Libros sobre el tema "Systèmes informatiques – Mesures de sûreté – Évaluation"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Systèmes informatiques – Mesures de sûreté – Évaluation".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
Buscar texto completoCRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Buscar texto completoFaith, Cranor Lorrie y Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Buscar texto completoBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Buscar texto completoHansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.
Buscar texto completoJoshua, Quittner, ed. Masters of deception: The gang that ruled cyberspace. New York: HarperPerennial, 1996.
Buscar texto completoSlatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
Buscar texto completoEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Buscar texto completoCSIS Global Organized Crime Project. y Center for Strategic and International Studies (Washington, D.C.), eds. Cybercrime-- cyberterrorism-- cyberwarfare--: Averting an electronic Waterloo. Washington, D.C: CSIS Press, 1998.
Buscar texto completoPaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Buscar texto completoSchneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.
Buscar texto completoJ, Simmons Gustavus y Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.
Buscar texto completoBruce, Christianson y International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Buscar texto completoDominic, Palmer-Brown, Revett Kenneth y SpringerLink (Online service), eds. Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Buscar texto completoClaude-Yves, Charron y Théoret Yves 1960-, eds. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Buscar texto completoJaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
Buscar texto completoHack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.
Buscar texto completoAnthony, Maeder y Martin-Sanchez Fernando J, eds. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). Amsterdam: IOS Press Inc., 2012.
Buscar texto completoGiovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
Buscar texto completoV, Blane John, ed. Cyberwarfare: Terror at a click. Huntington, N.Y: Novinka Books, 2001.
Buscar texto completoAlexandra, Kura, ed. Rogue countries: Background and current issues. Huntington, NY: Nova Science Publishers, 2001.
Buscar texto completoStefan, Katzenbeisser y Sadeghi Ahmad-Reza, eds. Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers. Berlin: Springer, 2009.
Buscar texto completoToward better usability, security, and privacy of information technology: Report of a workshop. Washington, D.C: National Academies Press, 2010.
Buscar texto completoIcove, David, Karl Seger y William VonStorch. Computer Crime: A Crimefighter's Handbook. Sebastopol: O'Reilly, 1995.
Buscar texto completoGavino, Morin, ed. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, Mass: MIT Press, 1994.
Buscar texto completoGarfinkel, Simson. Practical UNIX and Internet Security. 2a ed. Bonn: O'Reilly & Associates, 1996.
Buscar texto completoGarfinkel, Simson. Practical UNIX and Internet security. 3a ed. Beijing: O'Reilly, 2003.
Buscar texto completoCybertraque. Omnibus, 1998.
Buscar texto completoCranor, Lorrie Faith y Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.
Buscar texto completoCranor, Lorrie Faith y Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Buscar texto completoCranor, Lorrie Faith y Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Buscar texto completoCranor, Lorrie Faith y Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Buscar texto completoQuittner, Joshua y Michelle Slatalla. Masters of Deception: The Gang That Ruled Cyberspace. Harper Collins, 1995.
Buscar texto completoMasters of Deception. Bt Bound, 1999.
Buscar texto completo(Editor), Bart Preneel, Rene Govaerts (Editor) y Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Buscar texto completoWindows Vista Quick Reference. Addison Wesley Publishing Company, 2007.
Buscar texto completoFirewalls. New York: McGraw-Hill, 2001.
Buscar texto completoGoncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
Buscar texto completoGoncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
Buscar texto completoLa Sécurité informatique. Presses Universitaires de France - PUF, 2003.
Buscar texto completoContemporary Cryptology: The Science of Information Integrity. Wiley-IEEE Press, 1999.
Buscar texto completoSimmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Institute of Electrical & Electronics Enginee, 1991.
Buscar texto completoVinatier, Emmanuel. Hacking. Micro Application, 2003.
Buscar texto completoFoundations and Practice of Security Lecture Notes in Computer Science. Springer, 2012.
Buscar texto completoSecurity in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks). Routledge, 2001.
Buscar texto completoSecurity in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks). Routledge, 2000.
Buscar texto completoVigna, Giovanni. Mobile Agents and Security. Springer London, Limited, 2003.
Buscar texto completoBlane, John V. Cyberwarfare: Terror at a Click. Nova Science Publishers, 2001.
Buscar texto completoBlane, John V. Cyberwarfare: Terror at a Click. Novinka Books, 2001.
Buscar texto completoGarfinkel, Simson. Practical Unix and Internet Security: Securing Solaris, Mac OS X, Linux and Free BSD. O'Reilly Media, Incorporated, 2003.
Buscar texto completo