Livros sobre o tema "Sécurité numérique"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 43 melhores livros para estudos sobre o assunto "Sécurité numérique".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Ton, Kalker, Cox I. J e Ro Yong Man, eds. Digitial watermarking: Second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers. Berlin: Springer, 2004.
Encontre o texto completo da fonteShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, Fl: Taylor & Francis, 2008.
Encontre o texto completo da fonteiPhone forensics. Sebastopol, CA: O'Reilly, 2008.
Encontre o texto completo da fonteNussbaumer, Henri. Informatique industrielle, tome 4. Commande numérique, téléinformatique, sécurité, sûreté, fiabilité. Presses Polytechniques et, 1987.
Encontre o texto completo da fonteLa gestion du risque de sécurité numérique pour la prospérité économique et sociale. OECD, 2015. http://dx.doi.org/10.1787/9789264246089-fr.
Texto completo da fonte(Editor), Bart Preneel, Rene Govaerts (Editor) e Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Encontre o texto completo da fonte(Editor), Alessandro Acquisti, Stefanos Gritzalis (Editor), Costos Lambrinoudakis (Editor) e Sabrina di Vimercati (Editor), eds. Digital Privacy: Theory, Technologies, and Practices. AUERBACH, 2007.
Encontre o texto completo da fonteDigital Watermarking and Steganography: Fundamentals and Techniques. CRC, 2007.
Encontre o texto completo da fonteShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition. Taylor & Francis Group, 2017.
Encontre o texto completo da fonteShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition. Taylor & Francis Group, 2017.
Encontre o texto completo da fonteShih, Frank Y. Digital Watermarking and Steganography. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques. Taylor & Francis Group, 2007.
Encontre o texto completo da fonteShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques. Taylor & Francis Group, 2017.
Encontre o texto completo da fonteShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition. Taylor & Francis Group, 2017.
Encontre o texto completo da fonteShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques. Taylor & Francis Group, 2017.
Encontre o texto completo da fonteShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques. Taylor & Francis Group, 2017.
Encontre o texto completo da fonteDigital Watermarking and Steganography: Fundamentals and Techniques. Taylor & Francis Group, 2017.
Encontre o texto completo da fonteSuri, Jasjit S., Shivendra Shivani e Suneeta Agarwal. Handbook of Image-Based Security Techniques. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteSuri, Jasjit S., Shivendra Shivani e Suneeta Agarwal. Handbook of Image-Based Security Techniques. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteSuri, Jasjit S., Shivendra Shivani e Suneeta Agarwal. Handbook of Image-Based Security Techniques. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteSuri, Jasjit S., Shivendra Shivani e Suneeta Agarwal. Handbook of Image-Based Security Techniques. Taylor & Francis Group, 2018.
Encontre o texto completo da fontePeng, Kun. Anonymous Communication Networks: Protecting Privacy on the Web. Taylor & Francis Group, 2014.
Encontre o texto completo da fontePeng, Kun. Anonymous Communication Networks. Taylor & Francis Group, 2019.
Encontre o texto completo da fontePeng, Kun. Anonymous Communication Networks: Protecting Privacy on the Web. Auerbach Publishers, Incorporated, 2014.
Encontre o texto completo da fontePeng, Kun. Anonymous Communication Networks: Protecting Privacy on the Web. Auerbach Publishers, Incorporated, 2014.
Encontre o texto completo da fonteTekalp, A. Murat, Anil K. Jain, Bilge Gunsel e Bulent Sankur. Multimedia Content Representation, Classification and Security: International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings. Springer London, Limited, 2006.
Encontre o texto completo da fonte(Editor), Bilge Gunsel, Anil K. Jain (Editor), A. Murat Tekalp (Editor) e Bulent Sankur (Editor), eds. Multimedia Content Representation, Classification and Security: International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings (Lecture Notes in Computer Science). Springer, 2006.
Encontre o texto completo da fonteStrauß, Stefan. Privacy and Identity in a Networked Society: Refining Privacy Impact Assessment. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteStrauß, Stefan. Privacy and Identity in a Networked Society: Refining Privacy Impact Assessment. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteStrauß, Stefan. Privacy and Identity in a Networked Society: Refining Privacy Impact Assessment. Taylor & Francis Group, 2019.
Encontre o texto completo da fontePrivacy and Identity in a Networked Society: Refining Privacy Impact Assessment. Taylor & Francis Group, 2019.
Encontre o texto completo da fontePascal, Stefano. Investir Dans les Crypto-Monnaies: Comment Acheter, échanger et Vendre en Toute Sécurité des Devises Numériques en découvrant la Blockchain, les NFT, les Altcoins et les Crypto-Monnaies émergentes. Independently Published, 2022.
Encontre o texto completo da fonteLivingstone, Sonia, e Alicia Blum-Ross. Parenting for a Digital Future: How Hopes and Fears about Technology Shape Children's Lives. Oxford University Press, Incorporated, 2020.
Encontre o texto completo da fonteStancic, Hrvoje. Trust and Records in an Open Digital Environment. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteTrust and Records in an Open Digital Environment. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteDey, Nilanjan, Rohit Thanki e Surekha Borra. Digital Image Watermarking: Theoretical and Computational Advances. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteDey, Nilanjan, Rohit Thanki e Surekha Borra. Digital Image Watermarking. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteDey, Nilanjan, Rohit Thanki e Surekha Borra. Digital Image Watermarking: Theoretical and Computational Advances. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteDey, Nilanjan, Rohit Thanki e Surekha Borra. Digital Image Watermarking: Theoretical and Computational Advances. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteDey, Nilanjan, Rohit M. Thanki e Surekha Borra. Digital Image Watermarking. Taylor & Francis Group, 2020.
Encontre o texto completo da fontePrivacy in a Digital, Networked World: Technologies, Implications and Solutions. Springer, 2015.
Encontre o texto completo da fonteZeadally, Sherali, e Mohamad Badra. Privacy in a Digital, Networked World: Technologies, Implications and Solutions. Springer, 2016.
Encontre o texto completo da fonteZeadally, Sherali, e Mohamad Badra. Privacy in a Digital, Networked World: Technologies, Implications and Solutions. Springer London, Limited, 2015.
Encontre o texto completo da fonte