Books on the topic 'Mesures de réseau'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Mesures de réseau.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Prum, Bernard. Processus sur un réseau et mesures de Gibbs: Applications. Paris: Masson, 1986.
Find full textLlorens, Cédric. Tableaux de bord de la sécurité réseau. 2nd ed. Paris: Eyrolles, 2006.
Find full textWald und Landschaft Schweiz. Bundesamt für Umwelt. La pollution de l'air: Mesures exécutées à l'aide du Réseau national d'observation des polluants atmosphériques (NABEL). Berne: commande: Office fédéral de l'environnement, des forêts et du paysage, Documentation, 2000.
Find full textNamin, Catherine. Mesures des effets de réseau sur la contribution individuelle des représentants du personnel à l'intelligence économique du comité d'entreprise européen. Grenoble: A.N.R.T, Université Pierre Mendes France (Grenoble II), 2000.
Find full textKuruhongsa, Prakan. Optimisation d'un spectomètre de RPE permettant des mesures de T1: Application à la relaxation spin-réseau de Fe³⁺, Co²⁺ et Mn²⁺. Grenoble: A.N.R.T. Université Pierre Mendès France Grenoble 2, 1986.
Find full textDordoigne, José. Réseaux informatiques: Notions fondamentales : protocoles, architectures, réseaux sans fil, virtualisation, sécurité, IP v6 ... 6th ed. St-Herblain: Éd. ENI, 2015.
Find full textKartalopoulos, Stamatios V. Security of information and communication networks. Hoboken, N.J: Wiley, 2009.
Find full textCharles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Hull, Qué: Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Find full textBoutherin, Bernard. Se curiser un re seau Linux. 3rd ed. Paris: Eyrolles, 2006.
Find full textSchneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Paris: Vuibert, 2001.
Find full textMatthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Boca Raton, FL: Auerbach Publications, 2011.
Find full textVinatier, Emmanuel. Hacking. Micro Application, 2003.
Find full textSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Find full textMastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.
Find full textRéseau national de surveillance de la pollution atmosphérique (RNSPA), la qualitde l'air au Canada: Sommaire pour 2001 et analyse des tendances pour 1990-2001. Ottawa, Ont: Environnement Canada, 2004.
Find full textERIC, A. B. Sécurité Routeur et Commutateur: La Sécurité des Réseaux Informatiques, Besoins de Sécurité et Solutions, Quelque Attaques Sur les Routeurs et Contre-Mesures. Independently Published, 2020.
Find full textDeLaet, Gert, and Gert Schauwers. Network Security Fundamentals. Pearson Education, Limited, 2011.
Find full textKosiur, David R. Understanding Policy-Based Networking. John Wiley & Sons, 2001.
Find full textBella, Giampaolo. Formal Correctness of Security Protocols (Information Security and Cryptography). Springer, 2007.
Find full textPrasad, Ramjee, and Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Find full textSimpson, William, Kevin Foltz, and Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Find full textSimpson, William, Kevin Foltz, and Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Find full textPrasad, Ramjee, and Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Find full textSimpson, William, Kevin Foltz, and Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Find full textSimpson, William, Kevin Foltz, and Institute For Institute For Defense Analyses. Enterprise Level Security 2: Advanced Topics in an Uncertain World. Taylor & Francis Group, 2020.
Find full textPrasad, Ramjee, and Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2019.
Find full textPrasad, Ramjee, and Leo P. Ligthart. Security Within CONASENSE Paragon. River Publishers, 2022.
Find full textEnterprise Level Security 2. Taylor & Francis Group, 2020.
Find full textSecurity Within CONASENSE Paragon. River Publishers, 2019.
Find full textStephens, Brian, and Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Find full textStephens, Brian, and Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.
Find full textWylder, John. Strategic Information Security. Taylor & Francis Group, 2019.
Find full textZero Trust Networks: Building Secure Systems in Untrusted Networks. O'Reilly Media, 2017.
Find full textSecuring Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSecurity in Sensor Networks. AUERBACH, 2006.
Find full textNetwork and Data Security for Non-Engineers. Taylor & Francis Group, 2016.
Find full textGroom, Frank M. Network and Data Security for Non-Engineers. Taylor & Francis Group, 2017.
Find full textJones, Stephan S., Frank M. Groom, and Kevin Groom. Network and Data Security for Non-Engineers. Auerbach Publishers, Incorporated, 2016.
Find full textJones, Stephan S., Frank M. Groom, and Kevin Groom. Network and Data Security for Non-Engineers. Auerbach Publishers, Incorporated, 2016.
Find full textKhan, Shafiullah. Security for Multihop Wireless Networks. Taylor & Francis Group, 2014.
Find full textMauri, Jaime Lloret, and Shafiullah Khan. Security for Multihop Wireless Networks. Taylor & Francis Group, 2016.
Find full textSecurity for Multihop Wireless Networks. Taylor & Francis Group, 2014.
Find full textNetwork Attacks And Defenses A Handson Approach. Taylor & Francis Ltd, 2012.
Find full textInsider's Guide to Cyber Security Architecture. Taylor & Francis Group, 2019.
Find full textSecurity, Privacy and Reliability in Computer Communications and Networks. River Publishers, 2017.
Find full textPathan, Al-Sakib Khan, and Kutub Thakur. Cybersecurity Fundamentals: A Real-World Perspective. Taylor & Francis Group, 2020.
Find full textPathan, Al-Sakib Khan, and Kutub Thakur. Cybersecurity Fundamentals: A Real-World Perspective. Taylor & Francis Group, 2020.
Find full textSong, Min, Kewei Sha, and Aaron Striegel. Security, Privacy and Reliability in Computer Communications and Networks. River Publishers, 2022.
Find full text