Добірка наукової літератури з теми "Fournisseur d'accès à internet"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Fournisseur d'accès à internet".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Fournisseur d'accès à internet"
Sédallian, Valérie. "La responsabilité de l'employeur en tant que fournisseur d'accès à internet." LEGICOM 27, no. 2 (2002): 47. http://dx.doi.org/10.3917/legi.027.0047.
Повний текст джерелаLe Mouël, Yves. "Le rôle des fournisseurs d'accès à Internet." Annales des Mines - Réalités industrielles Mai 2013, no. 2 (2013): 48. http://dx.doi.org/10.3917/rindu.132.0048.
Повний текст джерелаGeorge, Éric. "Internet au Québec. Les fournisseurs d'accès et les portails." Réseaux 17, no. 97 (1999): 263–78. http://dx.doi.org/10.3406/reso.1999.2173.
Повний текст джерелаBelbèze, Christian, Max Chevalier, and Chantal Soulé-Dupuy. "Agrégats de mots-clés validés sémantiquement Pour de nouveaux services d'accès à l'information sur internet." Document numérique 12, no. 1 (March 30, 2009): 81–105. http://dx.doi.org/10.3166/dn.12.1.81-105.
Повний текст джерелаBureau, Dominique, and Horatia Muir Watt. "Un contrat de coopération commerciale ne peut être régi par les Principes Unidroit choisis par les parties." Revue critique de droit international privé N° 2, no. 2 (October 31, 2023): 475–82. http://dx.doi.org/10.3917/rcdip.232.0475.
Повний текст джерелаPuel, Gilles. "Géographie des lieux d'accès à Internet. Les conditions de l'accès public et les modèles d'usages dans les grandes villes de Chine." Espace géographique 38, no. 1 (2009): 17. http://dx.doi.org/10.3917/eg.381.0017.
Повний текст джерелаTanotra, Ritika, and Monisha Poojary. ""Why Should I Move to the Countryside?": Exploring New Attempts for Fostering Inclusion in Rural Communities." Canadian Ethnic Studies 56, no. 3 (2024): 145–69. http://dx.doi.org/10.1353/ces.2024.a939619.
Повний текст джерелаMoukdad, Haidar. "URLs in Their Native Language: Opinions of Arab Users of the Internet." Proceedings of the Annual Conference of CAIS / Actes du congrès annuel de l'ACSI, October 21, 2013. http://dx.doi.org/10.29173/cais387.
Повний текст джерелаGautier, Axel. "Focus 21 - juin 2018." Regards économiques, October 12, 2018. http://dx.doi.org/10.14428/regardseco2018.06.28.01.
Повний текст джерелаDayton-Johnson, Jeff. "The Economics of Cultural Policy in the Internet Age." Canadian Journal of Communication 27, no. 4 (April 1, 2002). http://dx.doi.org/10.22230/cjc.2002v27n4a1320.
Повний текст джерелаДисертації з теми "Fournisseur d'accès à internet"
Duhen, Willy. "La responsabilité extra-contractuelle du fournisseur d'accès à Internet." Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM1052.
Повний текст джерелаInternet Service Providers are major actors of the Information Society. They offer connections, controls access points, and can also identify their users. Their many liabilities result from their multiple functions as technical services provider, data controller or performers of judicial orders. These legal obligations are numerous and sometimes overabundant. In spite of an existing and specific liability status, the very notion of "Internet service provider" still remains legally undefined. This lacuna entails a profusion of legal status imposing an ISP status to players for which the main activity is not to provide an Internet connection : Universities, companies, individuals. From then on, criminal, civil and administrative liabilities multiply and create an instable, obscure and even abstruse status. This lexical and legal scattering is even worsened by the functional application of the electronic communications and Information Society legal framework to access providing activities. It is then necessary to unify the legal regimes associated to those activities according to stabilized legal concepts. This reconstruction will inevitably affect the Information Society legal framework as a whole. Eventually, it will open on a possible ground for the electronic communications legal framework
Fodil, Idir Bahaa. "Architectures de Gestion par Politiques des Services dans les Réseaux d'Accès Internet." Paris 6, 2004. http://www.theses.fr/2004PA066118.
Повний текст джерелаRichebourg, Aube. "L'internet associatif en France et en Allemagne : sociologie d'une rémanence utopique." Electronic Thesis or Diss., Paris, EHESS, 2024. http://www.theses.fr/2024EHES0134.
Повний текст джерелаOn the fringes of the digital revolution, unknown to the general public, volunteers have been administering and providing non-profit Internet services for thirty years. These associations, some of them very old, are trying to keep alive the organisational utopia that dates back to the beginnings of the network and the values associated with it. But what is it that still drives volunteers to defend this lost cause? What function does their commitment fulfil? And how does it fit into the evolution of the internet over the last thirty years?This thesis offers a sociological analysis of the “utopian practice” and the conditions of its persistence, based on a comparative survey between France and Germany combining ethnography and archival work. Using the perspective of configuration analysis borrowed from Norbert Elias, we will explain how the conservative and adaptive capacity of this associative movement responds to the relative frustrations of those disappointed by the digital revolution, by crossing structural, organisational and individual levels of analysis.The thesis begins by tracing the sociogenesis of the associative Internet in the 1990s, between pioneering practices, economic marginalisation and discreet insertion into local public connection policies. It was in the 2000s that associative activity became ‘utopian’, through the actions of ‘utopian entrepreneurs’, on the fringes of the then emerging activism in defence of digital rights and freedoms. Secondly, the thesis shows, from an organisational point of view, how Internet associations were shaped from the inside by successive waves of volunteers who, according to their own socialisation on the Internet, invested in a sense of the cause and a corresponding organisational model. Finally, on an individual level, thanks to a utopian division of labour that enabled people to practise their profession in a different way, we will explain how involvement in these associations was rewarded for pioneers and later volunteers alike. As a link between the alternative socialisations that make up the relationship to learning, the desire for autonomy, freedom and security, the associations create the conditions for an individual utopia for those who manage to join them, compensating for the power relationships they experience at work.So, while organising the preservation of pre-market practices of collaboration between peers, the associative internet offers its followers avenues of transformation, particularly regarding the individual and collective relationship to activity. The comparison enables us to grasp the contours of a European Internet utopia and what the diversity of utopian practices owes to national power structures, particularly regarding regulation of the telecommunications market. Beyond a normative perspective that sees utopia in society as a factor for unambiguous change, or as a system of ideas opposing conservative fictions and geared towards a better society, this thesis aims to contribute to a sociological understanding of utopian phenomena based on an analysis of their logical practices
Li, Yanhuang. "Interoperability and Negotiation of Security Policies." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0414/document.
Повний текст джерелаSecurity policy provides a way to define the constraints on behavior of the members belonging to a system, organization or other entities. With the development of IT technology such as Grid Computing and Cloud Computing, more and more applications and platforms exchange their data and services for cooperating. Toward this trend, security becomes an important issue and security policy has to be applied in order to ensure the safety of data and service interaction. In this thesis, we deal with one type of security policy: access control policy. Access control policy protects the privileges of resource's utilization and there exist different policy models for various scenarios. Our goal is to ensure that the service customer well expresses her security requirements and chooses the service providers that fit these requirements.The first part of this dissertation is dedicated to service provider selection. In case that the security policies of the service provider are accessible to the service customer, we provide a method for measuring the similarity between security policies. Another case is that security policies are not accessible to the service customer or not specified explicitly. Our solution is proposing a policy-based framework which enables the derivation from attribute-based security requirements to concrete security policies. The second part of the dissertation focuses on the security policy negotiation. We investigate the process of reaching agreement through bargaining process in which negotiators exchange their offers and counter offers step by step. The positive result of the negotiation generates a policy contract
Fayçal, Marguerite. "Routage efficace pour les réseaux pair-à-pair utilisant des tables de hachage distribuées." Phd thesis, Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00521935.
Повний текст джерелаThis dissertation is a synthesis of our research at Orange Labs (formerly France Telecom R&D) to answer a problem identified by the aforesaid network operator and concerning peer-to-peer (P2P) streams. The rise of P2P requires new systems to meet the needs of users, but also those of ISPs and other network operators. The former seek permanently quite noticeable high QoS; the latter aim to optimize the use of network resources and to reduce various operations’ and management costs. Hence the interest of this thesis, that aims to let a P2P network be aware of its underlying IP network in order to achieve a system with an efficient routing mechanism that leads to a win-win situation. Our research focuses on systems based on distributed hash tables (DHT), that we study and analyze first. This dissertation begins with an analysis of the main protocols for discovery of dynamic resources in the different P2P architectures. The requirements for efficient P2P routing are then established. Afterwards, discovery techniques for generating and providing underlay network proximity information are presented, followed by techniques and main systems that exploit such information. Our research led to the definition, design, specification and both individual and comparative analysis of two systems: CAP (Context-Aware P2P system) and NETPOPPS (Network Provider Oriented P2P System). The former introduces semantics in the identifiers of peers and objects and is context-aware. The latter simplifies the management of the different identifiers and is network operator oriented: it enables cooperation between P2P traffic and the underlay’s network operator (its policies and network topology)
Fayçal, Marguerite. "Routage Efficace pour les Réseaux Pair-à-Pair utilisant des Tables de Hachage Distribuées." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00521935.
Повний текст джерелаAlbrieux, Sandrine. "La responsabilité du fournisseur de moyens de communication électronique." Paris 2, 2004. http://www.theses.fr/2004PA020057.
Повний текст джерелаThe supplier of electronic ways of communication - who is not the author nor the editor of the informations circulating on internet, but the person who offers to the suppliers of contents the instruments permitting or facilitating the diffusion or the localization to the public of the information they have produced - has never been able to evolve in a " no-go area". His activities do not escape the rulings of the law when he supplies intentionally or unwisely the cause of the offence. Apart a few assumptions where he can put forward his irresponsibility or exemption of responsibility, dedicated by law for the trust in digital economy, he must answer for his harmful attitude towards others or affecting society. His responsibility can be committed as conniving when he is part of the criminal offense of the supplier of contents knowlingly and voluntarily, providing that the offense of the principal author receive the qualification of continuous offense. His attitude is reprehensible from then on he has the knowledge or could not ignore the illicitness of the content being transmitted by him, housed, reference of which is facilitated and do not act promptly to withdraw it from the network or to make access impossible, letting in this way continue the harmful action he could prevent or stop. But in a universe transcending the frontiers, the implementation of the judicial answer can be delicate and the debt of the supplier of electronic ways of communication settled abroad stand unfulfilled, because the authority of the French decisions does not have an international value as to impress the foreign authorities
Roudiere, Gilles. "Détection d'attaques sur les équipements d'accès à Internet." Thesis, Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0017/document.
Повний текст джерелаNetwork anomalies, and specifically distributed denial of services attacks, are still an important threat to the Internet stakeholders. Detecting such anomalies requires dedicated tools, not only able to perform an accurate detection but also to meet the several constraints due to an industrial operation. Such constraints include, amongst others, the ability to run autonomously or to operate on sampled traffic. Unlike supervised or signature-based approaches, unsupervised detection do not require any kind of knowledge database on the monitored traffic. Such approaches rely on an autonomous characterization of the traffic in production. They require the intervention of the network administrator a posteriori, when it detects a deviation from the usual shape of the traffic. The main problem with unsupervised detection relies on the fact that building such characterization is complex, which might require significant amounts of computing resources. This requirement might be deterrent, especially when the detection should run on network devices that already have a significant workload. As a consequence, we propose a new unsupervised detection algorithm that aims at reducing the computing power required to run the detection. Its detection focuses on distributed denial of service attacks. Its processing is based upon the creation, at a regular interval, of traffic snapshots, which helps the diagnosis of detected anomalies. We evaluate the performances of the detector over two datasets to check its ability to accurately detect anomalies and to operate, in real time, with limited computing power resources. We also evaluate its performances over sampled traffic. The results we obtained are compared with those obtained with FastNetMon and UNADA
Schuers, Matthieu. "Évaluation d'outils d'accès à la connaissance en médecine générale." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMR070/document.
Повний текст джерелаPhysicians, and especially general practitioners, are not « all-knowing ». As they areconfronted with a large amount of clinical situations, information and knowledgemanagement are essential topics of interest. This management is mainly based on thedevelopment of numeric literacy, that is the ability to use and understand digital tools andmedia. The aims of this work were to identify the obstacles encountered by generalpractitioners when seeking health information online and to develop and assess tools tohelp them to overcome these barriers.We performed a qualitative study among general practice residents and generalpractitioners. This allowed us to highlight several obstacles encountered by them whenseeking medical information online. These obstacles include both tools and professionals’issues. Institutional obstacles were also identified. Of these barriers, the insufficientcommand of English was cited as an important issue by both residents and physicians.The Department of Medical Information and Informatics of the Rouen University Hospitalhas developed several tools in order to facilitate access to knowledge for healthprofessionals. LiSSa is a bibliographic database containing only articles written in French.It allows health professionals and researchers, whose native language is not English, toaccess to hundreds of thousands of references, from PubMed and from journals notindexed in PubMed. A multi-lingual query builder to facilitate information retrieval wasdesigned. It appears to be an effective tool to improve the quality of PubMed queries inparticular for users whose first native language is not English
Zohore, Dominique. "L'équilibre contractuel entre fournisseur et utilisateur de services de communications électroniques." Aix-Marseille 3, 2010. http://www.theses.fr/2010AIX32091.
Повний текст джерелаКниги з теми "Fournisseur d'accès à internet"
Duhen, Willy. La responsabilité extra-contractuelle du fournisseur d'accès à Internet. Aix-en-Provence: Presses universitaires d'Aix-Marseille, 2013.
Знайти повний текст джерелаArnaud, Michel. Les espaces publics d'accès à Internet: Réalités et devenir d'une nouvelle géographie des territoires et des réseaux. Paris: Presses universitaires de France, 2002.
Знайти повний текст джерелаCanada, Canada Industrie, ed. Le Canada atlantique en direct ... via l'inforoute. Ottawa, Ont: Gouvernement du Canada, Industrie Canada, 1999.
Знайти повний текст джерела(Canada), Community Access Program. Community Access Program : rural element (communities with populations under 50,000) : proposal guide =: Programme d'accès communautaire : élément rural (collectivités comptant moins de 50,000 habitants) : guide de préparation des propositions. Ottawa, Ont: Industry Canada = Industrie Canada, 1998.
Знайти повний текст джерела1962-, Jonker Willem, and Petković Milan, eds. Secure data management: Second VLDB workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings. Berlin: Springer, 2005.
Знайти повний текст джерелаArnaud, Michel, and Jacques Perriault. Les Espaces publics d'accès à Internet. Presses Universitaires de France - PUF, 2002.
Знайти повний текст джерелаGoralski, Walter, and Vincent Giry. ADSL et xDSL : Nouvelles technologies d'accès à Internet. Osman Eyrolles Multimédia - OEM, 2000.
Знайти повний текст джерелаMandin, Christophe. IntranetWare 4.11, Services d'accès intranet / internet, collection MEGA+, en français / in french. ENI Publishing, Limited, 1998.
Знайти повний текст джерелаEditions, Carnets Pratiques. Mots2Passe: Carnet Broché Pour Inscrire les Mots de Passe d'accès à Vos Sites Internet Favoris. Independently Published, 2019.
Знайти повний текст джерелаERIC, A. B. Solution d'Accès Internet Sécurisé Avec Pfsense: Généralité Sur les Réseaux Wi-Fi, Configuration de Pfsense, le Portail Captif. Independently Published, 2020.
Знайти повний текст джерелаЗвіти організацій з теми "Fournisseur d'accès à internet"
Saha, Devanik. Politiques fiscales antichocs et inclusives. Institute of Development Studies, November 2023. http://dx.doi.org/10.19088/core.2023.007.
Повний текст джерела