Libros sobre el tema "Sécurité des données routières"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Sécurité des données routières".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Burkina Faso. Ministère du travail et de la sécurité sociale. Travail et sécurité sociale: Analyse des données. Ouagadougou, Burkina Faso]: Ministère du Travail et de la Sécurité Sociale, Secrétariat Général, 2008.
Buscar texto completoCanada, Canada Santé. Pour la sécurité des jeunes canadiens: Des données statistiques aux mesures préventives. Ottawa, Ont: Santé Canada, 1997.
Buscar texto completoCanada. Human Resources Development Canada., ed. Social security in Canada ; background facts =: La sécurité sociale au Canada ; données documentaires. Hull, Quebec: Human Resources Development Canada, 1994.
Buscar texto completoCanada. Human Resources Development Canada., ed. Social security in Canada: Background facts = La sécurité sociale au Canada : données documentaires. Ottawa: Human Resources Development Canada, 1994.
Buscar texto completomédicaments, Canada Direction des. Gestion des données cliniques sur l'innocuité des médicaments: Définitions et normes relatives à la déclaration rapide. Ottawa, Ont: Direction générale de la protection de la santé, Santé Canada, 1995.
Buscar texto completoGodefroy, Thierry. Les coûts du crime en France: Les dépenses de sécurité, données pour 1988 à 1991. Paris: CESDIP, 1993.
Buscar texto completoCanada, Gendarmerie royale du. Norme de sécurité technique dans le domaine de la technologie de l'information (NSTTI). Ottawa, Ont: Gendarmerie royale du Canada, 1992.
Buscar texto completoFaragallah, Osama S. Multilevel security for relational databases. Boca Raton: Taylor & Francis, CRC Press, 2015.
Buscar texto completoDordoigne, José. Réseaux informatiques: Notions fondamentales : protocoles, architectures, réseaux sans fil, virtualisation, sécurité, IP v6 ... 6a ed. St-Herblain: Éd. ENI, 2015.
Buscar texto completoEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Buscar texto completoFréchet, Guy. Les personnes moyennement scolarisées et la précarité de l'emploi: Une analyse des données de l'Enquête sur l'activité. Québec, Qué: Institut québécois de recherche sur la culture, 1991.
Buscar texto completoBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Buscar texto completoIntroduction to privacy-preserving data publishing: Concepts and techniques. Boca Raton: Chapman & Hall/CRC, 2010.
Buscar texto completoPolice, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Ottawa, Ont: Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.
Buscar texto completoTon, Kalker, Cox I. J y Ro Yong Man, eds. Digitial watermarking: Second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers. Berlin: Springer, 2004.
Buscar texto completo1962-, Jonker Willem y Petković Milan, eds. Secure data management: Second VLDB workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings. Berlin: Springer, 2005.
Buscar texto completo1947-, Young Curtis W., ed. Mastering SQL Server 2000 security. New York: Wiley Computer Pub., 2002.
Buscar texto completoClaude-Yves, Charron y Théoret Yves 1960-, eds. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Buscar texto completoChristian, Cachin y Camenisch Jan, eds. Advances in cryptology: EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings. Berlin: Springer, 2004.
Buscar texto completoBen-Natan, Ron. Implementing database security and auditing: A guide for DBAs, information security administrators and auditors. Burlington, MA: Elsevier Digital Press, 2005.
Buscar texto completoCryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.
Buscar texto completoEuropean Commission. Directorate General XV, Internal Market and Financial Services, ed. IDA: Protection des données : secteurs de la santé de la sécurité sociale : annexe au rapport annuel 1998 (XV D/5047/98) du groupe de travail établi par l'article 29 de la directive 95/46/CE. Luxembourg: Office des publications officielles des Communautés européennes, 1999.
Buscar texto completoIFIP TC11 International Conference on Information Security (11th 1995 Cape Town, South Africa). Information security-the next decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95. London: Chapman & Hall on behalf of the IFIP, 1995.
Buscar texto completoMcCumber, John. Assessing and managing security risk in IT systems: A structured methodology. Boca Raton, FL: Auerbach Publications, 2005.
Buscar texto completoJavier, López, Yeo Sang-Soo, Shon Taeshik, Taniar David y SpringerLink (Online service), eds. Secure and Trust Computing, Data Management and Applications: 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Buscar texto completoSauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Cowansville, Québec: Éditions Y. Blais, 2013.
Buscar texto completoWietse, Venema, ed. Forensic discovery. Upper Saddle River, NJ: Addison-Wesley, 2005.
Buscar texto completoGardarin, G. Relational databases and knowledge bases. Reading, Mass: Addison-Wesley, 1989.
Buscar texto completoFranck, Tognini, ed. Petit manuel d'intelligence économique au quotidien: Comment collecter, analyser, diffuser et protéger son information. Paris: Dunod, 2006.
Buscar texto completoInternational Conference for Occupational Health, Safety and Hygiene Information Specialists (1989 Luxembourg). Industrial health and safety: International conference for occupational health, safety and hygiene information specialists. Luxembourg: Commission of the European Communities, Directorate-General, Telecommunications, Information Industries and Innovation, 1990.
Buscar texto completo1969-, Boneh Dan, ed. Advances in cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003 : proceedings. Berlin: Springer, 2003.
Buscar texto completoL'illusion sécuritaire: Fichage, torture-- personne n'est à l'abri. Montréal: Éditions Écosociété, 2010.
Buscar texto completoQuality, American Society for, ed. Data integrity and compliance: A primer for medical product manufacturers. Milwaukee, Wisconsin: ASQ Quality Press, 2019.
Buscar texto completoManaging the human factor in information security how to win over staff and influence business managers. Chichester, West Sussex, England: Wiley, 2009.
Buscar texto completoLacey, David. Managing the Human Factor in Information Security. New York: John Wiley & Sons, Ltd., 2009.
Buscar texto completoDecent work indicators in Africa: A first assessment based on national sources. Geneva: ILO, 2012.
Buscar texto completoAssessing and Managing Security Risk in IT Systems. London: Taylor and Francis, 2004.
Buscar texto completoDate, C. J. An introduction to database systems. 6a ed. Reading, Mass: Addison-Wesley, 1994.
Buscar texto completoDate, C. J. An introduction to database systems. 7a ed. Reading, Mass: Addison-Wesley, 2000.
Buscar texto completoDate, C. J. An introduction to database systems. 7a ed. Reading, Mass: Addison-Wesley, 2000.
Buscar texto completoLa Sécurité informatique. Presses Universitaires de France - PUF, 2003.
Buscar texto completoVitalis, Nadine. PEUT-ON CONCILIER L’INTERNET DES OBJETS ET LA SÉCURITÉ DES DONNÉES PERSONNELLES ? Independently Published, 2019.
Buscar texto completoIdentifiants and Mots de Passe: Pour la Sécurité de Vos Données, Soyez Prudent ! Independently Published, 2020.
Buscar texto completoMultilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Buscar texto completoEl-Rabaie, El-Sayed M., Osama S. Faragallah y Fathi E. El-Samie. Multilevel Security for Relational Databases. Taylor & Francis Group, 2015.
Buscar texto completoEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam y Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Buscar texto completoThuraisingham, Bhavani. Database and Applications Security: Integrating Information Security and Data Management. Auerbach Publishers, Incorporated, 2005.
Buscar texto completoThuraisingham, Bhavani. Database and Applications Security: Integrating Information Security and Data Management. Auerbach Publishers, Incorporated, 2005.
Buscar texto completoDatabase and Applications Security: Integrating Information Security and Data Management. AUERBACH, 2005.
Buscar texto completoBig Data Analytics in Cybersecurity. Taylor & Francis Group, 2017.
Buscar texto completo