Books on the topic 'Cryptographie – Mesures de sûreté – Évaluation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 books for your research on the topic 'Cryptographie – Mesures de sûreté – Évaluation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Schneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Paris: Vuibert, 2001.
CRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Faith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Bauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Jaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
Schneier, Bruce. Secrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
J, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.
Anguilla), FC '97 (1997. Financial cryptography: First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Berlin: Springer, 1997.
Bruce, Christianson, and International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Garfinkel, Simson. Practical UNIX and Internet Security. 2nd ed. Bonn: O'Reilly & Associates, 1996.
Garfinkel, Simson. Practical UNIX and Internet security. 3rd ed. Beijing: O'Reilly, 2003.
Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.
Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
(Editor), Bart Preneel, Rene Govaerts (Editor), and Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Williams, Hugh C. Advances in Cryptology: Proceedings of CRYPTO '85 (Lecture Notes in Computer Science). Springer, 1986.
Williams, Hugh C. Advances in Cryptology: Proceedings of Crypto 85 (Lecture Notes in Computer Science). Springer-Verlag, 1986.
Williams, Hugh C. Advances in Cryptology: Proceedings of CRYPTO '85. Springer London, Limited, 2007.
Simmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Wiley-IEEE Press, 1999.
Simmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Institute of Electrical & Electronics Enginee, 1991.
Schwartz, Alan, Simson Garfinkel, and Gene Spafford. Practical Unix and Internet Security: Securing Solaris, Mac OS X, Linux and Free BSD. O'Reilly Media, Incorporated, 2003.
Schwartz, Alan, Simson Garfinkel, and Gene Spafford. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2003.
Garfinkel, Simson, Gene Spafford, and Deborah Russell. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2000.