Books on the topic 'APT (informatique) – Systèmes informatiques – Mesures de sûreté'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 43 books for your research on the topic 'APT (informatique) – Systèmes informatiques – Mesures de sûreté.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Jan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
Find full textCRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Find full textFaith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Find full textHansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.
Find full textBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Find full textPaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Find full textSlatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
Find full textJoshua, Quittner, ed. Masters of deception: The gang that ruled cyberspace. New York: HarperPerennial, 1996.
Find full textEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Find full textSchneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.
Find full textJ, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.
Find full textJaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
Find full textBruce, Christianson, and International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Find full textAnthony, Maeder, and Martin-Sanchez Fernando J, eds. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). Amsterdam: IOS Press Inc., 2012.
Find full textClaude-Yves, Charron, and Théoret Yves 1960-, eds. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Find full textHack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.
Find full textGiovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
Find full textIcove, David, Karl Seger, and William VonStorch. Computer Crime: A Crimefighter's Handbook. Sebastopol: O'Reilly, 1995.
Find full textStefan, Katzenbeisser, and Sadeghi Ahmad-Reza, eds. Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers. Berlin: Springer, 2009.
Find full textToward better usability, security, and privacy of information technology: Report of a workshop. Washington, D.C: National Academies Press, 2010.
Find full textGarfinkel, Simson. Practical UNIX and Internet security. 3rd ed. Beijing: O'Reilly, 2003.
Find full textGarfinkel, Simson. Practical UNIX and Internet Security. 2nd ed. Bonn: O'Reilly & Associates, 1996.
Find full textGavino, Morin, ed. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, Mass: MIT Press, 1994.
Find full textCybertraque. Omnibus, 1998.
Find full textCranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Find full textCranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Find full textCranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.
Find full textCranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Find full textLa Sécurité informatique. Presses Universitaires de France - PUF, 2003.
Find full textQuittner, Joshua, and Michelle Slatalla. Masters of Deception: The Gang That Ruled Cyberspace. Harper Collins, 1995.
Find full textMasters of Deception. Bt Bound, 1999.
Find full text(Editor), Bart Preneel, Rene Govaerts (Editor), and Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Find full textGoncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
Find full textFirewalls. New York: McGraw-Hill, 2001.
Find full textGoncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
Find full textVinatier, Emmanuel. Hacking. Micro Application, 2003.
Find full textWindows Vista Quick Reference. Addison Wesley Publishing Company, 2007.
Find full textContemporary Cryptology: The Science of Information Integrity. Wiley-IEEE Press, 1999.
Find full textSimmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Institute of Electrical & Electronics Enginee, 1991.
Find full textVigna, Giovanni. Mobile Agents and Security. Springer London, Limited, 2003.
Find full textGarfinkel, Simson. Practical Unix and Internet Security: Securing Solaris, Mac OS X, Linux and Free BSD. O'Reilly Media, Incorporated, 2003.
Find full textGarfinkel, Simson. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2003.
Find full textGarfinkel, Simson. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2000.
Find full text