Libros sobre el tema "APT (informatique) – Systèmes informatiques – Mesures de sûreté"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 43 mejores mejores libros para su investigación sobre el tema "APT (informatique) – Systèmes informatiques – Mesures de sûreté".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
Buscar texto completoCRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Buscar texto completoFaith, Cranor Lorrie y Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Buscar texto completoHansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.
Buscar texto completoBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Buscar texto completoPaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Buscar texto completoSlatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
Buscar texto completoJoshua, Quittner, ed. Masters of deception: The gang that ruled cyberspace. New York: HarperPerennial, 1996.
Buscar texto completoEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Buscar texto completoSchneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.
Buscar texto completoJ, Simmons Gustavus y Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.
Buscar texto completoJaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
Buscar texto completoBruce, Christianson y International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Buscar texto completoAnthony, Maeder y Martin-Sanchez Fernando J, eds. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). Amsterdam: IOS Press Inc., 2012.
Buscar texto completoClaude-Yves, Charron y Théoret Yves 1960-, eds. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Buscar texto completoHack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.
Buscar texto completoGiovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
Buscar texto completoIcove, David, Karl Seger y William VonStorch. Computer Crime: A Crimefighter's Handbook. Sebastopol: O'Reilly, 1995.
Buscar texto completoStefan, Katzenbeisser y Sadeghi Ahmad-Reza, eds. Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers. Berlin: Springer, 2009.
Buscar texto completoToward better usability, security, and privacy of information technology: Report of a workshop. Washington, D.C: National Academies Press, 2010.
Buscar texto completoGarfinkel, Simson. Practical UNIX and Internet security. 3a ed. Beijing: O'Reilly, 2003.
Buscar texto completoGarfinkel, Simson. Practical UNIX and Internet Security. 2a ed. Bonn: O'Reilly & Associates, 1996.
Buscar texto completoGavino, Morin, ed. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, Mass: MIT Press, 1994.
Buscar texto completoCybertraque. Omnibus, 1998.
Buscar texto completoCranor, Lorrie Faith y Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Buscar texto completoCranor, Lorrie Faith y Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Buscar texto completoCranor, Lorrie Faith y Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.
Buscar texto completoCranor, Lorrie Faith y Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Buscar texto completoLa Sécurité informatique. Presses Universitaires de France - PUF, 2003.
Buscar texto completoQuittner, Joshua y Michelle Slatalla. Masters of Deception: The Gang That Ruled Cyberspace. Harper Collins, 1995.
Buscar texto completoMasters of Deception. Bt Bound, 1999.
Buscar texto completo(Editor), Bart Preneel, Rene Govaerts (Editor) y Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Buscar texto completoGoncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
Buscar texto completoFirewalls. New York: McGraw-Hill, 2001.
Buscar texto completoGoncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
Buscar texto completoVinatier, Emmanuel. Hacking. Micro Application, 2003.
Buscar texto completoWindows Vista Quick Reference. Addison Wesley Publishing Company, 2007.
Buscar texto completoContemporary Cryptology: The Science of Information Integrity. Wiley-IEEE Press, 1999.
Buscar texto completoSimmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Institute of Electrical & Electronics Enginee, 1991.
Buscar texto completoVigna, Giovanni. Mobile Agents and Security. Springer London, Limited, 2003.
Buscar texto completoGarfinkel, Simson. Practical Unix and Internet Security: Securing Solaris, Mac OS X, Linux and Free BSD. O'Reilly Media, Incorporated, 2003.
Buscar texto completoGarfinkel, Simson. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2003.
Buscar texto completoGarfinkel, Simson. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2000.
Buscar texto completo