Books on the topic 'Mesure du réseau'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Mesure du réseau.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Prum, Bernard. Processus sur un réseau et mesures de Gibbs: Applications. Paris: Masson, 1986.
Find full textLlorens, Cédric. Tableaux de bord de la sécurité réseau. 2nd ed. Paris: Eyrolles, 2006.
Find full textDordoigne, José. Réseaux informatiques: Notions fondamentales : protocoles, architectures, réseaux sans fil, virtualisation, sécurité, IP v6 ... 6th ed. St-Herblain: Éd. ENI, 2015.
Find full textWald und Landschaft Schweiz. Bundesamt für Umwelt. La pollution de l'air: Mesures exécutées à l'aide du Réseau national d'observation des polluants atmosphériques (NABEL). Berne: commande: Office fédéral de l'environnement, des forêts et du paysage, Documentation, 2000.
Find full textPaiements électroniques sécurisés. 2nd ed. Lausanne: Presses polytechniques et universitaires romanes, 2007.
Find full textSerge, Springinsfeld, ed. Le guide anti hacker. Paris: Micro Application, 2001.
Find full text1968-, Blundo Carlo, and Cimato Stelvio, eds. Security in communication networks: 4th international conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers. Berlin: Springer, 2005.
Find full textI, Ahson S., ed. Information security: A practical approach. Oxford, UK: Alpha Science, 2008.
Find full textCharles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Hull, Qué: Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Find full textKartalopoulos, Stamatios V. Security of information and communication networks. Hoboken, N.J: Wiley, 2009.
Find full textSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Find full textComputer network security: Theory and practice. Berlin: Springer, 2009.
Find full textExpert Workshop on the Measurement of Social Capital for Public Policy (2004 Ottawa, Ont.). Expert Workshop on the Measurement of Social Capital for Public Policy: Synthesis report = Atelier d'experts sur la mesure de capital social pour des fins de politiques publiques [ressource électronique] : rapport de synthèse. [Ottawa]: Policy Research Initiative = Projet de recherche sur les politiques, 2004.
Find full textBoutherin, Bernard. Se curiser un re seau Linux. 3rd ed. Paris: Eyrolles, 2006.
Find full textBrian, Stephens, ed. Administrating Web servers, security & maintenance. Upper Saddle River, NJ: Prentice Hall PTR, 2000.
Find full textPartners, Certification, and CIW -- Certified Internet Web Professional, eds. Network technology associate: Student guide. Tempe, AZ: Certification Partners, 2014.
Find full textSecurity of information and communication networks. Hoboken, N.J: Wiley, 2009.
Find full textCloud design fundamentals: Cloud design and security for network engineers. Charleston, SC: [CreateSpace], 2015.
Find full textUnofficial guide to ethical hacking. [S.l.]: Premier Press, 2002.
Find full textJudy, Novak, ed. Network intrusion detection. 3rd ed. Indianapolis, Ind: New Riders Pub., 2002.
Find full textNetwork intrusion detection: An analyst's handbook. Indianapolis, Ind: New Riders, 1999.
Find full textJudy, Novak, and McLachlan Donald, eds. Network intrusion detection: An analyst's handbook. 2nd ed. Indianapolis, Ind: New Riders, 2001.
Find full textThe parent's handbook for talking with your teens about social media: The right words and effective techniques to get your kids safely on board. Place of publication not identified]: Art of Behavior Change Publications, 2013.
Find full textSecurity of self-organizing networks: MANET, WSN, WMN, VANET. Boca Raton: Auerbach Publications, 2011.
Find full textMatthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Boca Raton, FL: Auerbach Publications, 2011.
Find full textRéseau national de surveillance de la pollution atmosphérique (RNSPA), la qualitde l'air au Canada: Sommaire pour 2001 et analyse des tendances pour 1990-2001. Ottawa, Ont: Environnement Canada, 2004.
Find full textVinatier, Emmanuel. Hacking. Micro Application, 2003.
Find full textKosiur, David R. Understanding Policy-Based Networking. John Wiley & Sons, 2001.
Find full textDeLaet, Gert, and Gert Schauwers. Network Security Fundamentals. Pearson Education, Limited, 2011.
Find full textNetwork Security Fundamentals. Cisco Press, 2004.
Find full textSpringer, Claude, and Frédérique Longuet. Autour du CECR - Volume complémentaire (2018) : médiation et collaboration. Editions des archives contemporaines, 2021. http://dx.doi.org/10.17184/eac.9782813004055.
Full textSurfing Anonymously. Data Becker, 2002.
Find full textBella, Giampaolo. Formal Correctness of Security Protocols (Information Security and Cryptography). Springer, 2007.
Find full textPrasad, Ramjee, and Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Find full textSimpson, William, Kevin Foltz, and Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Find full textSimpson, William, Kevin Foltz, and Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Find full textPrasad, Ramjee, and Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Find full textSimpson, William, Kevin Foltz, and Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Find full textSimpson, William, Kevin Foltz, and Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Find full textSecurity Within CONASENSE Paragon. River Publishers, 2019.
Find full textPrasad, Ramjee, and Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2019.
Find full textPrasad, Ramjee, and Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Find full textWylder, John. Strategic Information Security. Taylor & Francis Group, 2019.
Find full textComputer Network Security. Springer, 2005.
Find full textSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textZero Trust Networks: Building Secure Systems in Untrusted Networks. O'Reilly Media, 2017.
Find full textSecuring Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textStephens, Brian, and Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Find full textStephens, Brian, and Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Find full text