Books on the topic 'Sécurité des données routières'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Sécurité des données routières.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Burkina Faso. Ministère du travail et de la sécurité sociale. Travail et sécurité sociale: Analyse des données. Ouagadougou, Burkina Faso]: Ministère du Travail et de la Sécurité Sociale, Secrétariat Général, 2008.
Find full textCanada, Canada Santé. Pour la sécurité des jeunes canadiens: Des données statistiques aux mesures préventives. Ottawa, Ont: Santé Canada, 1997.
Find full textCanada. Human Resources Development Canada., ed. Social security in Canada ; background facts =: La sécurité sociale au Canada ; données documentaires. Hull, Quebec: Human Resources Development Canada, 1994.
Find full textCanada. Human Resources Development Canada., ed. Social security in Canada: Background facts = La sécurité sociale au Canada : données documentaires. Ottawa: Human Resources Development Canada, 1994.
Find full textmédicaments, Canada Direction des. Gestion des données cliniques sur l'innocuité des médicaments: Définitions et normes relatives à la déclaration rapide. Ottawa, Ont: Direction générale de la protection de la santé, Santé Canada, 1995.
Find full textGodefroy, Thierry. Les coûts du crime en France: Les dépenses de sécurité, données pour 1988 à 1991. Paris: CESDIP, 1993.
Find full textCanada, Gendarmerie royale du. Norme de sécurité technique dans le domaine de la technologie de l'information (NSTTI). Ottawa, Ont: Gendarmerie royale du Canada, 1992.
Find full textFaragallah, Osama S. Multilevel security for relational databases. Boca Raton: Taylor & Francis, CRC Press, 2015.
Find full textDordoigne, José. Réseaux informatiques: Notions fondamentales : protocoles, architectures, réseaux sans fil, virtualisation, sécurité, IP v6 ... 6th ed. St-Herblain: Éd. ENI, 2015.
Find full textEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Find full textFréchet, Guy. Les personnes moyennement scolarisées et la précarité de l'emploi: Une analyse des données de l'Enquête sur l'activité. Québec, Qué: Institut québécois de recherche sur la culture, 1991.
Find full textBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Find full textIntroduction to privacy-preserving data publishing: Concepts and techniques. Boca Raton: Chapman & Hall/CRC, 2010.
Find full textPolice, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Ottawa, Ont: Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.
Find full textTon, Kalker, Cox I. J, and Ro Yong Man, eds. Digitial watermarking: Second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers. Berlin: Springer, 2004.
Find full text1962-, Jonker Willem, and Petković Milan, eds. Secure data management: Second VLDB workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings. Berlin: Springer, 2005.
Find full text1947-, Young Curtis W., ed. Mastering SQL Server 2000 security. New York: Wiley Computer Pub., 2002.
Find full textClaude-Yves, Charron, and Théoret Yves 1960-, eds. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Find full textChristian, Cachin, and Camenisch Jan, eds. Advances in cryptology: EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings. Berlin: Springer, 2004.
Find full textBen-Natan, Ron. Implementing database security and auditing: A guide for DBAs, information security administrators and auditors. Burlington, MA: Elsevier Digital Press, 2005.
Find full textCryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.
Find full textEuropean Commission. Directorate General XV, Internal Market and Financial Services, ed. IDA: Protection des données : secteurs de la santé de la sécurité sociale : annexe au rapport annuel 1998 (XV D/5047/98) du groupe de travail établi par l'article 29 de la directive 95/46/CE. Luxembourg: Office des publications officielles des Communautés européennes, 1999.
Find full textIFIP TC11 International Conference on Information Security (11th 1995 Cape Town, South Africa). Information security-the next decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95. London: Chapman & Hall on behalf of the IFIP, 1995.
Find full textMcCumber, John. Assessing and managing security risk in IT systems: A structured methodology. Boca Raton, FL: Auerbach Publications, 2005.
Find full textJavier, López, Yeo Sang-Soo, Shon Taeshik, Taniar David, and SpringerLink (Online service), eds. Secure and Trust Computing, Data Management and Applications: 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textSauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Cowansville, Québec: Éditions Y. Blais, 2013.
Find full textWietse, Venema, ed. Forensic discovery. Upper Saddle River, NJ: Addison-Wesley, 2005.
Find full textGardarin, G. Relational databases and knowledge bases. Reading, Mass: Addison-Wesley, 1989.
Find full textFranck, Tognini, ed. Petit manuel d'intelligence économique au quotidien: Comment collecter, analyser, diffuser et protéger son information. Paris: Dunod, 2006.
Find full textInternational Conference for Occupational Health, Safety and Hygiene Information Specialists (1989 Luxembourg). Industrial health and safety: International conference for occupational health, safety and hygiene information specialists. Luxembourg: Commission of the European Communities, Directorate-General, Telecommunications, Information Industries and Innovation, 1990.
Find full text1969-, Boneh Dan, ed. Advances in cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003 : proceedings. Berlin: Springer, 2003.
Find full textL'illusion sécuritaire: Fichage, torture-- personne n'est à l'abri. Montréal: Éditions Écosociété, 2010.
Find full textQuality, American Society for, ed. Data integrity and compliance: A primer for medical product manufacturers. Milwaukee, Wisconsin: ASQ Quality Press, 2019.
Find full textManaging the human factor in information security how to win over staff and influence business managers. Chichester, West Sussex, England: Wiley, 2009.
Find full textLacey, David. Managing the Human Factor in Information Security. New York: John Wiley & Sons, Ltd., 2009.
Find full textDecent work indicators in Africa: A first assessment based on national sources. Geneva: ILO, 2012.
Find full textAssessing and Managing Security Risk in IT Systems. London: Taylor and Francis, 2004.
Find full textDate, C. J. An introduction to database systems. 6th ed. Reading, Mass: Addison-Wesley, 1994.
Find full textDate, C. J. An introduction to database systems. 7th ed. Reading, Mass: Addison-Wesley, 2000.
Find full textDate, C. J. An introduction to database systems. 7th ed. Reading, Mass: Addison-Wesley, 2000.
Find full textLa Sécurité informatique. Presses Universitaires de France - PUF, 2003.
Find full textVitalis, Nadine. PEUT-ON CONCILIER L’INTERNET DES OBJETS ET LA SÉCURITÉ DES DONNÉES PERSONNELLES ? Independently Published, 2019.
Find full textIdentifiants and Mots de Passe: Pour la Sécurité de Vos Données, Soyez Prudent ! Independently Published, 2020.
Find full textMultilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Find full textEl-Rabaie, El-Sayed M., Osama S. Faragallah, and Fathi E. El-Samie. Multilevel Security for Relational Databases. Taylor & Francis Group, 2015.
Find full textEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam, and Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Find full textThuraisingham, Bhavani. Database and Applications Security: Integrating Information Security and Data Management. Auerbach Publishers, Incorporated, 2005.
Find full textThuraisingham, Bhavani. Database and Applications Security: Integrating Information Security and Data Management. Auerbach Publishers, Incorporated, 2005.
Find full textDatabase and Applications Security: Integrating Information Security and Data Management. AUERBACH, 2005.
Find full textBig Data Analytics in Cybersecurity. Taylor & Francis Group, 2017.
Find full text