Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Stratégie "Cheval de Troie"“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Stratégie "Cheval de Troie"" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Stratégie "Cheval de Troie""
Wenger, Stephan, und Fulvia Raiola. „Cheval de Troie“. Adolescence 71, Nr. 1 (2010): 171. http://dx.doi.org/10.3917/ado.071.0171.
Der volle Inhalt der QuelleLambin, Gérard. „Le Cheval de Troie“. Gaia : revue interdisciplinaire sur la Grèce Archaïque 3, Nr. 1 (1998): 97–108. http://dx.doi.org/10.3406/gaia.1998.1342.
Der volle Inhalt der QuelleBaquedano, Michel. „Le cheval de Troie“. Empan 61, Nr. 1 (2006): 53. http://dx.doi.org/10.3917/empa.061.54.
Der volle Inhalt der QuelleGrim, Olivier R. „Un nouveau cheval de Troie“. Journal des anthropologues, Nr. 122-123 (01.12.2010): 27–49. http://dx.doi.org/10.4000/jda.3673.
Der volle Inhalt der QuelleGiacomo, Pierre. „Le CGS innocent Cheval de Troie“. Bulletin d'histoire de l'électricité 16, Nr. 1 (1990): 5–8. http://dx.doi.org/10.3406/helec.1990.1123.
Der volle Inhalt der QuelleNicaise, Ides, Luc Lauwereys und Nick Matheus. „L'économie sociale d'insertion, cheval de bataille ou cheval de Troie ?“ Reflets et perspectives de la vie économique XLI, Nr. 3 (2002): 77. http://dx.doi.org/10.3917/rpve.413.0077.
Der volle Inhalt der QuellePommier, Gérard. „Le Livre noir : un cheval de Troie“. Le Journal des psychologues 235, Nr. 2 (2006): 18. http://dx.doi.org/10.3917/jdp.235.0018.
Der volle Inhalt der QuelleLuyet, Pierre-Philippe, und Jean Gruenberg. „L’endocytose, cheval de Troie pour l’infection virale“. médecine/sciences 21, Nr. 11 (November 2005): 909–10. http://dx.doi.org/10.1051/medsci/20052111909.
Der volle Inhalt der QuellePerez, Frédéric. „Et aussi... Le complexe du Cheval de Troie“. Dialogue 190, Nr. 4 (2010): 135. http://dx.doi.org/10.3917/dia.190.0135.
Der volle Inhalt der QuelleBory, Anne, und Yves Lochard. „La responsabilité sociale des entreprises : un cheval de Troie politique ?“ Sociologies pratiques 18, Nr. 1 (2009): 39. http://dx.doi.org/10.3917/sopr.018.0039.
Der volle Inhalt der QuelleDissertationen zum Thema "Stratégie "Cheval de Troie""
Sansiaume, Elodie. „Conception et élaboration de nouvelles métalloenzymes artificielles selon la stratégie du cheval de Troie“. Paris 11, 2010. http://www.theses.fr/2010PA112237.
Der volle Inhalt der QuelleThe construction of artificial métalloenzymes has appeared to be one of the most promising strategies explored to induce stereoselectivity into chemical reactions. New metalloporphyrin-estradiol conjugates and testosterone conjugates have been synthesized and fully characterized, and have been further associated respectively to a monoclonal anti-estradiol antibody 7A3 and neocarzinostatin's mutants, to generate new artificial metalloenzymes following the so-called 'Trojan Horse' strategy. The spectroscopic characteristics and dissociation constants of these complexes were similar to those obtained for the artificial metalloproteins obtained by association of cationic metalloporphyrin-estradiol conjugates to 7A3. This demonstrates that the nature of the porphyrin substituents, anionic or cationic, had little influence on the association with the antibody that is mainly driven by the tight association of the estradiol anchor with the binding pocket of the antibody. These new biocatalysts appeared to have an interesting catalytic activity in oxidation reactions. The iron(III)-anionic-porphyrin-estradiol-antibody complexes and the iron(III)-anionic-porphyrin-testosterone-neocarzinostatine's mutants complexes were found able to catalyze the chemoselective and slightly enantioselective (ee = 10 % et 24 % à 40 % respectively) sulfoxidation of sulfides by H202. The Mn(III)-porphyrin-estradiol antibody complexes were found to catalyze the oxidation of styrene by KHSO5, the Mn(III)-cationic-porphyrin-estradiol-antibody complexes even showing the highest yields so far reported for the oxidation of styrene catalyzed by artificial metalloproteins
Paulen, Aurélie. „Utilisation de la stratégie du cheval de Troie pour lutter contre Pseudomonas aeruginosa : synthèses et propriétés biologiques de conjugués sidérophores-antibiotiques“. Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAJ021/document.
Der volle Inhalt der QuelleConstant discovery of innovative therapeutic strategies against pathogenic bacteria is crucial. Iron is essential for bacterial proliferation since it is integrated in the active site of essential enzymes. Many pathogenic bacteria excrete low molecular weight secondary metabolites called siderophores in order to promote iron (III) acquisition. Transmembrane siderophore-dependent iron uptake systems can be used as gates by siderophore-antibiotic conjugates. In this context, we synthesized conjugates between analogs of pyochelin, aminochelin or azotochelin with oxazolidinones antibiotics. In this project many of the conjugation between vectors and antibiotics were the result of click chemistry reactions even the use of peptidic bonds was also explored. Synthesis and biological properties of conjugates and vectors are presented in this manuscript
Reyes, Carrillo Tatiana. „L'éco-conception dans les PME : les mécanismes du cheval de Troie méthodologique et du choix de trajectoires comme vecteurs d'intégration de l'environnement en conception“. Toulon, 2007. http://tel.archives-ouvertes.fr/tel-00274389/fr/.
Der volle Inhalt der QuelleThis research proposes a new solution to fulfill the need to develop an accessible mechanism to implement sustainable design in the long term, based on 2 axes. The first axis relies on the clear identification of integration trajectories. This allows the company to guide the integration process on the long term. The second axis is based on an ecodesign tool that is conceived and developed by all the main participants in the design. This axis enables a progressive evolution of environmental performance within an organization. An investigation work has been done, with specific experts for the first axis and with ecodesign pioneers companies for the second axis. We call this second point mechanism a "methodological Trojan horse" approach ("MTH") because the underlying strategy is to introduce an appropriate pretext that enables collaborative work (the ecodesign tool has to be co-designed) and to supply the organization with the necessary skills to develop the tool at a later stage. The "MTH" approach facilitates the propagation of sustainable design knowledge at all levels within the company and thus allows the company to progress towards complete integration (from a partial sustainable design approach to an eco-innovation approach, integrating the requirements of sustainable development). The whole concept of this MTH was tested over a period of two years in the company Transfix that manufactures transformers. It has successfully highlighted the benefits of this integrated approach based on the "MTH" mechanism and guided by the "ecodesign tools and methods" integration trajectory
Loupias, Pauline. „Synthèse et étude d'analogues de sidérophores à large spectre antibactérien“. Thesis, Amiens, 2020. http://www.theses.fr/2020AMIE0032.
Der volle Inhalt der QuelleThis work consisted in exploiting a new therapeutic strategy to fight Pseudomonas aeruginosa and Burkholderia pseudomallei, two Gram-negative bacteria particularly concerning. While P. aeruginosa, which is part of the ESKAPE bacteria, is responsible for the majority of nosocomial infections, B. pseudomallei, formerly classified in the Pseudomonas group, is involved in Whitmore's disease and is considered by the CDC as a potential bioterrorist weapon. These two pathogens have natural and acquired resistance to many antibiotics by efflux or via a lack of membrane permeability, which makes treatment difficult. Facing this health emergency, the use of the "Trojan Horse" strategy to vectorize antibiotics can help restore their activities. Iron is a micronutrient necessary for the survival of bacteria, but it is not very bioavailable due to its low solubility in water. To acquire it, many bacteria synthesize molecules of low molecular weight, called siderophores, capable of chelating the surrounding iron. The complexes formed are then recognized specifically by TonB-dependent receptors in order to transport iron within bacteria. Depending on their type, bacteria express different receptors recognizing their endogenous siderophores but also xenosiderophores or synthetic siderophores. The use of these different kinds of siderophores to carry an antibiotic or a toxic metal such as gallium into the bacteria has already led to promising results. The objectives of this PhD were to synthesize new siderophores of piperazine structure, new siderophore-antibiotic conjugates and toxic siderophore-gallium complexes. Physico-chemical and biological studies were also carried out in order to validate the interest of the structures chosen in anti-infectious chemotherapy
Pesset, Bénédicte. „Conception, synthèse et vectorisation d'inhibiteurs potentiels de la protéine bactérienne TonB“. Thesis, Strasbourg, 2012. http://www.theses.fr/2012STRAJ089/document.
Der volle Inhalt der QuelleThe increasing resistances to the current antibiotherapies, and the potential use of pathogenic bacteria as biological weapons led us to the absolute necessity of discovering new biological targets and new antibiotic strategies. In this context, iron uptake pathways of Gram negative bacteria are promising targets. Indeed, iron is an essential nutrient, but it has a low bioavailability. Bacteria have developed efficient iron uptake pathways in order to proliferate. Iron is transported in the bacterial cell by specific outer membrane transporters and thanks to the energy provided by a complex molecular machinery, called TonB. The TonB protein, which is the keystone of this machinery, is a key target for the development of new antibiotics. We would like to sequester this protein in the periplasm thanks to molecules constituted of a peptidic moiety and a heterocyclic moiety such as isoindole or 1,2,4-triazine. The conception and the synthesis of these compounds are presented in this document, as well as their possibilities to be vectorized using a “Trojan Horse” strategy. Our contribution to the development of an in vitro test of affinity is presented as well
Ba, Papa-Sidy. „Détection et prévention de Cheval de Troie Matériel (CTM) par des méthodes Orientées Test Logique“. Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT271/document.
Der volle Inhalt der QuelleIn order to reduce the production costs of integrated circuits (ICs), outsourcing the fabrication process has become a major trend in the Integrated Circuits (ICs) industry. As an inevitable unwanted side effect, this outsourcing business model increases threats to hardware products. This process raises the issue of un-trusted foundries in which, circuit descriptions can be manipulated with the aim to possibly insert malicious circuitry or alterations, referred to as Hardware Trojan Horses (HTHs). This motivates semiconductor industries and researchers to study and investigate solutions for detecting during testing and prevent during fabrication, HTH insertion.However, considering the stealthy nature of HTs, it is quite impossible to detect them with conventional testing or even with random patterns. This motivates us to make some contributions in this thesis by proposing solutions to detect and prevent HTH after fabrication (during testing).The proposed methods help to detect HTH as well during testing as during normal mode(run-time), and they are logic testing based.Furthermore, we propose prevention methods, which are also logic testing based, in order tomake harder or quasi impossible the insertion of HTH both in netlist and layout levels
Cordeau, Françoise. „Le Cheval de Troie (roman) suivi de : L'expression du sentiment d'abandon chez Anne Hébert, Louise Desjardins, Bruno Roy et Björn Larsson“. Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28293/28293.pdf.
Der volle Inhalt der QuelleReyes, Carillo Tatiana. „L'éco-conception dans les PME : les mécanismes du cheval de Troie méthodologique et du choix de trajectoires comme vecteurs d'intégration de l'environnement en conception“. Phd thesis, Université du Sud Toulon Var, 2007. http://tel.archives-ouvertes.fr/tel-00274389.
Der volle Inhalt der QuelleReyes, Carrillo Tatiana Millet Dominique Brissaud Daniel. „L' éco-conception dans les PME les mécanismes du cheval de Troie méthodologique et du choix de trajectoires comme vecteurs d'intégration de l'environnement en conception /“. [S.l.] : [s.n.], 2007. http://tel.archives-ouvertes.fr/tel-00274389/fr.
Der volle Inhalt der QuelleBoos, Romain. „La lutte contre la cybercriminalité au regard de l’action des États“. Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0158/document.
Der volle Inhalt der QuelleThe twenty-first century sees the consecration of digital technologies just as the end of the Middle-Ages saw the creation of printing.Henceforth, the digital era has no limits. It gives access to culture and knowledge, encourages the exchanges between people.It allows the constitution of an economy online and brings citizens closer to their adminitration. Digital technologies generate innovation and growth, and can help or accelerate the development of the emergent countries as well. But a certain pessimism moderates this idealistic approach.All these advances also generate new fragilities and vulnerabilities propicious to threats or risks, as they stimulate the criminals' imagination.Now , cybercriminality has become reality.It is all the more dangerous as it penetrates within families , where ordinary delinquency didn't exist until now. From now on, this new kind of criminality made it obvious that the judicial system had to be adapted. Indeed , faced with these violations , there are of course laws that are applied here and now to the Internet.But , are they really efficient? In the same way, is the intersate cooperation also sufficient to fight against cybercriminality? So , it is important to wonder whether , in our modern society , the legislative framework and the institutional cooperation , both european and international , are sufficient and efficient to penalize the cybercriminal offences
Bücher zum Thema "Stratégie "Cheval de Troie""
Jacques, Martin. Le cheval de Troie. Tournai, Belgique: Casterman, 1988.
Den vollen Inhalt der Quelle findenMal-Maeder, D. van. Le cheval de Troie: Variations autour d'une guerre. Gollion: Infolio, 2007.
Den vollen Inhalt der Quelle findenValle, Alexandre del. La Turquie dans l'Europe: Un cheval de Troie islamiste? Paris: Editions des Syrtes, 2004.
Den vollen Inhalt der Quelle findenLittle, Emily. Le cheval de Troie: Comment les Grecs ont gagne la guerre. Saint-Lambert: Heritage, 1990.
Den vollen Inhalt der Quelle findenVolkoff, Vladimir. Petite histoire de la désinformation: Du Cheval de Troie à Internet. Monaco: Rocher, 1999.
Den vollen Inhalt der Quelle findenJoel, Surnow, und Cochran Robert, Hrsg. 24 heures chrono: Cheval de Troie : [une aventure inédite de Jack Bauer]. Paris: Fleuve noir, 2007.
Den vollen Inhalt der Quelle findenGenève, Max. Jeune homme assis dans la neige, ou, Le cheval de Troie: Roman. Paris: Barrault, 1985.
Den vollen Inhalt der Quelle findenJeune homme assis dans la neige, ou, Le cheval de Troie: Roman. Paris: Barrault, 1985.
Den vollen Inhalt der Quelle findenDreyer, Dominique. Réglementation professionnelle et marché intérieur: Une loi fédérale, Cheval de Troie du droit européen. Genève: Helbing & Lichtenhahn, 2003.
Den vollen Inhalt der Quelle findenLe Cheval de Troie. Le Livre de Poche, 2001.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Stratégie "Cheval de Troie""
„4. Politics And The Novel: Le Cheval De Troie“. In Paul Nizan: Committed Literature in a Conspiratorial World, 119–50. Princeton: Princeton University Press, 2015. http://dx.doi.org/10.1515/9781400870837-006.
Der volle Inhalt der QuelleMangin, David, und Sylvain Allemand. „IV. L’économie présentielle, cheval de Troie de l’urbanisme de zoning“. In Cultures et créations dans les métropoles-monde, 315–26. Hermann, 2016. http://dx.doi.org/10.3917/herm.lussa.2016.01.0315.
Der volle Inhalt der QuelleButon, Philippe. „Nous les Garçons et les Filles ou le cheval de Troie communiste“. In Le photojournalisme des années 1930 à nos jours, 109–20. Presses universitaires de Rennes, 2014. http://dx.doi.org/10.4000/books.pur.50376.
Der volle Inhalt der Quellede Nadaï, Anne. „La description géographique, un cheval de Troie de la géographicité sur le terrain des classes de lycée“. In Acteurs et action, 87–100. Presses universitaires de Caen, 2016. http://dx.doi.org/10.4000/books.puc.12934.
Der volle Inhalt der QuelleBourque, Dominique. „Un Cheval de Troie nommé dé-marquage : la neutralisation des catégories de sexe dans l’œuvre de Monique Wittig“. In Lire Monique Wittig aujourd’hui, 67–87. Presses universitaires de Lyon, 2012. http://dx.doi.org/10.4000/books.pul.4224.
Der volle Inhalt der Quelle