Добірка наукової літератури з теми "Fournisseurs de services Internet – France"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Fournisseurs de services Internet – France".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Fournisseurs de services Internet – France"
Richebourg, Aube. "Internet non marchand et division du travail militant." Réseaux N° 240, no. 4 (September 21, 2023): 213–40. http://dx.doi.org/10.3917/res.240.0213.
Повний текст джерелаHamel, Sophie. "Infrastructures Internet en Océanie." Revue Défense Nationale N° 872, no. 7 (July 10, 2024): 58–64. http://dx.doi.org/10.3917/rdna.872.0058.
Повний текст джерелаJacquin, Clément. "Les services d’hébergement Internet en France." Netcom 17, no. 1 (2003): 23–34. http://dx.doi.org/10.3406/netco.2003.1568.
Повний текст джерелаQuairel, Françoise, and Marie-Noëlle Auberger. "La diffusion de la RSE par la relation fournisseurs." Revue internationale P.M.E. 20, no. 3-4 (February 16, 2012): 69–94. http://dx.doi.org/10.7202/1008524ar.
Повний текст джерелаKaabachi, Souheila, Selima Ben Mrad, and Maria Petrescu. "Consumer initial trust toward internet-only banks in France." International Journal of Bank Marketing 35, no. 6 (September 4, 2017): 903–24. http://dx.doi.org/10.1108/ijbm-09-2016-0140.
Повний текст джерелаVolkmann, Christian. "Trademark Use and Liability of Referencing Service In Keyword Advertising – Google AdWords and Trademark Law." European Journal of Risk Regulation 2, no. 3 (September 2011): 450–54. http://dx.doi.org/10.1017/s1867299x00006887.
Повний текст джерелаJelassi, Kaouther, and Chantal Ammi. "Les services Internet Mobile en France : une proposition de mesure de la continuité d'usage." Management & Avenir 45, no. 5 (2011): 238. http://dx.doi.org/10.3917/mav.045.0238.
Повний текст джерелаMougin, Bruno, Jérôme Nicolas, Yannick Vigier, Hélène Bessière, and Stéphane Loigerot. "« MétéEAU Nappes » : un site Internet contenant des services utiles à la gestion des étiages." La Houille Blanche, no. 5 (October 2020): 28–36. http://dx.doi.org/10.1051/lhb/2020045.
Повний текст джерелаLallement, Gérard, and Matthias de Jouvenel. "Le Baromètre du numérique." Annales des Mines - Enjeux numériques N° 1, no. 1 (January 24, 2018): 91–97. http://dx.doi.org/10.3917/ennu.001.0091.
Повний текст джерелаKoster, Alexis. "Fighting Internet Piracy: The French Experience With The Hadopi Law." International Journal of Management & Information Systems (IJMIS) 16, no. 4 (September 20, 2012): 327. http://dx.doi.org/10.19030/ijmis.v16i4.7310.
Повний текст джерелаДисертації з теми "Fournisseurs de services Internet – France"
Albrieux, Sandrine. "La responsabilité du fournisseur de moyens de communication électronique." Paris 2, 2004. http://www.theses.fr/2004PA020057.
Повний текст джерелаThe supplier of electronic ways of communication - who is not the author nor the editor of the informations circulating on internet, but the person who offers to the suppliers of contents the instruments permitting or facilitating the diffusion or the localization to the public of the information they have produced - has never been able to evolve in a " no-go area". His activities do not escape the rulings of the law when he supplies intentionally or unwisely the cause of the offence. Apart a few assumptions where he can put forward his irresponsibility or exemption of responsibility, dedicated by law for the trust in digital economy, he must answer for his harmful attitude towards others or affecting society. His responsibility can be committed as conniving when he is part of the criminal offense of the supplier of contents knowlingly and voluntarily, providing that the offense of the principal author receive the qualification of continuous offense. His attitude is reprehensible from then on he has the knowledge or could not ignore the illicitness of the content being transmitted by him, housed, reference of which is facilitated and do not act promptly to withdraw it from the network or to make access impossible, letting in this way continue the harmful action he could prevent or stop. But in a universe transcending the frontiers, the implementation of the judicial answer can be delicate and the debt of the supplier of electronic ways of communication settled abroad stand unfulfilled, because the authority of the French decisions does not have an international value as to impress the foreign authorities
El, Hayek Audine. "La responsabilité des intermédiaires de l'internet." Nantes, 2006. http://www.theses.fr/2006NANT4016.
Повний текст джерелаRichebourg, Aube. "L'internet associatif en France et en Allemagne : sociologie d'une rémanence utopique." Electronic Thesis or Diss., Paris, EHESS, 2024. http://www.theses.fr/2024EHES0134.
Повний текст джерелаOn the fringes of the digital revolution, unknown to the general public, volunteers have been administering and providing non-profit Internet services for thirty years. These associations, some of them very old, are trying to keep alive the organisational utopia that dates back to the beginnings of the network and the values associated with it. But what is it that still drives volunteers to defend this lost cause? What function does their commitment fulfil? And how does it fit into the evolution of the internet over the last thirty years?This thesis offers a sociological analysis of the “utopian practice” and the conditions of its persistence, based on a comparative survey between France and Germany combining ethnography and archival work. Using the perspective of configuration analysis borrowed from Norbert Elias, we will explain how the conservative and adaptive capacity of this associative movement responds to the relative frustrations of those disappointed by the digital revolution, by crossing structural, organisational and individual levels of analysis.The thesis begins by tracing the sociogenesis of the associative Internet in the 1990s, between pioneering practices, economic marginalisation and discreet insertion into local public connection policies. It was in the 2000s that associative activity became ‘utopian’, through the actions of ‘utopian entrepreneurs’, on the fringes of the then emerging activism in defence of digital rights and freedoms. Secondly, the thesis shows, from an organisational point of view, how Internet associations were shaped from the inside by successive waves of volunteers who, according to their own socialisation on the Internet, invested in a sense of the cause and a corresponding organisational model. Finally, on an individual level, thanks to a utopian division of labour that enabled people to practise their profession in a different way, we will explain how involvement in these associations was rewarded for pioneers and later volunteers alike. As a link between the alternative socialisations that make up the relationship to learning, the desire for autonomy, freedom and security, the associations create the conditions for an individual utopia for those who manage to join them, compensating for the power relationships they experience at work.So, while organising the preservation of pre-market practices of collaboration between peers, the associative internet offers its followers avenues of transformation, particularly regarding the individual and collective relationship to activity. The comparison enables us to grasp the contours of a European Internet utopia and what the diversity of utopian practices owes to national power structures, particularly regarding regulation of the telecommunications market. Beyond a normative perspective that sees utopia in society as a factor for unambiguous change, or as a system of ideas opposing conservative fictions and geared towards a better society, this thesis aims to contribute to a sociological understanding of utopian phenomena based on an analysis of their logical practices
Marchet, Nathalie. "La responsabilité civile des intermédiaires techniques de l'Internet." Toulouse 1, 2003. http://www.theses.fr/2003TOU10056.
Повний текст джерелаIn an attempt to solve the delicate issue of responsability for the service providers on the internet, many case laws and new statutes have been published over the last few years. A strongly opinionated discussion has broken out, questioning the future of Storage Service Providers, raising doubts about the amount of responsability taken by other Internet third parties. The United States of America have anticipated this issue as early as 1998 by voting the DMCA based on a general principal of limitation on liability relating to material on line. The EU tried to follow the American way, setting up some common rules for all European countries. France is still far behind after passing a legislation (08/01/00) which was little satisfaying and heavily criticised by the professioals of the Internet industry. However this legislation is presently being looked into and changed accordingly. Our experience within the Expert center CELOG, together with the agency for the Protection of Programs, enabled us to work on the civil responsabilities for the five main categories of service providers which role more or less involve an access to the information available
Biri, Aroua. "Proposition de nouveaux mécanismes de protection contre l'usurpation d'identité pour les fournisseurs de services Internet." Thesis, Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0009/document.
Повний текст джерелаMore and more organizations are computerized and more an organization is great, plus it can be the target of Internet attacks. Moreover, some of them have a growing number of electronic equipments that can be connected to the Internet from various locations (home, car, workplace, etc.). These devices form a so-called personal area network that allows the development of new applications centered on users. The ISPs can then expand their service offerings by providing a secure supply of such networks. According to the report of the firm “Arbor Networks”, entitled "Worldwide Infrastructure Security Report ", the most severe threats are related to distributed denial of service. This type of attack aims to make available a service by preventing legitimate users from using it. It uses the technique of identity theft that involves the creation of packages (like IP, ARP, etc.) with a forged source address and that in order to usurp the Identity of the issuer or of the computer system. Thus, the technique of identity theft allows to render a service unavailable, to listen, to corrupt, to block traffic from Internet users or to undermine the legitimate operation of routing protocols and personal networks. Moreover, the technique of identity theft is also used for prohibited activities by "HADOPI" law in France and related to illegal downloading issues. Thus, the ISPs have a duty to protect their customers from attacks based on the technique of identity theft. The mechanisms of protection against spoofing attacks for access networks are crucial for customer adoption of new applications offered by Internet service providers. This part of the doctoral thesis is part of the European project “MAGNET Beyond" whose vision is to put into practice the concept of personal networks, with the ultimate objective to design, develop, prototype and validate the concept. In the context of user equipment’s access to the network of an Internet services provider from a public place, we proposed a cross-layer protocol based on the principles of information theory. This protocol fixes the security hole not addressed by other proposals that is the attack of identity theft that occurs at the beginning of communication and thus protects users against the middle man attacks. We proposed that the person who wants to have secure access to the Internet must be on a specific circle has been called "RED POINT" so that the attacker is not able to be on the same circle at the same time. The proposed cross-layer protocol can be divided into three phases: the phase of checking the position of the user, the extraction phase of the shared secret of the physical layer and the phase of the derivation of the shared key at the MAC layer. We subsequently validated our solution through a formal tool AVISPA and presented the results of its implementation. In a private context, communication between devices convey users' personal data which may be confidential, so we must prevent equipment not belonging to the legitimate user to access its network. Thus, we proposed two mechanisms of protection against attacks based on spoofing so that illegitimate equipment is unable to impersonate legitimate equipment. The first phase will be dedicated to personal networks and the second will be dedicated to the particular case of medical networks. Regarding the mechanism dedicated to personal networks, we have proposed the use of a protocol based on out-of-band channel in order to provide certificates to user equipments. We derive bilateral key for personal network’s equipments of the same site and between equipments at remote sites. Concerning the particular case of medical networks, we proposed to cover their deployment phases and their operational phases. This proposal was submitted to the IEEE 802.15.6 working group that conducts research for the standardization of medical networks […]
Biri, Aroua. "Proposition de nouveaux mécanismes de protection contre l'usurpation d'identité pour les fournisseurs de services Internet." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0009.
Повний текст джерелаMore and more organizations are computerized and more an organization is great, plus it can be the target of Internet attacks. Moreover, some of them have a growing number of electronic equipments that can be connected to the Internet from various locations (home, car, workplace, etc.). These devices form a so-called personal area network that allows the development of new applications centered on users. The ISPs can then expand their service offerings by providing a secure supply of such networks. According to the report of the firm “Arbor Networks”, entitled "Worldwide Infrastructure Security Report ", the most severe threats are related to distributed denial of service. This type of attack aims to make available a service by preventing legitimate users from using it. It uses the technique of identity theft that involves the creation of packages (like IP, ARP, etc.) with a forged source address and that in order to usurp the Identity of the issuer or of the computer system. Thus, the technique of identity theft allows to render a service unavailable, to listen, to corrupt, to block traffic from Internet users or to undermine the legitimate operation of routing protocols and personal networks. Moreover, the technique of identity theft is also used for prohibited activities by "HADOPI" law in France and related to illegal downloading issues. Thus, the ISPs have a duty to protect their customers from attacks based on the technique of identity theft. The mechanisms of protection against spoofing attacks for access networks are crucial for customer adoption of new applications offered by Internet service providers. This part of the doctoral thesis is part of the European project “MAGNET Beyond" whose vision is to put into practice the concept of personal networks, with the ultimate objective to design, develop, prototype and validate the concept. In the context of user equipment’s access to the network of an Internet services provider from a public place, we proposed a cross-layer protocol based on the principles of information theory. This protocol fixes the security hole not addressed by other proposals that is the attack of identity theft that occurs at the beginning of communication and thus protects users against the middle man attacks. We proposed that the person who wants to have secure access to the Internet must be on a specific circle has been called "RED POINT" so that the attacker is not able to be on the same circle at the same time. The proposed cross-layer protocol can be divided into three phases: the phase of checking the position of the user, the extraction phase of the shared secret of the physical layer and the phase of the derivation of the shared key at the MAC layer. We subsequently validated our solution through a formal tool AVISPA and presented the results of its implementation. In a private context, communication between devices convey users' personal data which may be confidential, so we must prevent equipment not belonging to the legitimate user to access its network. Thus, we proposed two mechanisms of protection against attacks based on spoofing so that illegitimate equipment is unable to impersonate legitimate equipment. The first phase will be dedicated to personal networks and the second will be dedicated to the particular case of medical networks. Regarding the mechanism dedicated to personal networks, we have proposed the use of a protocol based on out-of-band channel in order to provide certificates to user equipments. We derive bilateral key for personal network’s equipments of the same site and between equipments at remote sites. Concerning the particular case of medical networks, we proposed to cover their deployment phases and their operational phases. This proposal was submitted to the IEEE 802.15.6 working group that conducts research for the standardization of medical networks […]
Kyeongja, Lee Toguyeni Abdoul Karim Armand Rahmani Ahmed. "Modèle global pour la Qualité de Service dans les réseaux de FAI intégration de DiffServ et de l'ingénierie de trafic basée sur MPLS /." Villeneuve d'Ascq : Université des sciences et technologies de Lille, 2008. https://iris.univ-lille1.fr/dspace/handle/1908/1057.
Повний текст джерелаTexte en anglais. Résumé en français et en anglais. Titre provenant de la page de titre du document numérisé. Bibliogr. p. [131]-140.
Mignard, Jean-Pierre. "Cybercriminalité et cyber-répression entre désordre et harmonisation mondiale." Paris 1, 2004. http://www.theses.fr/2004PA010310.
Повний текст джерелаChahine, Rony. "Services multi-fournisseurs et trans-réseaux : mécanismes pour un plan contrôle global, application à un nouveau paradigme de signalisation et aux médiateurs de signalisation /." Paris : École nationale supérieure des télécommunications, 2007. http://catalogue.bnf.fr/ark:/12148/cb41024516r.
Повний текст джерелаChahine, Rony. "Services multi-fournisseurs et trans-réseaux : mécanismes pour un plan contrôle global : application à un nouveau paradigme de signalisation et aux médiateurs de signalisation." Phd thesis, Télécom ParisTech, 2006. http://pastel.archives-ouvertes.fr/pastel-00002128.
Повний текст джерелаКниги з теми "Fournisseurs de services Internet – France"
Arnaud, Michel. Les espaces publics d'accès à Internet: Réalités et devenir d'une nouvelle géographie des territoires et des réseaux. Paris: Presses universitaires de France, 2002.
Знайти повний текст джерелаArnaud, Michel, and Jacques Perriault. Les Espaces publics d'accès à Internet. Presses Universitaires de France - PUF, 2002.
Знайти повний текст джерелаLessard, Bill, and Steve Baldwin. NetSlaves: True Tales of Working the Web. McGraw-Hill Companies, 2000.
Знайти повний текст джерелаLessard, Bill, and Steve Baldwin. NetSlaves: True Tales of Working the Web. McGraw-Hill Companies, 2000.
Знайти повний текст джерелаTelecom Extreme Transformation: The Road to a Digital Service Provider. Taylor & Francis Group, 2021.
Знайти повний текст джерелаBraun, Harald, Kaveh Hushyar, and Hossein Eslambolchi. Telecom Extreme Transformation: The Road to a Digital Service Provider. Taylor & Francis Group, 2021.
Знайти повний текст джерелаBraun, Harald, Kaveh Hushyar, and Hossein Eslambolchi. Telecom Extreme Transformation: The Road to a Digital Service Provider. Taylor & Francis Group, 2021.
Знайти повний текст джерелаService Providers ASPs, ISPs, MSPs, NSPs, and WSPs: A Wiley Tech Brief. John Wiley & Sons, 2001.
Знайти повний текст джерелаP'ŭllaetp'om cheguk ŭi t'ansaeng kwa pŭraendŭ ŭi mirae: K'up'ang, Neibŏ, Paemin poda mŏnjŏ ch'annŭn pŭraendŭ nŭn muŏt i tarŭn'ga. Sŏul-si: Mirae ŭi Ch'ang, 2021.
Знайти повний текст джерелаAllen, Jonathan P. Digital Entrepreneurship. Taylor & Francis Group, 2019.
Знайти повний текст джерелаЧастини книг з теми "Fournisseurs de services Internet – France"
Çag̃layan, Mehmet Ufuk. "AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results." In Communications in Computer and Information Science, 1–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_1.
Повний текст джерелаBernier, Gwenaëlle. "France: Invoicing and E-Commerce: What Are the Tax Constraints? Is Electronic Invoicing the Best Solution?" In Global E-Business Law & Taxation, 129–41. Oxford University PressNew York, NY, 2009. http://dx.doi.org/10.1093/oso/9780195367218.003.0008.
Повний текст джерелаi Martinez, Agustí Cerrill. "Accessing Administration's Information via Internet in Spain." In Global Information Technologies, 2558–73. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch186.
Повний текст джерелаKaspar, Christian, Florian Resatsch, and Svenja Hagenhoff. "Basic Concepts of Mobile Radio Technologies." In Networking and Telecommunications, 562–70. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch036.
Повний текст джерелаKaspar, Christian, Florian Resatsch, and Svenja Hagenhoff. "Basic Concepts of Mobile Radio Technologies." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 113–20. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch016.
Повний текст джерелаSaygili, Ebru E., and Tuncay Ercan. "An Overview of International Fintech Instruments Using Innovation Diffusion Theory Adoption Strategies." In Innovative Strategies for Implementing FinTech in Banking, 46–66. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3257-7.ch003.
Повний текст джерелаRahman, Hakikur. "Role of ICT in Establishing E-Government System for Disadvantaged Communities." In Information Communication Technologies, 1482–93. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-949-6.ch101.
Повний текст джерелаТези доповідей конференцій з теми "Fournisseurs de services Internet – France"
Samkharadze, Sophio, Marika Zurmukhtashvili, Eka Kokhreidze, Elene Kharashvili, and Sesili Beriashvili. "Availability of Dental Services for Medical Students in Georgia." In Socratic Lectures 8. University of Lubljana Press, 2023. http://dx.doi.org/10.55295/psl.2023.ii5.
Повний текст джерелаThi Thien Nhi, Dam, Margarita Chuloy, and Leonhard Glomann. "Environmental Impact of Video Streaming from Users’ Perspectives." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005098.
Повний текст джерелаLarouk, Omar, and Marina Garanovich. "EVALUATION THE QUALITY OF MOOCS BY REDESIGNING LEARNING SPACES: ERGONOMICS, CREDIBILITY, DENSITY AND INFORMATION RETRIEVAL." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-179.
Повний текст джерелаЗвіти організацій з теми "Fournisseurs de services Internet – France"
Lefevre, Bruno, and Philippe Bouquillion. Communications, media and internet concentration in France, 2019-2021. Global Media and Internet Concentration Project, Carleton University, 2024. http://dx.doi.org/10.22215/gmicp/2024.2.
Повний текст джерела