Libros sobre el tema "Logiciel – Mesures de sûreté"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Logiciel – Mesures de sûreté".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Highland, Harold Joseph. Comment protéger votre micro: Matériel et logiciel : protection et confidentialité en micro-informatique. Paris: Masson, 1985.
Buscar texto completoFaith, Cranor Lorrie y Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Buscar texto completoPaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Buscar texto completoHansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.
Buscar texto completoSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Buscar texto completoSurfez sans risque : protégez votre ordinateur: Virus, spywares, chevaux de Troie, pirates, spam. Nantes, France: Éditions ENI, 2005.
Buscar texto completoGiovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
Buscar texto completoCanada. Approvisionnements et services Canada. Manuel de la sécurité industrielle. Ottawa, Ont: Ministre des approvisionnements et services Canada, 1992.
Buscar texto completoL' entreprise aux aguets: Information, surveillance de l'environnement, propriété et protection industrielles, espionnage et contre-espionnage au service de la compétitivité. Paris: Masson, 1990.
Buscar texto completoJan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
Buscar texto completoSmart card security and applications. Boston: Artech House, 1997.
Buscar texto completoBoutherin, Bernard. Se curiser un re seau Linux. 3a ed. Paris: Eyrolles, 2006.
Buscar texto completoInternet security with Windows NT. Loveland, CO: Duke Press, 1998.
Buscar texto completoCommission canadienne de sûreté nucléaire. Les programmes informatiques utilisés lors de la conception et des analyses de sûreté des centrales nucléaires et des réacteurs de recherche. Ottawa, Ont: Commission canadienne de sûreté nucléaire, 2000.
Buscar texto completoPaiements électroniques sécurisés. 2a ed. Lausanne: Presses polytechniques et universitaires romanes, 2007.
Buscar texto completoCommission canadienne de sûreté nucléaire. Rapport national du Canada pour la Convention sur la sûreté nucléaire: Deuxième réunion d'examen de la Convention. Ottawa, Ont: Commission canadienne de sûreté nucléaire, 2001.
Buscar texto completoCRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Buscar texto completoCanada, Gendarmerie royale du. Norme de sécurité technique dans le domaine de la technologie de l'information (NSTTI). Ottawa, Ont: Gendarmerie royale du Canada, 1992.
Buscar texto completoGavino, Morin, ed. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, Mass: MIT Press, 1994.
Buscar texto completoCo-auteur, Zuchelli Edmond, ed. La Peste informatique. Paris: Ed. Plume, 1989.
Buscar texto completoPost, Richard S. Security administration: An introduction to the protective services. 4a ed. Boston: Butterworth-Heinemann, 1991.
Buscar texto completoEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Buscar texto completoBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Buscar texto completoBrian, Stephens, ed. Administrating Web servers, security & maintenance. Upper Saddle River, NJ: Prentice Hall PTR, 2000.
Buscar texto completoCSIS Global Organized Crime Project. y Center for Strategic and International Studies (Washington, D.C.), eds. Cybercrime-- cyberterrorism-- cyberwarfare--: Averting an electronic Waterloo. Washington, D.C: CSIS Press, 1998.
Buscar texto completoSchneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2a ed. Paris: Vuibert, 2001.
Buscar texto completoJoshua, Quittner, ed. Masters of deception: The gang that ruled cyberspace. New York: HarperPerennial, 1996.
Buscar texto completoSlatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
Buscar texto completoLucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. Paris: E ditions Eyrolles, 2006.
Buscar texto completoLucas, Michael. PGP & GPG: Email for the practical paranoid. San Francisco, CA: No Starch Press, 2006.
Buscar texto completoLucas, Michael. PGP & GPG: Assurer la confidentialité de son courrier électronique. Paris: Eyrolles, 2006.
Buscar texto completoIndia and the International Atomic Energy Agency: Mechanisms for nuclear non-proliferation. New Delhi: Jnanada Prakashan, 2011.
Buscar texto completoSchneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.
Buscar texto completoPolice, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Ottawa, Ont: Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.
Buscar texto completoCheryn, Picquet D., ed. Computer crime, abuse, liability, and security: A comprehensive bibliography, 1970-1984. Jefferson, N.C: McFarland, 1985.
Buscar texto completoJ, Simmons Gustavus y Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.
Buscar texto completoClaude-Yves, Charron y Théoret Yves 1960-, eds. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Buscar texto completoAnguilla), FC '98 (1998. Financial cryptography: Second International Conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedings. Berlin: Springer, 1998.
Buscar texto completoAnguilla), FC '97 (1997. Financial cryptography: First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Berlin: Springer, 1997.
Buscar texto completoCommission, Canadian Nuclear Safety. Strategic plan 2002-2007 and corporate plan 2002-2004 =: Plan stratégique 2002-2007 et plan directeur 2002-2004. Ottawa, Ont: Canadian Nuclear Safety Commission = Commission canadienne de sûreté nucléaire, 2002.
Buscar texto completoCommission, Canadian Nuclear Safety. Strategic plan 2002-2007 and corporate plan 2002-2004. [Ottawa]: Canadian Nuclear Safety Commission, 2002.
Buscar texto completoBruce, Christianson y International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Buscar texto completoHack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.
Buscar texto completoDominic, Palmer-Brown, Revett Kenneth y SpringerLink (Online service), eds. Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Buscar texto completoV, Blane John, ed. Cyberwarfare: Terror at a click. Huntington, N.Y: Novinka Books, 2001.
Buscar texto completoAlexandra, Kura, ed. Rogue countries: Background and current issues. Huntington, NY: Nova Science Publishers, 2001.
Buscar texto completoCommission, Canadian Nuclear Safety. Canadian national report for the Convention on Nuclear Safety: Second review meeting. Ottawa: Canadian Nuclear Safety Commission, 2001.
Buscar texto completoJaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
Buscar texto completoCharles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Hull, Qué: Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Buscar texto completoCanada. Government Services Canada. Information Management Service. y Canada. Industrial and Corporate Security Branch., eds. Microcomputer and LAN security. [Ottawa]: Govt. Services Canada, 1993.
Buscar texto completo