Books on the topic 'Architecture des ordinateurs – Mesures de sécurité'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 books for your research on the topic 'Architecture des ordinateurs – Mesures de sécurité.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Jan, Christophe. La sécurité informatique. Eyrolles, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Canada, Gendarmerie royale du. Norme de sécurité technique dans le domaine de la technologie de l'information (NSTTI). Gendarmerie royale du Canada, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Charles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hansteen, Peter N. M. Le livre de PF: Packet filter. Eyrolles, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dordoigne, José. Réseaux informatiques: Notions fondamentales : protocoles, architectures, réseaux sans fil, virtualisation, sécurité, IP v6 ... 6th ed. Éd. ENI, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Police, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dépanner et optimiser Windows pour les nuls. First Interactive, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Christian, Cachin, and Camenisch Jan, eds. Advances in cryptology: EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings. Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garfinkel, Simson. Web security & commerce. O'Reilly, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Garfinkel, Simson. Practical UNIX and Internet Security. 2nd ed. O'Reilly & Associates, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Garfinkel, Simson. Practical UNIX and Internet security. 3rd ed. O'Reilly, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

La Sécurité informatique. Presses Universitaires de France - PUF, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Maximum Linux security: A hacker's guide to protecting your Linux server and workstation. Sams, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

(Editor), Christian Cachin, and Jan Camenisch (Editor), eds. Advances in Cryptology - EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, ... (Lecture Notes in Computer Science). Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Bruce, Christianson, and International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Springer-Verlag, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Advances in Cryptology: Proceedings of CRYPTO '85 (Lecture Notes in Computer Science). Springer, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Williams, Hugh C. Advances in Cryptology: Proceedings of Crypto 85 (Lecture Notes in Computer Science). Springer-Verlag, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!