Livros sobre o tema "Logiciel – Mesures de sûreté"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Logiciel – Mesures de sûreté".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Highland, Harold Joseph. Comment protéger votre micro: Matériel et logiciel : protection et confidentialité en micro-informatique. Paris: Masson, 1985.
Encontre o texto completo da fonteFaith, Cranor Lorrie, e Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Encontre o texto completo da fontePaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Encontre o texto completo da fonteHansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.
Encontre o texto completo da fonteSecrets and lies: Digital security in a networked world. New York: John Wiley, 2000.
Encontre o texto completo da fonteSurfez sans risque : protégez votre ordinateur: Virus, spywares, chevaux de Troie, pirates, spam. Nantes, France: Éditions ENI, 2005.
Encontre o texto completo da fonteGiovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
Encontre o texto completo da fonteCanada. Approvisionnements et services Canada. Manuel de la sécurité industrielle. Ottawa, Ont: Ministre des approvisionnements et services Canada, 1992.
Encontre o texto completo da fonteL' entreprise aux aguets: Information, surveillance de l'environnement, propriété et protection industrielles, espionnage et contre-espionnage au service de la compétitivité. Paris: Masson, 1990.
Encontre o texto completo da fonteJan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
Encontre o texto completo da fonteSmart card security and applications. Boston: Artech House, 1997.
Encontre o texto completo da fonteBoutherin, Bernard. Se curiser un re seau Linux. 3a ed. Paris: Eyrolles, 2006.
Encontre o texto completo da fonteInternet security with Windows NT. Loveland, CO: Duke Press, 1998.
Encontre o texto completo da fonteCommission canadienne de sûreté nucléaire. Les programmes informatiques utilisés lors de la conception et des analyses de sûreté des centrales nucléaires et des réacteurs de recherche. Ottawa, Ont: Commission canadienne de sûreté nucléaire, 2000.
Encontre o texto completo da fontePaiements électroniques sécurisés. 2a ed. Lausanne: Presses polytechniques et universitaires romanes, 2007.
Encontre o texto completo da fonteCommission canadienne de sûreté nucléaire. Rapport national du Canada pour la Convention sur la sûreté nucléaire: Deuxième réunion d'examen de la Convention. Ottawa, Ont: Commission canadienne de sûreté nucléaire, 2001.
Encontre o texto completo da fonteCRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Encontre o texto completo da fonteCanada, Gendarmerie royale du. Norme de sécurité technique dans le domaine de la technologie de l'information (NSTTI). Ottawa, Ont: Gendarmerie royale du Canada, 1992.
Encontre o texto completo da fonteGavino, Morin, ed. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, Mass: MIT Press, 1994.
Encontre o texto completo da fonteCo-auteur, Zuchelli Edmond, ed. La Peste informatique. Paris: Ed. Plume, 1989.
Encontre o texto completo da fontePost, Richard S. Security administration: An introduction to the protective services. 4a ed. Boston: Butterworth-Heinemann, 1991.
Encontre o texto completo da fonteEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Encontre o texto completo da fonteBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Encontre o texto completo da fonteBrian, Stephens, ed. Administrating Web servers, security & maintenance. Upper Saddle River, NJ: Prentice Hall PTR, 2000.
Encontre o texto completo da fonteCSIS Global Organized Crime Project. e Center for Strategic and International Studies (Washington, D.C.), eds. Cybercrime-- cyberterrorism-- cyberwarfare--: Averting an electronic Waterloo. Washington, D.C: CSIS Press, 1998.
Encontre o texto completo da fonteSchneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2a ed. Paris: Vuibert, 2001.
Encontre o texto completo da fonteJoshua, Quittner, ed. Masters of deception: The gang that ruled cyberspace. New York: HarperPerennial, 1996.
Encontre o texto completo da fonteSlatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
Encontre o texto completo da fonteLucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. Paris: E ditions Eyrolles, 2006.
Encontre o texto completo da fonteLucas, Michael. PGP & GPG: Email for the practical paranoid. San Francisco, CA: No Starch Press, 2006.
Encontre o texto completo da fonteLucas, Michael. PGP & GPG: Assurer la confidentialité de son courrier électronique. Paris: Eyrolles, 2006.
Encontre o texto completo da fonteIndia and the International Atomic Energy Agency: Mechanisms for nuclear non-proliferation. New Delhi: Jnanada Prakashan, 2011.
Encontre o texto completo da fonteSchneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.
Encontre o texto completo da fontePolice, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Ottawa, Ont: Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.
Encontre o texto completo da fonteCheryn, Picquet D., ed. Computer crime, abuse, liability, and security: A comprehensive bibliography, 1970-1984. Jefferson, N.C: McFarland, 1985.
Encontre o texto completo da fonteJ, Simmons Gustavus, e Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.
Encontre o texto completo da fonteClaude-Yves, Charron, e Théoret Yves 1960-, eds. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Encontre o texto completo da fonteAnguilla), FC '98 (1998. Financial cryptography: Second International Conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedings. Berlin: Springer, 1998.
Encontre o texto completo da fonteAnguilla), FC '97 (1997. Financial cryptography: First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Berlin: Springer, 1997.
Encontre o texto completo da fonteCommission, Canadian Nuclear Safety. Strategic plan 2002-2007 and corporate plan 2002-2004 =: Plan stratégique 2002-2007 et plan directeur 2002-2004. Ottawa, Ont: Canadian Nuclear Safety Commission = Commission canadienne de sûreté nucléaire, 2002.
Encontre o texto completo da fonteCommission, Canadian Nuclear Safety. Strategic plan 2002-2007 and corporate plan 2002-2004. [Ottawa]: Canadian Nuclear Safety Commission, 2002.
Encontre o texto completo da fonteBruce, Christianson, e International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Encontre o texto completo da fonteHack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.
Encontre o texto completo da fonteDominic, Palmer-Brown, Revett Kenneth e SpringerLink (Online service), eds. Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Encontre o texto completo da fonteV, Blane John, ed. Cyberwarfare: Terror at a click. Huntington, N.Y: Novinka Books, 2001.
Encontre o texto completo da fonteAlexandra, Kura, ed. Rogue countries: Background and current issues. Huntington, NY: Nova Science Publishers, 2001.
Encontre o texto completo da fonteCommission, Canadian Nuclear Safety. Canadian national report for the Convention on Nuclear Safety: Second review meeting. Ottawa: Canadian Nuclear Safety Commission, 2001.
Encontre o texto completo da fonteJaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
Encontre o texto completo da fonteCharles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Hull, Qué: Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Encontre o texto completo da fonteCanada. Government Services Canada. Information Management Service. e Canada. Industrial and Corporate Security Branch., eds. Microcomputer and LAN security. [Ottawa]: Govt. Services Canada, 1993.
Encontre o texto completo da fonte