Libri sul tema "Systèmes informatiques – Mesures de sûreté – Automatisation"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Systèmes informatiques – Mesures de sûreté – Automatisation".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Jan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
CRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Faith, Cranor Lorrie, e Garfinkel Simson, a cura di. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Bauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Hansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.
Slatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperPerennial, 1996.
Slatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
European Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
CSIS Global Organized Crime Project. e Center for Strategic and International Studies (Washington, D.C.), a cura di. Cybercrime-- cyberterrorism-- cyberwarfare--: Averting an electronic Waterloo. Washington, D.C: CSIS Press, 1998.
Paget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Schneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.
J, Simmons Gustavus, e Institute of Electrical and Electronics Engineers., a cura di. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.
Bruce, Christianson, e International Workshop on Security Protocols (8th : 2000 : Cambridge, England), a cura di. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Jahankhani, Hamid. Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Fusaro, Magda. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Jaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
Chirillo, John. Hack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.
N.S.W.) Australian National Health Informatics Conference (20th 2012 Sydney. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). Amsterdam: IOS Press Inc., 2012.
Giovanni, Vigna, a cura di. Mobile agents and security. Berlin: Springer, 1998.
V, Blane John, a cura di. Cyberwarfare: Terror at a click. Huntington, N.Y: Novinka Books, 2001.
Alexandra, Kura, a cura di. Rogue countries: Background and current issues. Huntington, NY: Nova Science Publishers, 2001.
IH 2009 (2009 Darmstadt, Germany). Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers. Berlin: Springer, 2009.
National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems. Toward better usability, security, and privacy of information technology: Report of a workshop. Washington, D.C: National Academies Press, 2010.
Icove, David, Karl Seger e William VonStorch. Computer Crime: A Crimefighter's Handbook. Sebastopol: O'Reilly, 1995.
Cavazos, Edward A. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, Mass: MIT Press, 1994.
Garfinkel, Simson. Practical UNIX and Internet Security. 2a ed. Bonn: O'Reilly & Associates, 1996.
Garfinkel, Simson. Practical UNIX and Internet security. 3a ed. Beijing: O'Reilly, 2003.
Markoff, John, e Tsutomu Shimomura. Cybertraque. Omnibus, 1998.
Cranor, Lorrie Faith, e Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.
Cranor, Lorrie Faith, e Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Cranor, Lorrie Faith, e Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Cranor, Lorrie Faith, e Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Quittner, Joshua, e Michelle Slatalla. Masters of Deception: The Gang That Ruled Cyberspace. Harper Collins, 1995.
Masters of Deception. Bt Bound, 1999.
(Editor), Bart Preneel, Rene Govaerts (Editor) e Joos Vandewalle (Editor), a cura di. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Butow, Eric. Windows Vista Quick Reference. Addison Wesley Publishing Company, 2007.
Firewalls. New York: McGraw-Hill, 2001.
Goncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
Goncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
sais-je?, Que, Serge Lhoste e Éric Léopold. La Sécurité informatique. Presses Universitaires de France - PUF, 2003.
Simmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Wiley-IEEE Press, 1999.
Simmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Institute of Electrical & Electronics Enginee, 1991.
Vinatier, Emmanuel. Hacking. Micro Application, 2003.
Foundations and Practice of Security Lecture Notes in Computer Science. Springer, 2012.
Vigna, Giovanni. Mobile Agents and Security. Springer London, Limited, 2003.
Blane, John V. Cyberwarfare: Terror at a Click. Nova Science Publishers, 2001.
Blane, John V. Cyberwarfare: Terror at a Click. Novinka Books, 2001.
Schwartz, Alan, Simson Garfinkel e Gene Spafford. Practical Unix and Internet Security: Securing Solaris, Mac OS X, Linux and Free BSD. O'Reilly Media, Incorporated, 2003.
Schwartz, Alan, Simson Garfinkel e Gene Spafford. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2003.
Garfinkel, Simson, Gene Spafford e Deborah Russell. Practical UNIX and Internet Security. O'Reilly Media, Incorporated, 2000.