Books on the topic 'Cryptographie – Mesures de sûreté – Évaluation'

To see the other types of publications on this topic, follow the link: Cryptographie – Mesures de sûreté – Évaluation.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 24 books for your research on the topic 'Cryptographie – Mesures de sûreté – Évaluation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Schneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Paris: Vuibert, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

CRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Faith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schneier, Bruce. Secrets and lies: Digital security in a networked world. New York: John Wiley, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

J, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Anguilla), FC '97 (1997. Financial cryptography: First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Berlin: Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bruce, Christianson, and International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Garfinkel, Simson. Practical UNIX and Internet Security. 2nd ed. Bonn: O'Reilly & Associates, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Garfinkel, Simson. Practical UNIX and Internet security. 3rd ed. Beijing: O'Reilly, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

(Editor), Bart Preneel, Rene Govaerts (Editor), and Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Williams, Hugh C. Advances in Cryptology: Proceedings of CRYPTO '85 (Lecture Notes in Computer Science). Springer, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Williams, Hugh C. Advances in Cryptology: Proceedings of Crypto 85 (Lecture Notes in Computer Science). Springer-Verlag, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Williams, Hugh C. Advances in Cryptology: Proceedings of CRYPTO '85. Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Simmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Wiley-IEEE Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Simmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Institute of Electrical & Electronics Enginee, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Schwartz, Alan, Simson Garfinkel, and Gene Spafford. Practical Unix and Internet Security: Securing Solaris, Mac OS X, Linux and Free BSD. O'Reilly Media, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Schwartz, Alan, Simson Garfinkel, and Gene Spafford. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Garfinkel, Simson, Gene Spafford, and Deborah Russell. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography