena??o de Aperfei?oamento de Pessoal de N?vel Superior
The thesis describes parallel possibilities between the knowledge built in theatre and in Science. The narrative is constructed through a reflexive observation of the process of making a threatical play, specifically O Tempo da Chuva by Grupo Beira de Teatro , in analogy to the process of making a scientific theory, specifically the one described by Werner Heisenberg in his book Physics and Beyond: encounters and conversations . It sets a dialog with authors/actors from various areas of knowledge, such as Edgar Morin, Werner Heisenberg, Ren? Descartes, Paul Feyerabend, Paul Caro, Juremir Machado da Silva, Maria da Concei??o de Almeida, Renato Ferracini, among others. It discusses the hypothesis that Science is the process of building and the theatrical process of building a play can also be systematized, likewise science. The thesis defends, as the complexities science may suggest, a method as a strategy. Developed throughout the process, such method could only be verified at the end, when the elements of the setting of atomic physics theories and theatre were correlated. Questions such as: the place of theatre and science in our contemporary society and the political and ethical role of artists and scientists are at the episthemological basis of this narrative which we have started, but it is not even close to a conclusion
A disserta??o narra poss?veis paralelos entre os saberes do teatro e da ci?ncia. A narrativa ? constru?da a partir de uma reflex?o do processo de montagem do espet?culo teatral O Tempo da Chuva do Grupo Beira de Teatro, em analogia ao processo de constru??o de uma teoria cient?fica, descrita por Werner Heisenberg em seu livro A Parte e o Todo . Tem como interlocutores autores/atores de v?rias ?reas do conhecimento, como Edgar Morin, Werner Heisenberg, Ren? Descartes, Paul Feyerabend, Paul Caro, Juremir Machado da Silva, Maria da Concei??o de Almeida, Renato Ferracini, entre outros. Discute a hip?tese de que ci?ncia ? montagem e de que uma montagem teatral tamb?m pode ser sistematizada, a exemplo da ci?ncia. A disserta??o defende, como sugerem as ci?ncias da complexidade, o m?todo como estrat?gia. Criado no processo, esse m?todo s? pode ser verificado ao final, quando os elementos de montagem das teorias da f?sica at?mica e do teatro foram interrelacionados. Questionamentos como: o lugar do teatro e da ci?ncia na sociedade sobremoderna e o papel pol?tico e ?tico dos artistas e dos cientistas est?o na base epistemol?gica desta narrativa que aqui come?amos, mas que nem de longe est? perto de uma conclus?o
Galv?o, T?lio Madson de Oliveira. „Para al?m da ci?ncia: por uma gaia ci?ncia“. Universidade Federal do Rio Grande do Norte, 2012. http://repositorio.ufrn.br:8080/jspui/handle/123456789/16515.
Der volle Inhalt der QuelleEm A gaia ci?ncia Nietzsche ir? abordar a ci?ncia, especificamente a sua finalidade, sob uma perspectiva cr?tica, apontando a necessidade de um conhecimento cient?fico mais humano e menos mecanicista, uma ci?ncia mais pr?xima ? arte, que ao inv?s de descobrir verdades, se ocupe em criar novos valores, vis?es e perspectivas. Ao longo da obra fica evidente a inten??o do fil?sofo em n?o apenas criticar a ci?ncia, mas tamb?m, conceber um novo m?todo, uma nova ci?ncia, uma gaya scienza, em alus?o ? arte dos trovadores medievais. Objetiva-se, com isso, unir vida e conhecimento como partes constituintes de um mesmo processo, fazendo da busca pelo conhecimento, n?o apenas um ?cio ou profiss?o, mas, sobretudo, um meio de vida. Nietzsche anseia por uma ci?ncia que n?o se enquadra nas categorias de verdadeiro ou falso, pois o seu valor ? diferente do valor da verdade, seu valor maior ? a m?xima potencialidade da vida em todos os seus aspectos
Zhuo, Qingfen. „Qing mo si da jia ci xue ji ci zuo yan jiu /“. Tai Bei : Guo li Tai Wan da xue, 2003. http://catalogue.bnf.fr/ark:/12148/cb39292283c.
Der volle Inhalt der QuelleMention parallèle de titre ou de responsabilité : Study of poetics and poetry of four poets in late Qing. Bibliogr. p. 413-434.
Lee, Yun-mun Leo, und 李潤滿. „A study of Zhang Huiyan's (1761-1802) Ci poetics and Ci poetry“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31221300.
Der volle Inhalt der QuelleAkadjé, Ahiouré Mathieu. „Sécurité publique et sécurité privée en Côte d'Ivoire“. Toulouse 1, 2003. http://www.theses.fr/2003TOU10007.
Der volle Inhalt der QuelleOver the past few years, Côte d'Ivoire, as other African countries, has known a significant increase in its crime rate. This has contributed to the development of a growing feeling of insecurity among the population. The police and public authorities are unable to contain and control the situation. As a result, recourse to private security services became a substitute for Governement security and over. This trend led to the reativation (or rebirth) of traditional practices which fall out of Government autorities control. As well did it lead to a boom in the trade market, which people now have to try their best of regulate, which a serious question arises, and that is the question of the Government's ability to guarantee for its people both security and enforcement of property rights
Fransson, Elin, und Linnea Liman. „CI och identitet : Samhörighet i vardagen hos unga vuxna kvinnor med CI- en intervjustudie“. Thesis, Örebro universitet, Institutionen för hälsovetenskaper, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-68793.
Der volle Inhalt der Quelle陸詠章 und Wing-cheung Luk. „A study of Yunqixuan Ci“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B3122488X.
Der volle Inhalt der QuelleKiendys, Petrus, und Shadi Al-Zara. „Minimumkrav för ett CI-system“. Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20216.
Der volle Inhalt der QuelleWhen a group of developers work on the same code base, conflicts may arise regarding the implementation of modules or subsystems that developers individually work on. These conflicts have to be resolved quickly in order for the project to advance at a steady pace. Developers who do not communicate changes or other necessary deviations may find themselves in a situation where new or modified modules or subsystems are impossible or very difficult to integrate into the mainline code-base. This often leads to so called “integration hell” where it could take huge amounts of time to adapt new code into the current state of the code-base. One strategy, which can be deployed to counteract this trend is called “continuous integration”. This practice offers a wide range of advantages when a group of developers collaborates on writing clean and stable code. Continuous integration can be put into practice without the use of any tools as it is a “way to do things” rather than an actual tool. With that said, it is possible to support the practice with a tangible tool called a CI-system.This study aims to give insight into the makings of a CI-system and what it fundamentally consists of and has to be able to do. A study of contemporary research reports regarding the subject and a survey was performed in order to substantiate claims and conclusions. Core characteristics of CI-systems are grouped into “functional requirements” and “non-functional requirements (quality attributes)”. By doing this, it is possible to quantify and categorize various core components and functionalities of a typical CI-system. This study also contains an attachment which provides instructions of how to get started with implementing your own CI-server using the CI-system software ”TeamCity”. The conclusion of this study is that a CI-system is an important tool that enables a more efficient software development process. By making use of CI-systems developers can refine the development process by preventing integration problems, automating some parts of the work process (build, test, feedback, deployment) and quickly finding and solving integration issues.
Bücher zum Thema "Sécurité de la CI"
transports, Commission d'examen de la Loi sur le Bureau canadien d'enquête sur les accidents de transport et de la sécurité des. Mission sécurité. Ottawa, Ont: Commission d'examen de la Loi sur le Bureau canadien d'enquête sur les accidents de transport et de la sécurité des tranasports, 1994.
Den vollen Inhalt der Quelle findenDupeyroux, Jean-Jacques. Sécurité sociale. 5. Aufl. Paris: Sirey, 1985.
Den vollen Inhalt der Quelle findenSanders, Pete, Hrsg. Ta sécurité. Montréal: Éditions École active, 1989.
Den vollen Inhalt der Quelle findenJaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
Den vollen Inhalt der Quelle findenDupeyroux, Jean-Jacques. Sécurité sociale. 8. Aufl. [Paris]: Sirey, 1994.
Den vollen Inhalt der Quelle findenAlbane, Geslin, Hrsg. Insularité et sécurité: L'île entre sécurité et conflictualité. Bruxelles: Bruylant, 2014.
Den vollen Inhalt der Quelle findenAmalberti, René. Piloter la sécurité. Paris: Springer Paris, 2013. http://dx.doi.org/10.1007/978-2-8178-0369-2.
Der volle Inhalt der QuelleLéopold, Eric. La sécurité informatique. Paris: Presses universitaires de France, 1999.
Den vollen Inhalt der Quelle findenJan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
Den vollen Inhalt der Quelle findenPiazzon, Thomas. La sécurité juridique. Paris: Defrénois, 2009.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Sécurité de la CI"
Gooch, Jan W. „CI“. In Encyclopedic Dictionary of Polymers, 144. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6247-8_2384.
Der volle Inhalt der QuelleBährle-Rapp, Marina. „sécurité“. In Springer Lexikon Kosmetik und Körperpflege, 497. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71095-0_9248.
Der volle Inhalt der QuelleTrivedi, Bharat K., und Joanna P. Hinton. „CI-1015“. In Pharmaceutical Biotechnology, 481–505. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/0-306-47384-4_21.
Der volle Inhalt der QuelleBauer, Wolfgang, und Wolfgang Kubin. „Mulan ci“. In Kindlers Literatur Lexikon (KLL), 1–2. Stuttgart: J.B. Metzler, 2020. http://dx.doi.org/10.1007/978-3-476-05728-0_15092-1.
Der volle Inhalt der QuelleEisenbud, David, und Irena Peeva. „CI Operators“. In Minimal Free Resolutions over Complete Intersections, 37–48. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-26437-0_4.
Der volle Inhalt der QuelleWuli, Hong. „Song Ci“. In Encyclopaedia of the History of Science, Technology, and Medicine in Non-Western Cultures, 4002–3. Dordrecht: Springer Netherlands, 2016. http://dx.doi.org/10.1007/978-94-007-7747-7_8862.
Der volle Inhalt der QuelleLaszig, Roland. „CI/Otobasis“. In Handbuch HNO 2009, 257–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05010-7_7.
Der volle Inhalt der QuelleHolcroft, Thomas. „Letter CI.“ In The Novels and Selected Plays of Thomas Holcroft Vol 2, 303–7. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003547600-107.
Der volle Inhalt der QuelleAntonoff, Roman. „Einführung in die Corporate Identity der Arztpraxis“. In Praxis-CI, 10–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 1987. http://dx.doi.org/10.1007/978-3-642-96991-1_1.
Der volle Inhalt der QuelleAntonoff, Roman. „Die Kommunikation des niedergelassenen Arztes“. In Praxis-CI, 14–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 1987. http://dx.doi.org/10.1007/978-3-642-96991-1_2.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Sécurité de la CI"
Brissaud, Florent, und Didier Turcinovic. „Sécurité fonctionnelle des systèmes relatifs à la sécurité : 10 erreurs à éviter“. In Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61703.
Der volle Inhalt der QuelleCaire, Jean, und Sylvain Conchon. „Sécurité : comment gérer les surprises ?“ In Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61829.
Der volle Inhalt der QuelleRaffaelli, Laurent, Frédérique Vallée und Guy Fayolle. „Fiabilité et sécurité fonctionnelle des ADAS“. In Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61696.
Der volle Inhalt der QuelleMazri, C., G. Delatour, P. Laclemence und D. Calcei. „Etude comparative de l’utilisation des indicateurs sécurité dans certaines activités à risques. Inspirations pour la sécurité des procédés chimiques“. In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56218.
Der volle Inhalt der QuelleZurko, Mary Ellen. „La Sécurité Ouverte How We Doin? So Far?“ In WWW '16: 25th International World Wide Web Conference. Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee, 2016. http://dx.doi.org/10.1145/2872427.2883583.
Der volle Inhalt der QuellePin, Garance, und Boza Albert. „SAFESOUND Augmenter la sécurité à l'aide d'interactions sonores“. In the 17th conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1148550.1148603.
Der volle Inhalt der QuelleBoulanger, J.-L., und L. Zhao. „Sécurité, confidentialité et intégrité dans les systèmes ferroviaires“. In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56197.
Der volle Inhalt der QuelleCherfi, Abraham, Emmanuel Arbaretier und Linda Zhao. „Sécurité-innocuité des véhicules autonomes : enjeux et verrous“. In Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61697.
Der volle Inhalt der QuelleWichelmann, Jan, Florian Sieck, Anna Pätschke und Thomas Eisenbarth. „Microwalk-CI“. In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3548606.3560654.
Der volle Inhalt der QuelleHuang, Qinglv, und Suxiang Yu. „Guangling Ci Circle and Its “Amorous Ci” Chimed Activities“. In 7th International Conference on Education, Language, Art and Inter-cultural Communication (ICELAIC 2020). Paris, France: Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.201215.360.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Sécurité de la CI"
Castets-Renard, Céline, Pierre-Luc Déziel und Lyse Langlois. Observations sur le document d'orientation sur la protection de la vie privée à l'intention des services de police relativement à la reconnaissance faciale. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, Juni 2021. http://dx.doi.org/10.61737/axib9435.
Der volle Inhalt der QuelleGruber, Verena, Ingrid Peignier und Charlotte Dubuc. Pratiques et tactiques de vente des concessionnaires automobiles au Québec. CIRANO, Oktober 2023. http://dx.doi.org/10.54932/bryk4403.
Der volle Inhalt der QuelleKamaté, Caroline. La sécurité, une affaire de professionnels? Intégrer la sécurité aux compétences professionnelles. Fondation pour une culture de sécurité industrielle, Oktober 2018. http://dx.doi.org/10.57071/wpt841.
Der volle Inhalt der QuelleRigaud, Éric. Résilience et management de la sécurité: pistes pour l’innovation en sécurité industrielle. Fondation pour une culture de sécurité industrielle, September 2011. http://dx.doi.org/10.57071/469rig.
Der volle Inhalt der QuelleHeer, T. RCE CI, Contractor Services. Office of Scientific and Technical Information (OSTI), September 2020. http://dx.doi.org/10.2172/1670558.
Der volle Inhalt der QuelleHarper, S. L., R. Schnitter, A. Fazil, M. Fleury, J. Ford, N. King, A. Lesnikowski et al. Salubrité et sécurité des aliments. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/329555.
Der volle Inhalt der QuelleTakaro, T., P. Enright, S. Waters, L. Galway, J. Brubacher, E. Galanis, L. McIntyre et al. Qualité, quantité et sécurité de l'eau. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/329554.
Der volle Inhalt der QuelleJhaveri, Nayna. Genre, sécurité foncière et gouvernance des paysages. Washington, DC: International Food Policy Research Institute, 2022. http://dx.doi.org/10.2499/p15738coll2.135011.
Der volle Inhalt der QuelleSwallow, Brent M. Sécurité foncière: Pourquoi est-elle si importante? Washington, DC: International Food Policy Research Institute, 2022. http://dx.doi.org/10.2499/p15738coll2.135008.
Der volle Inhalt der QuelleJanney, D. Un merci aux comités conjoints en santé-sécurité. Natural Resources Canada/CMSS/Information Management, 1992. http://dx.doi.org/10.4095/330378.
Der volle Inhalt der Quelle