Books on the topic 'Systèmes informatiques – Mesures de sûreté – Évaluation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Systèmes informatiques – Mesures de sûreté – Évaluation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Jan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
CRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Faith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Bauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Hansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.
Slatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperPerennial, 1996.
Slatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
European Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
CSIS Global Organized Crime Project. and Center for Strategic and International Studies (Washington, D.C.), eds. Cybercrime-- cyberterrorism-- cyberwarfare--: Averting an electronic Waterloo. Washington, D.C: CSIS Press, 1998.
Paget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Schneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.
J, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.
Bruce, Christianson, and International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Jahankhani, Hamid. Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Fusaro, Magda. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Jaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
Chirillo, John. Hack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.
N.S.W.) Australian National Health Informatics Conference (20th 2012 Sydney. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). Amsterdam: IOS Press Inc., 2012.
Giovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
V, Blane John, ed. Cyberwarfare: Terror at a click. Huntington, N.Y: Novinka Books, 2001.
Alexandra, Kura, ed. Rogue countries: Background and current issues. Huntington, NY: Nova Science Publishers, 2001.
IH 2009 (2009 Darmstadt, Germany). Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers. Berlin: Springer, 2009.
National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems. Toward better usability, security, and privacy of information technology: Report of a workshop. Washington, D.C: National Academies Press, 2010.
Icove, David, Karl Seger, and William VonStorch. Computer Crime: A Crimefighter's Handbook. Sebastopol: O'Reilly, 1995.
Cavazos, Edward A. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, Mass: MIT Press, 1994.
Garfinkel, Simson. Practical UNIX and Internet Security. 2nd ed. Bonn: O'Reilly & Associates, 1996.
Garfinkel, Simson. Practical UNIX and Internet security. 3rd ed. Beijing: O'Reilly, 2003.
Markoff, John, and Tsutomu Shimomura. Cybertraque. Omnibus, 1998.
Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.
Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Quittner, Joshua, and Michelle Slatalla. Masters of Deception: The Gang That Ruled Cyberspace. Harper Collins, 1995.
Masters of Deception. Bt Bound, 1999.
(Editor), Bart Preneel, Rene Govaerts (Editor), and Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Butow, Eric. Windows Vista Quick Reference. Addison Wesley Publishing Company, 2007.
Firewalls. New York: McGraw-Hill, 2001.
Goncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
Goncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
sais-je?, Que, Serge Lhoste, and Éric Léopold. La Sécurité informatique. Presses Universitaires de France - PUF, 2003.
Simmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Wiley-IEEE Press, 1999.
Simmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Institute of Electrical & Electronics Enginee, 1991.
Vinatier, Emmanuel. Hacking. Micro Application, 2003.
Foundations and Practice of Security Lecture Notes in Computer Science. Springer, 2012.
Hawker, Andrew. Security in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks). Routledge, 2001.
Hawker, Andrew. Security in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks). Routledge, 2000.
Vigna, Giovanni. Mobile Agents and Security. Springer London, Limited, 2003.
Blane, John V. Cyberwarfare: Terror at a Click. Nova Science Publishers, 2001.
Blane, John V. Cyberwarfare: Terror at a Click. Novinka Books, 2001.
Schwartz, Alan, Simson Garfinkel, and Gene Spafford. Practical Unix and Internet Security: Securing Solaris, Mac OS X, Linux and Free BSD. O'Reilly Media, Incorporated, 2003.