Academic literature on the topic 'Renseignements commerciaux confidentiels'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Contents

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Renseignements commerciaux confidentiels.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Books on the topic "Renseignements commerciaux confidentiels"

1

Ghernaouti-Helie, Solange, and Igli Tashi. Information Security Evaluation: A Holistic Approach from a Business Perspective. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ghernaouti-Helie, Solange, and Igli Tashi. Information Security Evaluation: A Holistic Approach from a Business Perspective. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Information Security Evaluation: A Holistic Approach from a Business Perspective. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Helie, Solange Ghernaouti. Information Security Evaluation. Presses Polytechniques et Universitaires Romandes, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cerra, Allison. Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security. Wiley & Sons, Limited, John, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security. Wiley & Sons, Incorporated, John, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rai, Sajay, Philip Chukwuma, and Richard Cozart. Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rai, Sajay, Philip Chukwuma, and Richard Cozart. Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rai, Sajay, Philip Chukwuma, and Richard Cozart. Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography