Books on the topic 'Logiciel – Mesures de sûreté'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Logiciel – Mesures de sûreté.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Highland, Harold Joseph. Comment protéger votre micro: Matériel et logiciel : protection et confidentialité en micro-informatique. Paris: Masson, 1985.
Find full textFaith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Find full textPaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Find full textSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Find full textSurfez sans risque : protégez votre ordinateur: Virus, spywares, chevaux de Troie, pirates, spam. Nantes, France: Éditions ENI, 2005.
Find full textCanada. Approvisionnements et services Canada. Manuel de la sécurité industrielle. Ottawa, Ont: Ministre des approvisionnements et services Canada, 1992.
Find full textL' entreprise aux aguets: Information, surveillance de l'environnement, propriété et protection industrielles, espionnage et contre-espionnage au service de la compétitivité. Paris: Masson, 1990.
Find full textCommission canadienne de sûreté nucléaire. Les programmes informatiques utilisés lors de la conception et des analyses de sûreté des centrales nucléaires et des réacteurs de recherche. Ottawa, Ont: Commission canadienne de sûreté nucléaire, 2000.
Find full textPaiements électroniques sécurisés. 2nd ed. Lausanne: Presses polytechniques et universitaires romanes, 2007.
Find full textCommission canadienne de sûreté nucléaire. Rapport national du Canada pour la Convention sur la sûreté nucléaire: Deuxième réunion d'examen de la Convention. Ottawa, Ont: Commission canadienne de sûreté nucléaire, 2001.
Find full textCRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Find full textCanada, Gendarmerie royale du. Norme de sécurité technique dans le domaine de la technologie de l'information (NSTTI). Ottawa, Ont: Gendarmerie royale du Canada, 1992.
Find full textGavino, Morin, ed. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, Mass: MIT Press, 1994.
Find full textPost, Richard S. Security administration: An introduction to the protective services. 4th ed. Boston: Butterworth-Heinemann, 1991.
Find full textEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Find full textBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Find full textBrian, Stephens, ed. Administrating Web servers, security & maintenance. Upper Saddle River, NJ: Prentice Hall PTR, 2000.
Find full textCSIS Global Organized Crime Project. and Center for Strategic and International Studies (Washington, D.C.), eds. Cybercrime-- cyberterrorism-- cyberwarfare--: Averting an electronic Waterloo. Washington, D.C: CSIS Press, 1998.
Find full textSchneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Paris: Vuibert, 2001.
Find full textJoshua, Quittner, ed. Masters of deception: The gang that ruled cyberspace. New York: HarperPerennial, 1996.
Find full textSlatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
Find full textLucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. Paris: E ditions Eyrolles, 2006.
Find full textLucas, Michael. PGP & GPG: Email for the practical paranoid. San Francisco, CA: No Starch Press, 2006.
Find full textLucas, Michael. PGP & GPG: Assurer la confidentialité de son courrier électronique. Paris: Eyrolles, 2006.
Find full textIndia and the International Atomic Energy Agency: Mechanisms for nuclear non-proliferation. New Delhi: Jnanada Prakashan, 2011.
Find full textSchneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.
Find full textPolice, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Ottawa, Ont: Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.
Find full textCheryn, Picquet D., ed. Computer crime, abuse, liability, and security: A comprehensive bibliography, 1970-1984. Jefferson, N.C: McFarland, 1985.
Find full textJ, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.
Find full textClaude-Yves, Charron, and Théoret Yves 1960-, eds. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Find full textAnguilla), FC '98 (1998. Financial cryptography: Second International Conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedings. Berlin: Springer, 1998.
Find full textAnguilla), FC '97 (1997. Financial cryptography: First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Berlin: Springer, 1997.
Find full textCommission, Canadian Nuclear Safety. Strategic plan 2002-2007 and corporate plan 2002-2004 =: Plan stratégique 2002-2007 et plan directeur 2002-2004. Ottawa, Ont: Canadian Nuclear Safety Commission = Commission canadienne de sûreté nucléaire, 2002.
Find full textCommission, Canadian Nuclear Safety. Strategic plan 2002-2007 and corporate plan 2002-2004. [Ottawa]: Canadian Nuclear Safety Commission, 2002.
Find full textBruce, Christianson, and International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Find full textDominic, Palmer-Brown, Revett Kenneth, and SpringerLink (Online service), eds. Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full textV, Blane John, ed. Cyberwarfare: Terror at a click. Huntington, N.Y: Novinka Books, 2001.
Find full textAlexandra, Kura, ed. Rogue countries: Background and current issues. Huntington, NY: Nova Science Publishers, 2001.
Find full textCommission, Canadian Nuclear Safety. Canadian national report for the Convention on Nuclear Safety: Second review meeting. Ottawa: Canadian Nuclear Safety Commission, 2001.
Find full textCharles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Hull, Qué: Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Find full textCanada. Government Services Canada. Information Management Service. and Canada. Industrial and Corporate Security Branch., eds. Microcomputer and LAN security. [Ottawa]: Govt. Services Canada, 1993.
Find full text