Livros sobre o tema "Systèmes informatiques – Mesures de sûreté – Évaluation"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Systèmes informatiques – Mesures de sûreté – Évaluation".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Jan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
Encontre o texto completo da fonteCRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Berlin: Springer-Verlag, 1993.
Encontre o texto completo da fonteFaith, Cranor Lorrie, e Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
Encontre o texto completo da fonteBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Encontre o texto completo da fonteHansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.
Encontre o texto completo da fonteJoshua, Quittner, ed. Masters of deception: The gang that ruled cyberspace. New York: HarperPerennial, 1996.
Encontre o texto completo da fonteSlatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
Encontre o texto completo da fonteEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Encontre o texto completo da fonteCSIS Global Organized Crime Project. e Center for Strategic and International Studies (Washington, D.C.), eds. Cybercrime-- cyberterrorism-- cyberwarfare--: Averting an electronic Waterloo. Washington, D.C: CSIS Press, 1998.
Encontre o texto completo da fontePaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Encontre o texto completo da fonteSchneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.
Encontre o texto completo da fonteJ, Simmons Gustavus, e Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. Piscataway, NJ: IEEE Press, 1992.
Encontre o texto completo da fonteBruce, Christianson, e International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Encontre o texto completo da fonteDominic, Palmer-Brown, Revett Kenneth e SpringerLink (Online service), eds. Global E-Security: 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Encontre o texto completo da fonteClaude-Yves, Charron, e Théoret Yves 1960-, eds. Commerce électronique: Comment créer la confiance : de la théorie à la pratique. Montréal, Qué: IQ, 2002.
Encontre o texto completo da fonteJaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
Encontre o texto completo da fonteChirillo, John. Hack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.
Encontre o texto completo da fonteAnthony, Maeder, e Martin-Sanchez Fernando J, eds. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). Amsterdam: IOS Press Inc., 2012.
Encontre o texto completo da fonteGiovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.
Encontre o texto completo da fonteV, Blane John, ed. Cyberwarfare: Terror at a click. Huntington, N.Y: Novinka Books, 2001.
Encontre o texto completo da fonteAlexandra, Kura, ed. Rogue countries: Background and current issues. Huntington, NY: Nova Science Publishers, 2001.
Encontre o texto completo da fonteStefan, Katzenbeisser, e Sadeghi Ahmad-Reza, eds. Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers. Berlin: Springer, 2009.
Encontre o texto completo da fonteToward better usability, security, and privacy of information technology: Report of a workshop. Washington, D.C: National Academies Press, 2010.
Encontre o texto completo da fonteIcove, David, Karl Seger e William VonStorch. Computer Crime: A Crimefighter's Handbook. Sebastopol: O'Reilly, 1995.
Encontre o texto completo da fonteGavino, Morin, ed. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, Mass: MIT Press, 1994.
Encontre o texto completo da fonteGarfinkel, Simson. Practical UNIX and Internet Security. 2a ed. Bonn: O'Reilly & Associates, 1996.
Encontre o texto completo da fonteGarfinkel, Simson. Practical UNIX and Internet security. 3a ed. Beijing: O'Reilly, 2003.
Encontre o texto completo da fonteCybertraque. Omnibus, 1998.
Encontre o texto completo da fonteCranor, Lorrie Faith, e Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.
Encontre o texto completo da fonteCranor, Lorrie Faith, e Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Encontre o texto completo da fonteCranor, Lorrie Faith, e Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Encontre o texto completo da fonteCranor, Lorrie Faith, e Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.
Encontre o texto completo da fonteQuittner, Joshua, e Michelle Slatalla. Masters of Deception: The Gang That Ruled Cyberspace. Harper Collins, 1995.
Encontre o texto completo da fonteMasters of Deception. Bt Bound, 1999.
Encontre o texto completo da fonte(Editor), Bart Preneel, Rene Govaerts (Editor) e Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Encontre o texto completo da fonteWindows Vista Quick Reference. Addison Wesley Publishing Company, 2007.
Encontre o texto completo da fonteFirewalls. New York: McGraw-Hill, 2001.
Encontre o texto completo da fonteGoncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
Encontre o texto completo da fonteGoncalves, Marcus. Firewalls: A Complete Guide. McGraw-Hill Companies, 1999.
Encontre o texto completo da fonteLa Sécurité informatique. Presses Universitaires de France - PUF, 2003.
Encontre o texto completo da fonteContemporary Cryptology: The Science of Information Integrity. Wiley-IEEE Press, 1999.
Encontre o texto completo da fonteSimmons, Gustavus J. Contemporary Cryptology: The Science of Information Integrity. Institute of Electrical & Electronics Enginee, 1991.
Encontre o texto completo da fonteVinatier, Emmanuel. Hacking. Micro Application, 2003.
Encontre o texto completo da fonteFoundations and Practice of Security Lecture Notes in Computer Science. Springer, 2012.
Encontre o texto completo da fonteSecurity in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks). Routledge, 2001.
Encontre o texto completo da fonteSecurity in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks). Routledge, 2000.
Encontre o texto completo da fonteVigna, Giovanni. Mobile Agents and Security. Springer London, Limited, 2003.
Encontre o texto completo da fonteBlane, John V. Cyberwarfare: Terror at a Click. Nova Science Publishers, 2001.
Encontre o texto completo da fonteBlane, John V. Cyberwarfare: Terror at a Click. Novinka Books, 2001.
Encontre o texto completo da fonteGarfinkel, Simson. Practical Unix and Internet Security: Securing Solaris, Mac OS X, Linux and Free BSD. O'Reilly Media, Incorporated, 2003.
Encontre o texto completo da fonte