Books on the topic 'Systèmes informatiques – Mesures de sûreté – Automatisation'

To see the other types of publications on this topic, follow the link: Systèmes informatiques – Mesures de sûreté – Automatisation.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Systèmes informatiques – Mesures de sûreté – Automatisation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Jan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

CRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Faith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Slatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperPerennial, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Slatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

European Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

CSIS Global Organized Crime Project. and Center for Strategic and International Studies (Washington, D.C.), eds. Cybercrime-- cyberterrorism-- cyberwarfare--: Averting an electronic Waterloo. Washington, D.C: CSIS Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Paget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Schneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

J, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Bruce, Christianson, and International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jahankhani, Hamid. Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Fusaro, Magda. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Jaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Chirillo, John. Hack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

N.S.W.) Australian National Health Informatics Conference (20th 2012 Sydney. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). Amsterdam: IOS Press Inc., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Giovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

V, Blane John, ed. Cyberwarfare: Terror at a click. Huntington, N.Y: Novinka Books, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Alexandra, Kura, ed. Rogue countries: Background and current issues. Huntington, NY: Nova Science Publishers, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

IH 2009 (2009 Darmstadt, Germany). Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers. Berlin: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems. Toward better usability, security, and privacy of information technology: Report of a workshop. Washington, D.C: National Academies Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Icove, David, Karl Seger, and William VonStorch. Computer Crime: A Crimefighter's Handbook. Sebastopol: O'Reilly, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Cavazos, Edward A. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, Mass: MIT Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Garfinkel, Simson. Practical UNIX and Internet Security. 2nd ed. Bonn: O'Reilly & Associates, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Garfinkel, Simson. Practical UNIX and Internet security. 3rd ed. Beijing: O'Reilly, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Markoff, John, and Tsutomu Shimomura. Cybertraque. Omnibus, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Quittner, Joshua, and Michelle Slatalla. Masters of Deception: The Gang That Ruled Cyberspace. Harper Collins, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Masters of Deception. Bt Bound, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

(Editor), Bart Preneel, Rene Govaerts (Editor), and Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Butow, Eric. Windows Vista Quick Reference. Addison Wesley Publishing Company, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Firewalls. New York: McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Goncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Goncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

sais-je?, Que, Serge Lhoste, and Éric Léopold. La Sécurité informatique. Presses Universitaires de France - PUF, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Simmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Wiley-IEEE Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Simmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Institute of Electrical & Electronics Enginee, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Vinatier, Emmanuel. Hacking. Micro Application, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Foundations and Practice of Security Lecture Notes in Computer Science. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Vigna, Giovanni. Mobile Agents and Security. Springer London, Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Blane, John V. Cyberwarfare: Terror at a Click. Nova Science Publishers, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Blane, John V. Cyberwarfare: Terror at a Click. Novinka Books, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Schwartz, Alan, Simson Garfinkel, and Gene Spafford. Practical Unix and Internet Security: Securing Solaris, Mac OS X, Linux and Free BSD. O'Reilly Media, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Schwartz, Alan, Simson Garfinkel, and Gene Spafford. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Garfinkel, Simson, Gene Spafford, and Deborah Russell. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography