Books on the topic 'Cryptage à clé publique'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 books for your research on the topic 'Cryptage à clé publique.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Ateba-Eyene, Charles. Marketing et communication politiques: Clé du succès pour les élections, la vie publique et la promotion de la démocratie. [Yaoundé]: Éditions Saint-Paul, 2007.
Find full textLambert, Alain. La mise en oeuvre de la loi organique relative aux lois de finances: Réussir la LOLF, clé d'une gestion publique, responsable et efficace : rapport au gouvernement. Paris: Documentation française, 2005.
Find full textPKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues. Hoboken, NJ: John Wiley & Sons, 2003.
Find full textStallings, William. Cryptography and network security: Principles and practice. 4th ed. Upper Saddle River, N.J: Pearson/Prentice Hall, 2006.
Find full textLucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. Paris: E ditions Eyrolles, 2006.
Find full textLucas, Michael. PGP & GPG: Email for the practical paranoid. San Francisco, CA: No Starch Press, 2006.
Find full textLucas, Michael. PGP & GPG: Assurer la confidentialité de son courrier électronique. Paris: Eyrolles, 2006.
Find full textWelschenbach, Michael. Cryptography in C and C++. 2nd ed. Berkeley, CA: Apress, 2001.
Find full textCryptography in C and C++. 2nd ed. New York: Springer-Verlag, 2005.
Find full textQin, Zhen, Athanasios V. Vasilakos, and Hu Xiong. Introduction to Certificateless Cryptography. Taylor & Francis Group, 2016.
Find full textQin, Zhen, Athanasios Vasilakos, and Hu Xiong. Introduction to Certificateless Cryptography. Taylor & Francis Group, 2020.
Find full textIntroduction to Certificateless Cryptography. Taylor & Francis Group, 2016.
Find full textQin, Zhen, Athanasios V. Vasilakos, and Hu Xiong. Introduction to Certificateless Cryptography. Taylor & Francis Group, 2016.
Find full textQin, Zhen, Athanasios V. Vasilakos, and Hu Xiong. Introduction to Certificateless Cryptography. Taylor & Francis Group, 2016.
Find full textPublic Key Infrastructure. London: Taylor and Francis, 2004.
Find full textWelschenbach, Michael. Kryptographie in C und C++: Zahlentheoretische Grundlagen, Computer-Arithmetik mit großen Zahlen, kryptographische Tools (Xpert.press). 2nd ed. Springer, 2001.
Find full textWelschenbach, Michael. Kryptographie in C und C++. Springer, 2001.
Find full textStapleton, Jeff. Security Without Obscurity: Frequently Asked Questions. CRC Press LLC, 2021.
Find full textSecurity Without Obscurity: A Guide to PKI Operations. Taylor & Francis Group, 2016.
Find full textStapleton, Jeff. Security Without Obscurity: Frequently Asked Questions. Taylor & Francis Group, 2021.
Find full textStapleton, Jeff. Security Without Obscurity: A Guide to Cryptographic Architectures. Auerbach Publishers, Incorporated, 2018.
Find full textStapleton, Jeff. Security Without Obscurity: A Guide to Cryptographic Architectures. Auerbach Publishers, Incorporated, 2018.
Find full textStapleton, Jeff, and W. Clay Epstein. Security Without Obscurity: A Guide to PKI Operations. Auerbach Publishers, Incorporated, 2016.
Find full textStapleton, Jeff. Security Without Obscurity: Frequently Asked Questions. Taylor & Francis Group, 2021.
Find full text